找考题网-背景图
多项选择题

A.Add www.southridgevideo.com to the Trusted Sites list……

You are a help desk technician for your company. All users have Windows XP Professional computers. A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department. You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer. 
Which two actions should you perform next?()



A.Add www.southridgevideo.com to the Trusted Sites list.
B.Remove www.southridgevideo.com from the Restricted Sites list. 
C.In the Internet zone settings, enable the Allow unsigned ActiveX controls option. 
D.Open the Local intranet Sites dialog box and clear the Include all network paths check box. 
E.Open the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.
F.Open the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.

热门试题

单项选择题You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message:  Your account is configured to prevent you from using this computer. Please try another computer.  Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?()

A.On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer. 
B.On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting to 1, and restart the computer. 
C.In the domain, modify Marc's Logon Workstations list to include the name of the computer.
D.In the domain, modify Marc's account properties to unlock the account. 

单项选择题You are the desktop administrator for one of your companys branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the companys main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the companys Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?()

A.Run the Secedit.exe command in validation mode and specify the new security template.
B.Run the Secedit.exe command in configuration mode and specify the new security template. 
C.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation. 
D.Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.