单选题It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the foll

题目
单选题
It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the following is a possible solution?()
A

Make a daily announcement to remove all disks before departing for the day.

B

Change the Boot order in the BIOS.

C

Make it a part of the evening checks to ensure all disks are removed.

D

Make a company policy that states that it is unlawful to leave disks in the machines.


相似考题

3. You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?() A、On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. B、On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. C、In the domain, modify Marc's Logon Workstations list to include the name of the computer.D、In the domain, modify Marc's account properties to unlock the account. 

更多“It is a company’s policy to shut down all workstations at th”相关问题
  • 第1题:

    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

    • A、 the business knowledge of the IT staff
    • B、 the technical knowledge of the IT staff
    • C、 the company’s business objectives
    • D、 the company’s network topology
    • E、 the IT future directions

    正确答案:C

  • 第2题:

    Which of the following would allow a company to conserve energy and still provide a functional service to its employees?()

    • A、Configure all workstations with higher RPM fans
    • B、Use CRTs instead of LCD monitors
    • C、Use NAS to reduce the number of file servers
    • D、Configure all printers to print on single-side with low resolution

    正确答案:C

  • 第3题:

    It is a company’s policy to shut down all workstations at the end of the day. However, the majority of employees are leaving disks in their workstations and upon start up the next morning they are receiving a ‘NTLDR is missing’ error. Which of the following is a possible solution?()

    • A、Make a daily announcement to remove all disks before departing for the day.
    • B、Change the Boot order in the BIOS.
    • C、Make it a part of the evening checks to ensure all disks are removed.
    • D、Make a company policy that states that it is unlawful to leave disks in the machines.

    正确答案:B

  • 第4题:

    A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()

    • A、 Setup the new file server and shut down the legacy servers.
    • B、 Remove all the DNS entries for the legacy servers.
    • C、 Create a logon script to remap the old file shares to the new file shares.
    • D、 Go to each users computer, remove all shares and setup the new shares.

    正确答案:C

  • 第5题:

    Which two statements regarding the Policy Framework in Enterprise Manager (EM) are correct?()

    • A、Policy violations are prioritized as High, Medium, or Informational by category 
    • B、Policies can be disabled completely, or flagged as ignored, for the specified target 
    • C、Policies can be flagged as ignored, but never completely disabled, for the specified target
    • D、Policy violations must be corrected, otherwise the database will shut down until corrective action occurs

    正确答案:A,B

  • 第6题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. The domain contains an organizational unit (OU) named Servers that contains all of the company’s Windows Server 2003 resource servers. The domain also contains an OU named Workstations that contains all of the company’s Windows XP Professional client computers.   You configure a baseline security template for resource servers named Server.inf and a baseline security template for client computers named Workstation.inf. The Server.inf template contains hundreds of settings, including file and registry permission settings that have inheritance propagation enabled. The Workstation.inf template contains 20 security settings, none of which contain file or registry permissions settings.  The resource servers operate at near capacity during business hours.   You need to apply the baseline security templates so that the settings will be periodically enforced. You need to accomplish this task by using the minimum amount of administrative effort and while minimizing the performance impact on the resource servers.   What should you do?  ()

    • A、 Create a Group Policy object (GPO) and link it to the domain. Import both the Server.inf and the Workstation.inf templates into the GPO.
    • B、 Import both the Server.inf and the Workstation.inf templates into the Default Domain Policy Group Policy object (GPO).
    • C、 On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Create a Group Policy object (GPO) and link it to the Workstations OU. Import the Workstation.inf template into the GPO.
    • D、 On each resource server, create a weekly scheduled task to apply the Server.inf settings during off-peak hours by using the secedit command. Import the Workstation.inf template into the Default Domain Policy Group Policy object (GPO).

    正确答案:C

  • 第7题:

    多选题
    You need to ensure that the company’s standard password policy is enforced for all logins that areused to access SQL Server 2005.Which two actions should you perform?()
    A

    Set the appropriate local password policies for all computers on which SQL Server is installed.

    B

    Set the server authentication mode of all SQL Server instances to Windows Authentication mode.

    C

    Install all instances of SQL Server 2005 on computers that run Windows Server 2003 or later.

    D

    Create SQL Server logins that have CHECK_POLICY enabled.


    正确答案: A,C
    解析: 暂无解析

  • 第8题:

    单选题
    After "F.W.E" is given, the air system is shut down, the () gear put in, all drains and indicator cocks opened, and the cooling water kept running.
    A

    steering

    B

    timing

    C

    turning

    D

    running


    正确答案: C
    解析: 暂无解析

  • 第9题:

    单选题
    The Company should clearly define and document the master’s responsibility with regard to all the following items except().
    A

    implementing the safety and environmental protection policy of the Company

    B

    preparing procedures to respond to emergency situations

    C

    verifying that specified requirements are observed

    D

    reviewing the SMS and reporting its deficiencies to the shore based management


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    You have three production databases, HRDB, FINDB, and ORGDB, that use the same ASM instance. At the end of the day, you execute the following command on the ASM instance to shut down: SQL> shutdown immediate; What is the result of executing this command?()
    A

    All the instances, including the ASM instance, are shut down in the ABORT mode

    B

    The ASM instance is shut down, but the other instances are still running 

    C

    The ASM instance is still functional, but the other instances are shut down 

    D

    All the instances, including the ASM instance, are shut down in the IMMEDIATE mode. 

