Question: Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?
Options:
A. | Use Performance Monitor to create a log of all logon attempts | |
B. | Use User Manager for Domains to set an Audit policy for all logon attempts | |
C. | Use the Services option in Control Panel to start the Alerter service to audit logon attempts | |
D. | Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only | |
E. | None of the above |
Answer: Option B
Submit Answer & Explaination
Earn Reward Points by submitting Detailed Explaination for this Question
More Questions on This Topic :
Question 1. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?
- Run User Manager for Domains on any Windows NT Advanced Server in the SYCON domain. Open the Domain Admins group. In the List Names From box choose your workstation and add your workstation user accou
- Add your user account to the local Administrators group on each workstation in the SYCON domain
- Add your user account to the Domain Admins group on any Windows NT Advanced Server in the SYCON domain
- Add your user account to the Administrators group on each Windows NT Advanced Server in the SYCON domain
- None of the above
Answer: Option A
Question 2. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from
- any Windows NT Workstation computer in the LAB domain
- any Windows NT Workstation computer in the RESEARCH domain -
- any Windows NT Server backup domain controller in the LAB domain
- any Windows NT Server backup domain controllers in the RESEARCH domain
- None of the above
Answer: Option D
Question 3. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports
- True
- FALSE
- The station that hold the token has the highest priority on the network
- A token contains information that is used to route messages between rings
- None of the above
Answer: Option A
Question 4. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?
- Create a mandatory user profile and lock all the program groups
- Create a mandatory user profile that disables the Run command, assign this profile to all users and remove File Manager from the Main group
- Create a mandatory user profile and ensure that the Deny All option is set on all of the files that the user should not be able to access
- Delete WINFILEJEXE from the WINNT directory create a mandatory user profile that disables the File menu in Program Manager, and assign the profile to all users
- None of the above
Answer: Option B
Question 6. You have been given the task of installing cables for an Ethernet network in your office. The building is an older one, and-you have limited work space. In addition, the network cable will have to share the existing conduit with telephone cable, and cable segments will be up to 135 meters in length. Which cable is best suited to this installation?
- Fiber Optic
- Category 1 UTP
- Category 3 UTP
- Thicknet Coaxial
- None of the above
Answer: Option C
Check all Questions in this Topic : Click HERE
Topics
10th Grade11th And 12th11th Grade - Commerce12th Grade - Commerce4th Grade5th Grade6th Grade7th Grade8th Grade9th GradeAccountingAptitudeBanking AwarenessBusiness ManagementC ProgramCatChemical EngineeringCivil EngineeringCommunication SkillsComputer FundamentalComputer FundamentalsComputer ScienceCssDatabaseEconomicsElectrical EngineeringEnglishEnglish Verbal AbilityGeneral AptitudeGeneral KnowledgeGstHrmHtmlIasJava ProgramJavascriptMarketingMechanical EngineeringMs ExcelMs WordNetworkingOperating SystemPhp ProgramPower PointQuantitative AptitudeReasoningSqlTally
Recent Questions
Q. Product Of Two Odd Functions Is....Q. The Most Abundant Rare Gas In The Atmosphere Is....Q. Which Of The Following Statements Regarding The United Natio....Q. What Is The Middle Name Of Ashish Nehra?....Q. What Is The Other Way Of Calling The Error Console In Firefo....Q. Pick Up The Commonly Adopted Geophysical Method In Civil Eng....Q. __________ Calorimeter Is Normally Used For Measuring The Dr....Q. What Is The Length Of North - Eastern Frontier Railway (NEFR....Q. Gas Released During Photosynthesis Is....Q. The Value Of (0.98)3 + (0.02)3 + 3 × 0.98 × 0.02 - 1 Is :....Q. A Square Hole Is Punched Out Of A Circular Lamina, The Diago....Q. __________ Base Crude Oil Is Also Called Asphaltic Crude.....Q. the Average Age Of Four Players Is 18.5 Years. If The Age ....Q. The Word Biophilia Was Coined By....Q. Which Device Can Not Be Shared In Network?....Q. A Higher Pair Has__________.....Q. Basic Shaft Is One....Q. The Value Of Gas Constant (r) In S. I. Units Is....Q. The Strength Of A Riveted Joint Is Equal To....Q. XMLHttpRequesr Is A....