Reflection With Correct Answers 2024|
2025
You are the network administrator for your company. Rodney, a user in the research
department, shares a computer with two other users. One day, Rodney notices that
some of his documents have been deleted from the computer's local hard drive. You
restore the documents from a recent backup. Rodney now wants you to configure the
computer, so he can track all users who delete his documents in the future.
You enable auditing of successful object access events in the computer's local security
policy. Rodney then logs on and creates a sample document. To test auditing, you then
log on and delete the document. However, when you examine the computer's security
log, no auditing events are listed.
How can you make sure an event is listed in the security log whenever one of Rodney's
documents is deleted? CORRECT ANSWERS Edit the advanced security properties of
the folder containing Rodney's documents. Configure an auditing entry for the Everyone
group. Configure the entry to audit the success of the Delete permission.
You are the security administrator for your organization. Your multiple-domain Active
Directory forest uses Windows servers for domain controllers and member servers. The
computer accounts for your member servers are located in the Member Servers OU.
Computer accounts for domain controllers are in the Domain Controllers OU. Computer
accounts for workstations are located in the Workstations OU.
You are creating a security template that you plan to import into a GPO.
What should you do to log whenever a user is unable to log on to any computer using a
domain user account? (Select two. Each choice is a required part of the solution.)
CORRECT ANSWERS Link the GPO to the Domain Controllers OU.
Enable the logging of failed account logon events.
You are the network administrator for your company. All computers are joined to a
single Active Directory domain. Several computers store sensitive information.
You are configuring security settings that will be distributed to all computers on your
network. You want to identify attempts to break into a computer by having the computer
that denies the authentication attempt note the failed attempt in its security database.
How can you create a policy that meets these requirements? CORRECT ANSWERS
Select Audit Failure for the enabled audit policy.
You are an administrator for a company that uses Windows servers. In addition to
Active Directory, you provide file and print services, DHCP, DNS, and email services.
There is a single domain and a single site. There are two member servers, one that
handles file and print services only and one database server. You are considering
adding additional servers as business increases.