    E

    HRDB, FINDB, and ORGDB instances are shut down in the ABORT mode and the ASM instance is shut down in the IMMEDIATE mode 

    F

    HRDB, FINDB, and ORGDB instances are shut down in the NORMAL mode and the ASM instance is shut down in the IMMEDIATE mode


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following options is true about shutting down an Automatic Storage Management (ASM) instance?()
    A

     If the SHUTDOWN IMMEDIATE command is issued to the ASM instance, the ASM instance immediately shuts down.

    B

     If the SHUTDOWN ABORT command is issued to the ASM instance, the ASM instance will shut down all the database instances and then shut down immediately.

    C

     If the SHUTDOWN NORMAL command is issued to the ASM instance, before shutting down, the ASM instance waits for the dependent database instances to shut down.

    D

     If the SHUTDOWN TRANSACTIONAL command is issued to the ASM instance, the ASM instance passes the same SHUTDOWN command to the dependent database instances, but does not wait for any active transactions to complete before it shuts down.


    正确答案: C
    解析: 暂无解析

  • 第13题:

    A companys computer policy dictates that all users workstations must use the companys corporate web page as their default home page.  Which of the following methods should an administrator use to BEST comply with this policy?()

    • A、 Configure a logon script to set the homepage at logon.
    • B、 Set the default homepage to the corporate website in Group Policy.
    • C、 Manually configure the homepage on all workstations and setup trace logs to ensure compliance.
    • D、 Set the default homepage to the corporate website on the base computer image.

    正确答案:B

  • 第14题:

    The security team has implemented new guidelines on how to handle sensitive information storedon workstations based on a past incident involving information found on donated workstations.Which of the following should be completed by technicians before donating the workstations?()

    • A、Install a new operating system
    • B、Delete users’ data before donation
    • C、Write the drive with 1’s and 0’s three times
    • D、Delete all partitions of the hard drive

    正确答案:C

  • 第15题:

    A large company would like to roll out thin clients to all retail terminals on its next upgrade. Which of the following are potential risks of this IT plan?()

    • A、Power consumption;thin clients use more energy than comparable workstations and therefore have a larger energy footprint.
    • B、Single point of failure;if the thin client server goes down all machines are without functionality.
    • C、Centralized administration;IT staff cannot rely on localized group policy settings.
    • D、High cost of terminals;compared to traditional workstations,thin clients are very expensive and require more maintenance.

    正确答案:B

  • 第16题:

    Which of the following options is true about shutting down an Automatic Storage Management (ASM) instance?()  

    • A、 If the SHUTDOWN IMMEDIATE command is issued to the ASM instance, the ASM instance immediately shuts down.
    • B、 If the SHUTDOWN ABORT command is issued to the ASM instance, the ASM instance will shut down all the database instances and then shut down immediately.
    • C、 If the SHUTDOWN NORMAL command is issued to the ASM instance, before shutting down, the ASM instance waits for the dependent database instances to shut down.
    • D、 If the SHUTDOWN TRANSACTIONAL command is issued to the ASM instance, the ASM instance passes the same SHUTDOWN command to the dependent database instances, but does not wait for any active transactions to complete before it shuts down.

    正确答案:C

  • 第17题:

    ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

    • A、Run the net view command.
    • B、Run the gpresult command.
    • C、Use the IP Security Monitor console.
    • D、Use the IPSec Policy Management console.

    正确答案:C

  • 第18题:

    单选题
    You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as the administrator of a SQL Server 2005 computer, and the computer is named SQL1. Microsoft Windows Server 2003 is run by all servers. All the servers belong to a Microsoft Active Directory domain. According to the company written security policy, strong passwords are mandated for all domain, local, and application accounts. The company utilizes a Group Policy object (GPO) to deploy the proper domain password policy. MS-DOS-based or UNIX-based operating systems are run by many of the company’s computers. Varying levels of access to a database named Services on SQL1 is requested by the computers. Since you are the database administrator, you are required to confirm that the Services database can be accessed by these computers. And the company’s written security policy should not be violated.  Which action should be performed by you?()
    A

    A domain account should be created for each of the company’s users. And then, each domain account should be offered with access to SQL1 and the Services database.

    B

    A local logon account should be created on SQL1 for each of the company’s users. And then, each logon account should be offered with access to SQL1 and the Services database.

    C

    One SQL Server logon account should be created for all of the company’s computers running MS-DOS or UNIX-based operating systems. And then, the Enforce password policy option should be enabled for users’ accounts. At last, the logon accounts should be provided with access to the Services database.

