单项选择题
You have 30 NT 4.0 machines and 5 W2k Pro machines on your network. You want to share files on the W2kPro machines that only they can access. The NT 4 machines must not be able to access those shared files at all? ()
A.You should import hisecws.inf security template.
B.You should import hisecdc.inf security template.
C.You should import securews.inf security template.
D.You should import compatws.inf security template.
相关考题
-
单项选择题
You are responsible for migrating client computers from Windows 98 and Windows NT Workstation 4.0 to Windows 2000 Professional. You have installed Windows 2000 Professional and reinstalled the necessary application on 10 computers. You have returned these computers to their users. The users of these computers report that their word processing application will not start. What should you do?()
A.Set the permission on the application to Execute.
B.Add the application to the Run key in the registry.
C.Apply the Securews.inf security template on the users’ computers.
D.Apply the compatws.inf security template on the users’ computers. -
单项选择题
Duringstartup,aWindows2000ProfessionalcomputerinyourofficeproceedsdirectlytothedesktopwithoutfirstpromptingforausernameandpasswordfirstYouneedtoenforcelogonrequirements.Whatshouldyoudo?()
A.Change the Netlogon service startup setting to manual.
B.Disable the disable CTRL+ALT+DEL requirement for logon option in the local group policy.
C.In control panel, modify the startup and recovery settings in the system option.
D.In control panel, add the appropriate user accounts to the users and passwords setting. -
单项选择题
You are the administrator of your companys network. You want to configure a Security Policy for the Windows 2000 Professional Computers that are in the sales department. On one of the computers, you use Security Templates to configure the Security Policy based on the desired security settings. You then export those settings to an .inf file that will be used on all of the Computers in the sales department. You want to configure each Computer to have a customized Security Policy. What steps should you follow in order to achieve your goal?()
A.Use Secedit.exe to import the security settings from the .inf file to the computers in the sales department.
B.Use a text editor to change the default security settings to the desired security settings. Then export those settings to the Computers in the sales department.
C.Create an organizational unit (OU) named Sales. Add the users in the sales department to the Sales OU. Then apply the security template to the users in the Sales OU.
D.Create an organizational unit (OU) named Sales. Add the computers in the sales department to the Sales OU. Then apply the security template to computers in the Sales OU.
