Make a daily announcement to remove all disks before departing for the day.
Change the Boot order in the BIOS.
Make it a part of the evening checks to ensure all disks are removed.
Make a company policy that states that it is unlawful to leave disks in the machines.
第1题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第2题:
Which of the following would allow a company to conserve energy and still provide a functional service to its employees?()
第3题:
It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the following is a possible solution?()
第4题:
A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()
第5题:
Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()
第6题:
You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. The domain contains an organizational unit (OU) named Servers that contains all of the company’s Windows Server 2003 resource servers. The domain also contains an OU named Workstations that contains all of the company’s Windows XP Professional client computers. You configure a baseline security template for resource servers named Server.inf and a baseline security template for client computers named Workstation.inf. The Server.inf template contains hundreds of settings, including file and registry permission settings that have inheritance propagation enabled. The Workstation.inf template contains 20 security settings, none of which contain file or registry permissions settings. The resource servers operate at near capacity during business hours. You need to apply the baseline security templates so that the settings will be periodically enforced. You need to accomplish this task by using the minimum amount of administrative effort and while minimizing the performance impact on the resource servers. What should you do? ()
第7题:
Set the appropriate local password policies for all computers on which SQL Server is installed.
Set the server authentication mode of all SQL Server instances to Windows Authentication mode.
Install all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.
Create SQL Server logins that have CHECK_POLICY enabled.
第8题:
steering
timing
turning
running
第9题:
implementing the safety and environmental protection policy of the Company
preparing procedures to respond to emergency situations
verifying that specified requirements are observed
reviewing the SMS and reporting its deficiencies to the shore based management
第10题:
All the instances, including the ASM instance, are shut down in the ABORT mode
The ASM instance is shut down, but the other instances are still running
The ASM instance is still functional, but the other instances are shut down
All the instances, including the ASM instance, are shut down in the IMMEDIATE mode.
HRDB, FINDB, and ORGDB instances are shut down in the ABORT mode and the ASM instance is shut down in the IMMEDIATE mode
HRDB, FINDB, and ORGDB instances are shut down in the NORMAL mode and the ASM instance is shut down in the IMMEDIATE mode
第11题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions
第12题:
If the SHUTDOWN IMMEDIATE command is issued to the ASM instance, the ASM instance immediately shuts down.
If the SHUTDOWN ABORT command is issued to the ASM instance, the ASM instance will shut down all the database instances and then shut down immediately.
If the SHUTDOWN NORMAL command is issued to the ASM instance, before shutting down, the ASM instance waits for the dependent database instances to shut down.
If the SHUTDOWN TRANSACTIONAL command is issued to the ASM instance, the ASM instance passes the same SHUTDOWN command to the dependent database instances, but does not wait for any active transactions to complete before it shuts down.
第13题:
A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page. Which of the following methods should an administrator use to BEST comply with this policy?()
第14题:
The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()
第15题:
A large company would like to roll out thin clients to all retail terminals on its next upgrade. Which of the following are potential risks of this IT plan?()
第16题:
Which of the following options is true about shutting down an Automatic Storage Management (ASM) instance?()
第17题:
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()
第18题:
A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.
A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.
One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.
A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.
A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.
第19题:
Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.
Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.
Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.
Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.
Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.
第20题:
Setup the new file server and shut down the legacy servers.
Remove all the DNS entries for the legacy servers.
Create a logon script to remap the old file shares to the new file shares.
Go to each users computer, remove all shares and setup the new shares.
第21题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第22题:
Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.
Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.
Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.
Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.
Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.
第23题:
Configure an Event Viewer subscription.
Increase the maximum log size.
Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).
Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object(GPO).
第24题:
The ASM instance is shut down, but the other instances are still running.
It results in an error because other database instances are connected to it.
All the instances, including the ASM instance, are shut down in the IMMEDIATE mode.
HRDB, FINDB, and ORGDB instances are shut down in the ABORT mode and the ASM instance is shut down in the IMMEDIATE mode.