What should you do?

You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com.
Due to company growth CertKiller employs contractual workers to ease the work load. The contractual employees are members of a global group named PartTimeUsers. There are four file servers on the network that is configured to run Windows server 2008. These servers hold the confidential information of the company in shared folders.
To prevent unauthorized users of accessing these file servers you decide to place them in an organizational unit (OU). This OU is named CKSecure. A new Domain.com security policy requires that any attempts by contractual workers to access the confidential information needs to be recorded. You need to identify a way to accomplish this.
What should you do? (Choose all that apply.)

You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com.
Due to company growth CertKiller employs contractual workers to ease the work load. The contractual employees are members of a global group named PartTimeUsers. There are four file servers on the network that is configured to run Windows server 2008. These servers hold the confidential information of the company in shared folders.
To prevent unauthorized users of accessing these file servers you decide to place them in an organizational unit (OU). This OU is named CKSecure. A new Domain.com security policy requires that any attempts by contractual workers to access the confidential information needs to be recorded. You need to identify a way to accomplish this.
What should you do? (Choose all that apply.)

A.
You should ensure that the file servers are added to the auditing tab on all the shared folders of the four file servers.

B.
You should ensure that PartTimeUsers is added to the Auditing tab on all the shared folders of the four file servers.

C.
You should ensure that a GPO is created and linked to CKSecure.

D.
You should ensure that a GPO is created and linked to CKSecure.

Explanation:
Thereafter the Failed Full control setting should be configured in the Auditing Entry dialog box.
Thereafter the Failed Full control setting should be configured in the Auditing Entry dialog box.
Thereafter the Audit object access Failure audit policy setting should be configured.
Thereafter the Audit privilege use Failure audit policy setting should be configured.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


mr_tienvu

mr_tienvu

I agree with the answer. BC