单项选择题
A. Move Peter's account to HelUsers. Create a Group Policy object (GPO) and link it to HelUsers. In the GPO, decrease the account lockout duration.
B. Make TempUsers a child of HelUsers. Create a Group Policy object (GPO) and link it to HelUsers. In the GPO, decrease the account lockout threshold.
C. Modify the properties of Peter's user account so the Logon Hours setting is the same as the business hours for the Helsinki office.
D. Modify the properties for Peter's user account to extend the dates during which his account can be used.
单项选择题 You are the network administrator for your companys Active Directory domain. The domain includes Windows Server 2003 domain controllers and Windows XP Professional client computers. A new administrator named Paul is hired to assist you in deploying Windows XP Professional to 100 new computers. Paul installs the operating system on a new computer named Client1. However, when Paul tries to log on to the domain from Client1, he is unsuccessful. The logon dialog box does not allow him to view and select the domain name. You need to ensure that Paul can log on to the domain from Client1. What should you do? ()
单项选择题 You are the network administrator for your company. The network consists of a single Active Directory domain. All five domain controllers run Windows Server 2003, and all client computers run Windows XP Professional. The domains audit policy ensures that all account logon events are audited. A temporary employee named Peter uses a client computer named Client1. When Peters temporary assignment concludes, his employment is terminated. Now you need to learn the times and dates when Peter logged on to the domain. You need to accomplish this goal by reviewing the minimum amount of information. What should you do?()
单项选择题 You are the network administrator for your company. The network consists of a single Active Directorydomain. All domain controllers run Windows Server 2003. All client computers run Windows XP Professional with default settings. Some users have portable computers, and the rest have desktop computers.You need to ensure that all users are authenticated by a domain controller when they log on.How should you modify the local security policy? ()