单项选择题
An administrator is investigating an incident where an unauthorized user gained access to a servera nd modified HR files.The administrator has a tested theory as to how the user accomplished this.Which of the following actions should the administrator take NEXT?()
A.Perform a root cause analysis.
B.Implement a change to the servers.
C.Establish a plan of action to resolve the issue.
D.Question users prior to implementing the solution.
相关考题
-
单项选择题
WhichofthefollowingcommandsshouldtheadministratorruntocheckiftheSMTPservicesarestill active?()
A. Telnet <Server name>
25
B. Ping <Server name>
C. net send<Server name> test mail
D. nbtstat a <Server name> -
单项选择题
RAID 5 can be BEST described as which of the following?()
A. Mirroring with striping
B. Striping with dedicated parity
C. Striping with distributed parity
D. Independent disks with shared parity -
单项选择题
Auserrequestsaccesstoanewfileshare.Theadministratoraddstheusertothegroupwiththe appropriateaccess.Theuserisstillunabletoaccesstheshare.Whichofthefollowingactions shouldtheadministratordotoresolvethepermissionsissue?()
A.Request the user to logoff and log back on.
B.Add the user as an administrator on their local machine.
C.Add the user as an administrator on the server.
D.Run an ipconfig /renew on the user’s machine.
