单项选择题
You need to identify each help desk user who bypasses the new corporate security policy.
What should you do?()
A.Configure Audit Special Logon and define Special Groups.
B.Configure Audit Other Privilege Use Events and define Special Groups.
C.Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.
D.Configure Audit Object Access and modify the auditing settings for the HelpDesk group.
相关考题
-
单项选择题
You need to protect the confidential data files on File2 against unauthorized offline access. What should you use?()
A.Encrypting File System (EFS) on File2
B.file screens on Node1 and Node2
C.NTFS permissions on File2
D.Windows BitLocker Drive Encryption (BitLocker) on Node1 and Node2 -
单项选择题
YouneedtorecommendaVPNsolutionforthenewsalesoffice.Thesolutionmustsupportthecompany'splannedchangs. Whatshouldyouincludeintherecommendation?()
A.Internet Key Exchange version 2 (IKEv2)
B.Layer 2 Tunneling Protocol (L2TP)
C.Point-to-Point Tunneling Protocol (PPTP)
D.Secure Socket Tunneling Protocol (SSTP) -
单项选择题
You need to recommend a solution for monitoring the servers. The solution must meet the company’s technical requirements What should you include in the recommendation?()
A.Data Collector Sets (DCSs)
B.event subscriptions
C.Reliability Monitor
D.Windows System Resource Manager (WSRM)
