2008年10月20日

MS2274 U4

1. Data for you corporate intranet is currently stored on the D:drive of your IIS server. It is decided that the HR department will serve information about the company benefits and policies from its server, and that the URL to access the HR information should be http://intranet.contoso.com.hr. What do you need to configure?

A. A new Web site
B. A new FTP site
C. A virtual directory from file
D. A virtual directory

2. You're setting up a Web site in IIS on Server01. The site's Internet domain name is adatum.com, and the site's home directory is C:\Web\Adatum. Which URL should Internet users use to access files in the home directory of the site?

A. http://server01.web.adatum
B. http://web.adatum.com/server01
C. Http://server01.adatum/home
D. http://server01.adatum.com

3. You want to ensure the highest level of security for your corporate intranet with-out the infrastructure of certificate services. The goal is to provide authentication that is transparent to users, and to allow you to secure intranet resources with the group account existing in Active Directory. All users are within the corporate fire-wall. What authentication method should you choose?

A. Anonymous access
B. Basic authentication
C. Digest authentication
D. Integrated Windows Authentication

4. Users at Contoso Ltd. Use Microsoft Office applications to access resources on Server01. Your job is to moitor Server01 to ensure that permissions are not too restrictive, so that users are not prevented from achieving their assignments. Which log, and which type of event, will provide the information you require?

A. Application log; Success Event
B. Application log; Failure Event
C. Security log; Success Event
D. Security log; Failure Event
E. System log; Success Event
F. System log; Failure Event

5. What are the minimum NTFS permissions required to allow users to open documents and ru programs stored in a shared folder?

A. Full Control
B. Modify
C. Write
D. Read & Execute
E. List Folder Contents

6. Which of the follwing must be done to generate a log of resource access for a file or folder?

A. Configure NTFS permissions to allow the System account to audit resource access.
B. Configure audit entries to specify the types of access to audit.
C. Enable the Audit Privilege Use policy.
D. Enable the Audit Object Access policy

7. Bill complains that he is unable to access the department plan. You open the Security tab for the plan and you find that all permissions on the document are inherited from the plan's parent folder. There is a Deny Read permission assigned to a group to which Bill belongs. Which of the following methods would enable Bill to access the plan?

A. Modify the permissions on the parent folder by adding the permission Bill:Allow Full Control
B. Modify the permissions on the parent folder by adding the permission Bill:Allow Read.
C. Modify the permissions on the plan by adding the permission Bill:Allow Read.
D. Modify the permission on the plan by deselecting Allow Inheritable Permissions, choosing Copy, and removing the Deny permission.
E. Modify permissions on the pan by deselecting Allow Inheritable Permissions, choosing Copy, and adding the permission Bill:Allow Full Control.
F. Remove Bill from the group that is assigned the Deny permission. 

8. Which of the following are valid criteria for a security log filter to identify specific file and folder access events?

A. The date of the event
B. The user that generated the event
C. The type of object access that generated the event
D. Success or failure audit

9. Which of the following tools allows you to administer a share on a remote server?

A. The Shared Folders snap-in
B. Windows Explorer running on the local machine, connected to the remote server's share or hidden drive share.
C. Windows Explorer running on the remote machine in a Terminal Services or Remote Desktop session.
D. The File Server Management console.

10. A folder is shared on a FAT32 volume. The Project Managers group is given Allow Full Control permission. The Project Engineers group is given Allow Read permission. Julie belongs to the Project Engineers group. She is promoted and is added to the Project Managers group. What are her effective permissions to the folder?

Answer: Full Control

11. Bill calls again to indicate that he still cannot access the departmental plan. You use the Effective Permissions tool, select Bills account, and the tool indicates that Bill is, in fact, allowed sufficient permissions. What might explain the discrepancy between the results of the Effective Permissions tool and the issue Bill is reporting?

Answer: The Effective Permissions tool is only an approximation of a user's access. It is possible that a permission entry is Network, that could be denying access. Permissions for logon groups are not evaluated by the Effective Permission tool Or, if you are not logged on as a Domain Admin, you may not be able to read all group memberships, which might skew the resulting permissions report.

12. A folder is shared on a NTFS volume, with the default share permissions. The Project Managers group is given Allow Full Control NTFS permission. Julie, who belongs to the Project Managers group, calls to report problems creating files in the folder. Why can't Julie create files?

Answer: The default share permission in Windows Server 2003 is Everyone: Allow Read permis-sions define the maximum effective permissions for files and folders in the share. The share permission restrict, you would need to modify the share permissions to allow, at a minimum,the Project Managers groups Change permission.

本文属于 MS2274 测试题的一部分,相关测试题如下:
  1. 介绍帐号和资源的管理
  2. 管理用户和计算机帐号
  3. 管理组
  4. 管理资源的访问
  5. 配置打印机
  6. 管理打印
  7. 管理OU中的对象访问
  8. 配置组策略
  9. 用组策略管理用户环境
  10. 介绍Windows Server 2003的安全性


没有评论: