Information Technology Reference
In-Depth Information
4.
Crystal is a system administrator for an Active Directory environment that is running in
Native mode. Recently, several managers have reported suspicions about user activities and
have asked her to increase security in the environment. Specifically, the requirements are as
follows:
The accessing of certain sensitive files must be logged.
Modifications to certain sensitive files must be logged.
System administrators must be able to provide information about which users accessed
sensitive files and when they were accessed.
All logon attempts for specific shared machines must be recorded.
Which of the following steps should Crystal take to meet these requirements? (Choose all
that apply.)
A. Enable auditing with the Computer Management tool.
B. Enable auditing with the Active Directory Users and Computers tool.
C. Enable auditing with the Active Directory Domains and Trusts tool.
D. Enable auditing with the Event Viewer tool.
E. View the audit log using the Event Viewer tool.
F. View auditing information using the Computer Management tool.
G. Enable failure and success auditing settings for specific files stored on NTFS volumes.
H.
Enable failure and success auditing settings for logon events on specific computer
accounts.
5.
You create a GPO and link it to the Sales OU. You want to monitor users in the Sales OU
who connect to the file server. What type of auditing do you enable?
A.
Audit Object Access
B.
Audit Logon Events
C.
Audit System Events
D.
Audit Process Tracking
Search WWH ::




Custom Search