    D

    A SQL Server logon account should be created for each of the company’s users. And then, the Enforce password policy option should be enabled for each logon account. At last, each logon account should be offered with access to the Services database.

    E

    A virtual directory should be configured through Internet Information Services (IIS) for access to SQL1. And then, users should be directed to the virtual directory for data access.


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    You are the administrator of a SQL Server 2005 computer named SQL1. All servers run Microsoft Windows Server 2003 and belong to a Microsoft Active Directory domain. The companys written security policy mandates strong passwords for all domain, local, and application accounts. The appropriate domain password policy has been deployed through the use of a Group Policy object (GPO). Many of the company’s computers run MS-DOS-based or UNIX-based operating systems. These computers require varying levels of access to a database named Services on SQL1. You need to ensure that these computers can access the Services database without violating the company’s written security policy.  What should you do?()
    A

    Create a domain account for each of the company’s users. Provide each domain account with access to SQL1 and the Services database.

    B

    Create a local logon account on SQL1 for each of the company’s users. Provide each logon account with access to SQL1 and the Services database.

    C

    Create a SQL Server logon account for each of the company’s users. Enable the Enforce password policy option for each logon account. Provide each logon account with access to the Services database.

    D

    Configure a virtual directory through Internet Information Services (IIS) for access to SQL1. Direct users to the virtual directory for data access.

    E

    Create one SQL Server logon account for all of the company’s computers running MS-DOS or UNIX-based operating systems. Enable the Enforce password policy option for users’ accounts. Provide the logon accounts with access to the Services database.


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A company is deploying a new file server to consolidate shares from several legacy servers. Which of the following is the BEST method to ensure that the new file shares are being used?()
    A

     Setup the new file server and shut down the legacy servers.

    B

     Remove all the DNS entries for the legacy servers.

    C

     Create a logon script to remap the old file shares to the new file shares.

    D

     Go to each users computer, remove all shares and setup the new shares.


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    You are the senior systems engineer for your company. The network consists of a single Active Directory domain.  All servers run Windows Server 2003. Client computers in the sales department run Windows NT Workstation 4.0 with the Active Directory Client Extensions software installed. All other client computers run Windows XP Professional. All servers are located in an organizational unit (OU) named Servers. All client computers are located in an OU named Desktops.   Four servers contain confidential company information that is used by users in either the finance department or the research department. Users in the sales department also store files and applications on these servers. The company’s written security policy states that for auditing purposes, all network connections to these resources must require authentication at the protocol level. The written security policy also states that all network connections to these resources must be encrypted. The company budget does not allow for the purchase of any new hardware or software. The applications and data located on these servers may not be moved to any other server in the network.   You define and assign the appropriate permissions to ensure that only authorized users can access the resources on the servers.   You now need to ensure that all connections made to these servers by the users in the finance department and in the research department meet the security guidelines stated by the written security policy. You also need to ensure that all users in the sales department can continue to access their resources.   Which two actions should you take?()
    A

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Secure Server (Require Security) IPSec policy in the GPO.

    B

    Create a new Group Policy object (GPO) and link it to the Servers OU. Enable the Server (Request Security) IPSec policy in the GPO.

    C

    Create a new Group Policy object (GPO) and link it to the Desktops OU. Enable the Client (Respond only) IPSec policy in the GPO.

    D

    Create a new Group Policy object (GPO). Edit the GPO to enable the Registry Policy Processing option and the IP Security Policy Processing option. Copy the GPO files to the Netlogon shared folder.

    E

    Use System Policy Editor to open the System.adm file and enable the Registry Policy Processing option and the IP Security Policy Processing option. Save the system policy as NTConfig.pol.


    正确答案: E,A
    解析: 暂无解析

  • 第23题:

    单选题
    Your company has a single Active Directory Domain Services (AD DS) forest with a single domain named PassGuide.com.   All client computers run Windows 7.   All client computer accounts are located in the Computers container in the PassGuide.com domain.   You discover that multiple client computers were automatically shut down because the security log was full.   You need to ensure that client computers are not shut down when the security log becomes full.  What should you do?()
    A

    Configure an Event Viewer subscription.

    B

    Increase the maximum log size.

    C

    Modify the event log policy settings in the Default Domain Policy Group Policy object (GPO).

    D

    Modify the event log policy settings in the Default Domain Controllers Policy Group Policy object(GPO).


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You have three production databases, HRDB, FINDB, and ORGDB, that use the same ASM instance. At the end of the day, while all three production database instances are running, you execute the following command on the ASM instance : SQL> shutdown immediate; What is the result of executing this command?()
    A

    The ASM instance is shut down, but the other instances are still running.

    B

    It results in an error because other database instances are connected to it.

    C

    All the instances, including the ASM instance, are shut down in the IMMEDIATE mode.

    D

    HRDB, FINDB, and ORGDB instances are shut down in the ABORT mode and the ASM instance is shut down in the IMMEDIATE mode.


    正确答案: B
    解析: 暂无解析