Which of the following is the task that you should execute on your computer?

You work as the help desk support technician at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com.
Domain.com has its headquarters in Chicago and a branch office in Dallas. All client computers on the Domain.com network run Windows XP Professional. You are currently stationed at the Dallas office, whose computers all have the Compatws.inf security template applied to it.
The security requirements for users at the Dallas office differ from the security requirements for users at the Chicago office. When the network administrator at Domain.com’s Chicago office sends you a new security template named HighDskSec.inf, you have to discover whether the new security template will conflict with the security requirements for the users at the Dallas office.
Which of the following is the task that you should execute on your computer?

You work as the help desk support technician at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com.
Domain.com has its headquarters in Chicago and a branch office in Dallas. All client computers on the Domain.com network run Windows XP Professional. You are currently stationed at the Dallas office, whose computers all have the Compatws.inf security template applied to it.
The security requirements for users at the Dallas office differ from the security requirements for users at the Chicago office. When the network administrator at Domain.com’s Chicago office sends you a new security template named HighDskSec.inf, you have to discover whether the new security template will conflict with the security requirements for the users at the Dallas office.
Which of the following is the task that you should execute on your computer?

A.
Place HighDskSec.inf in the WindowsSystem folder and run Resultant Set of Policy (RSoP) in logging mode.

B.
Place HighDskSec.inf in the WindowsSystem folder and run the gpresult command.

C.
Use Security Configuration and Analysis to import HighDskSec.inf into a security database, and then perform the Analyze operation.

D.
Run the secedit /validate command and specify HighDskSec.inf as the file to be validated.

Explanation:
You can use the Security Configuration and Analysis MMC snap-in to quickly and easily compare the current security configuration with a security configuration that is stored in a database. You can create a database that contains a preferred level of security, and then run an analysis that compares the current configuration with the settings in the database.



Leave a Reply 0

Your email address will not be published. Required fields are marked *