找考题网-背景图
单项选择题

You are the network administrator for The network consists of a single Active Directory domain named
The TestKing Staff department has a Windows 2003 computer that functions as a file server. The computer contains a folder named TestKingData. Auditing is enabled on the TestKingData folder. The TestKing Staff department reports that confidential files were deleted from the folder.
You need to identify the user who deleted the confidential files.
What should you do?()

A. In Event Viewer, create a new log view from the security log. Filter the log view to display only success audits.
B. In Event Viewer, create a new log view from the security log. Filter the log view to display only failure audits.
C. In Event Viewer, create a new log view from the system log. Filter the log view to display only success audits.
D. In Event Viewer, create a new log view from the system log. Filter the log view to display only failure audits.

热门试题

单项选择题You are the network administrator for the Berlin office of The company network consists of a single Active Directory domain named The Berlin office contains 15 file servers that contain confidential files. All the file servers run either Windows Server 2003 or Windows 2000 Server. All the file servers are in the BerlinFilePrint organizational unit (OU). TestKings security department sets a rule that specifies the size and retention settings for the Security event log of all file servers. The rule also specified that local administrators on servers cannot override the changes you make to the settings for the Security event log. You need to define a method to modify the Security event log settings on each file server in the Berlin office in order to meet the states requirements. What should you do?()

A. Modify the local security policy on each file server.Define the size and retention settings for the Security event log.
B. Create a security template on one of the file servers by using the Security Configuration and Analysis tool. Define the size and retention settings for the Security event log in the template. Import the security template into the local security policy of the other 14 file servers.
C. Use Event Viewer to modify the event log properties on each file server. Define the size and retention settings for the Security event log.
D. Create a new Group Policy object (GPO) and link it to the BerlinFilePrint OU. In the GPO, define the size and retention settings for the Security event log.

单项选择题Exhibit: You are the network administrator for The network consists of a single Active Directory domain named All servers run Windows Server 2003. All client computers run Windows XP Professional. Users in the human resources department are members of a domain user group named TestKingHR. You create and share a folder named TestKingHRFiles on a member server named TestKing4. You configure permissions on the TestKingHRFiles as shown in the exhibit. Marie, a user in the human resources department, create a file in TestKingHRFiles. At Maries request, you assign the Deny - Delete special permission on her file to the HR Group. The next day, Veronika reports that her file is deleted. You need to reconfigure the permissions on TestKingHRFiles. You must fulfil the following requirements: 1. Members of the TestKingHR group must be able to read, create, and modify files. 2. Members of the TestKingHR group must not be able to delete files on which they have no access permission. 3. Members of the TestKingHR group must not be able to delete files that they do not have permission to delete. What should you do?()

A. In the share permissions, assign the Deny - Change permission to the TestKingHR group.
B. In the NTFS permissions, assign the Allow - Read permission to the TestKingHR group.
C. In the share permissions, assign the Allow - Read permission to the TestKingHR group.
D. In the NTFS permissions, assign the Allow - Modify permission to the TestKingHR group.