Your company security policy requires complex passwords. You

题目
单选题
Your company security policy requires complex passwords. You have a comma delimited file named import.csv that contains user account information. You need to create user account in the domain by using the import.csv file. You also need to ensure that the new user accounts are set to use default passwords and are disabled. What shoulld you do()
A

Modify the userAccountControl attribute to disabled. Run the csvde i k f import.csv command. Run the DSMOD utility to set default passwords for the user accounts.

B

Modify the userAccountControl attribute to accounts disabled. Run the csvde f import.csv command. Run the DSMOD utility to set default passwords for the user accounts.

C

Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utility to set default passwords for the imported user accounts.

D

Modify the userAccountControl attribute to disabled. Run ldifde i f import.csv command. Run the DSADD utility to set passwords for the imported user accounts.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU.  You need to verify that users are connecting to the two servers by using encrypted connections.   What should you do?()

  • A、Run the net view command.
  • B、Run the gpresult command.
  • C、Use the IP Security Monitor console.
  • D、Use the IPSec Policy Management console.

正确答案:C

第2题:

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()

  • A、Run the Secedit /configure /db C:/NewSec.sdb command.
  • B、Run the Secedit /refreshpolicy machine_policy command.
  • C、Copy NewSec.inf to the C:/Windows/Inf folder. 
  • D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. 
  • E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. 
  • F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template. 

正确答案:A,E

第3题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第4题:

You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

  • A、Use Security Templates to correct the setting and export the security file.
  • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
  • C、Use Secedit /RefreshPolicy Machine_Policy command.
  • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

正确答案:C

第5题:

Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the security center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the remote connection until the required updates are installed.

正确答案:C

第6题:

You upgrade all client computers in your network to Windows 2000 Professional. Then you apply the basicwk.inf security template to the computers. Now, none of the users can run the company’s database application. What should you do?()

  • A、Apply the compactws.inf security template to the computers.
  • B、Delete the basicwk.inf security template file from the computers.
  • C、Use the system policy editor to configure a new security policy for the database application.
  • D、For each user account, allow read permission to the database application and in associated files.

正确答案:A

第7题:

You deploy mobile devices that run Microsoft Windows Mobile 5.0 with Microsoft Messaging and Security Feature Pack. A server that runs Microsoft Exchange Server 2003 Service Pack 2 is configured by using the default installation settings.   Company security policy requires a complex password for unlocking the Windows Mobilebased devices.   You need to ensure that the Windows Mobilebased devices that perform Microsoft ActiveSync synchronization meet the company security policy.   Which two actions should you perform?()

  • A、Enter all mobile device users in the Exceptions list.
  • B、Enable the Require both numbers and letters option.
  • C、Enable the Allow access to devices that do not fully support password settings option.
  • D、Enable the Minimum password length (characters) option. Configure a value of 6 or greater.

正确答案:B,D

第8题:

Your network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2008 R2. All servers run Windows Server 2008 R2.   A corporate security policy requires complex passwords for user accounts that have administrator  privileges. You need to design a strategy that meets the following requirements: èEnsures that administrators use complex passwords   èMinimizes the number of servers required to support the solution What should you include in your design?()

  • A、Implement Network Access Protection (NAP).
  • B、Implement Active Directory Rights Management Services (AD RMS).
  • C、Create a new Password Settings Object (PSO) for administrator accounts.
  • D、Create a new child domain in the forest. Move all non-administrator accounts to the new domain.Configure a complex password policy in the root domain.

正确答案:C

第9题:

Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()

  • A、Enable automatic updates on each client.
  • B、Enable the Security Center on each client.
  • C、Quarantine clients that do not have all available security updates installed.
  • D、Disconnect the connection until the required updates are installed.

正确答案:C

第10题:

Your company’s security policy requires complex passwords.   You have a comma delimited file named import.csv that contains user account information. You  need to create user accounts in the domain by using the import.csv file.   You also need to ensure that the new user accounts are set to use default passwords and are  disabled.     What should you do()

  • A、Modify the userAccountControl attribute to disabled. Run the csvde -i -k -f import.csv command. Run the DSMOD utility
  • B、Modify the userAccountControl attribute to accounts disabled. Run the csvde -f import.csv command. Run the DSMOD utility
  • C、Modify the userAccountControl attribute to disabled. Run the wscript import.csv command. Run the DSADD utility
  • D、Modify the userAccountControl attribute to disabled. Run the ldifde -i -f import.csv command. Run the DSADD utility

正确答案:A

更多相关问题