单项选择题X 纠错
A. to use a proxy server
B. as a replica of Server1
C. as a stand-alone WSUS 3.0 server
D. as an autonomous downstream server
你可能喜欢
单项选择题
A. On each client computer, run Gpupdate /Force.
B. On each client computer, run wuauclt /detectnow.
C. From GPO1, configure the Enable client-side targeting setting.
D. From GPO1, configure the Specify intranet Microsoft update service location setting.
单项选择题
A. Configure a Trace Log by using the File details system provider.
B. Configure a Trace Log by using the Disk input/output system provider.
C. Configure an Alert by using a counter from the Logical Disk performance object.
D. Configure an Alert by using a counter from the Physical Disk performance object.
单项选择题
A. Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
B. Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
C. On each Web server, open the Security Configuration and Analysis snap-in, analyze the computer, and then export the settings.
D. Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
单项选择题
A. Examine the System Event Log on the user’s computer.
B. Examine the System Event Log on both domain controllers.
C. Examine the Security Event Log on both domain controllers.
D. Examine the Application Event Log on the user’s computer.
单项选择题
A. From the Security Templates snap-in, open the hisecdc template. Modify the Retain System Log setting.
B. From the Security Templates snap-in, open the securedc template. Modify the Retain Security Log setting.
C. Open the Default Domain Policy. Modify the Retain System Log setting.
D. Open the Default Domain Controller Policy. Modify the Retain Security Log setting.
单项选择题
A. On ResearchData, enable permission inheritance.
B. On ResearchConfidential.rtf, enable permission inheritance.
C. On ResearchData, assign the Read permission to ResearchUsers.
D. On ResearchConfidential.rtf, assign the Read permission to ResearchUsers.
单项选择题
A. On the CorpData share, assign the Read permission to Domain Users.
B. On the CorpData share, remove Domain Users and assign the Change permission to HRUsers.
C. On the CorporateData folder, disable permission inheritance and remove the inherited permissions.
D. On the HumanResources folder, disable permission inheritance and remove the inherited permissions.
单项选择题
A. Remove User1 from the IT group.
B. Assign the Change permission to User1.
C. Remove User1 from the Domain Users group.
D. Add User1 to the Server Operators group on Server1.
单项选择题
A. Remove the Domain Users group.
B. Change the permission assigned to the Research group to Allow - Read.
C. Remove the Research group. Change the Domain Users permission to Allow - Change.
D. Remove the Research group. Add the ResearchManagers group and assign the group Allow - Change permission.