Which of the following is a service can the staff uses as an alternative of signing in with elevate privileges?

Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to implement stronger authentication measures for the customers, as well as
eliminate IT staff from logging on with high privileges. Mark has various options, but he is required
to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff
uses as an alternative of signing in with elevate privileges?

Mark works as a Network Administrator for TechMart Inc. The company has a Windows-based
network. Mark wants to implement stronger authentication measures for the customers, as well as
eliminate IT staff from logging on with high privileges. Mark has various options, but he is required
to keep the processes easy for the helpdesk staff. Which of the following is a service can the staff
uses as an alternative of signing in with elevate privileges?

A.
Secondary Logon-Run As

B.
Security log

C.
Hardware firewall

D.
Encrypted network configuration

Explanation:
Secondary Logon (Run As) is defined as a starting programs and tools in local administrative context.
Windows secondary logon is used to permit administrators to log on with a non-administrative
account and be able to perform the several administrative tasks without logging off
by using trusted administrative programs in administrative contexts.

Answer B is incorrect. The security log is generated by a firewall or other security device. It is used
to define list of events that could affect the security of data or infrastructure, such as access
attempts or commands, and the names of the users participating in this illegal process.

Answer C is incorrect. Hardware firewall is defined as the important part of the system and network
set-up on a broadband connection. It can be effective with small or no configuration, and is used to
protect every machine on a local network. The hardware firewalls will have at least four network
ports for connecting to other computers. This type of firewall uses packet filtering for checking the
header of a packet in order to check its source and destination. The information obtained in this
manner is compared to a set of predefined or user-created rules and then the packet is forwarded or
dropped.



Leave a Reply 0

Your email address will not be published. Required fields are marked *