which of the following?
You are configuring a complex set of policies in your Windows 2003 Active Directory network. You
have parent and child GPOs. If you do not want the child GPO to inherit policy from the parent
GPO, you would do which of the following?
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
You are in the process of securing several new machine on your Windows 2003 network. To help
with the process Microsoft has defined a set of Security Templates to use in various situations.
Which of the following best describes the Secure Security Templates (SECURE*.INF)?
what mode will NTLMv2 be installed in?
You run an enterprise network for a large company. There are a few isolated branches in the
company, which do not connect to the main network. You wish to increase the security of those
branches by implementing NTLMv2. Since, those branches are in areas of the world where United
States Export
Restrictions are not met, what mode will NTLMv2 be installed in?
What do LM, NTLM, and NTLMv2 use as their Authentication method?
You are working on the configuration of the authentication systems used in your network, and are
considering several different authentication methods for your computer systems. What do LM,
NTLM, and NTLMv2 use as their Authentication method?
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like access to a file, folder, or printer, which of the following options
would you use?
which of the following options would you use?
You are creating a new Auditing and Logging policy for your network. On a Windows 2003 system,
if you wish to audit events like the computer restarting, which of the following options would you
use?
What is the Event ID for a failed attempt at Logon due to an unknown username or bad password?
You are examining the Event IDs in your Windows 2003 network. There have been a large
number of failed attempts at logon in the network. What is the Event ID for a failed attempt at
Logon due to an unknown username or bad password?
Which of the following techniques will allow you to restrict Telnet access as you are required?
You have a Windows Server 2003 that you have been told must be reached by the Internet.
Although you recommend against it, you are instructed to provide Telnet service to authorized
users through this server. In order to increase security by restricting access to the Telnet server,
you choose to restrict access to a single group of users. Which of the following techniques will
allow you to restrict Telnet access as you are required?
What is the Event ID for a failed attempt at Logon due to an account being disabled?
You are examining the Event IDs in your Windows 2003 network. There have been a large
number of failed attempts at logon in the network. What is the Event ID for a failed attempt at
Logon due to an account being disabled?
What is the Event ID for a failed attempt at Logon due to an account having expired?
You are examining the Event IDs in your Windows 2003 network. There have been a large
number of failed attempts at logon in the network. What is the Event ID for a failed attempt at
Logon due to an account having expired?