{"id":2078,"date":"2010-04-19T09:19:23","date_gmt":"2010-04-19T01:19:23","guid":{"rendered":"http:\/\/www.killtest.com.tw\/?p=2078"},"modified":"2010-05-27T18:06:35","modified_gmt":"2010-05-27T10:06:35","slug":"70-290-4","status":"publish","type":"post","link":"https:\/\/www.killtest.com.tw\/?p=2078","title":{"rendered":"70-290 \u984c\u5eab\u66f4\u65b0\u8cc7\u8a0a"},"content":{"rendered":"<p>MCSE <a href=\"http:\/\/www.killtest.net\/MCSA2003\/70-290.asp\" target=\"_blank\">70-290<\/a>\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be670-290\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dMCSE 70-290(Managing and Maintaining a Microsoft Windows Server 2003 Environment)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u300270-290\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u58f9\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002<\/p>\n<p>1. You are a network administrator for your company. The network consists of a single Active Directory<br \/>\ndomain.<br \/>\nA user named Mary works in the information technology (IT) security department. Mary is a member of the<br \/>\nITSecurity global group. Mary reports that no one in the ITSecurity global group can access the security<br \/>\nlog from the console of a computer named Server1.<br \/>\nYou need to grant the ITSecurity global group the minimum rights necessary to view the security log on<br \/>\nServer1.<br \/>\nHow should you modify the local security policy?<br \/>\nA. Assign the Generate security audits user right to the ITSecurity global group.<br \/>\nB. Assign the Manage auditing and security logs user right to the ITSecurity global group.<br \/>\nC. Assign the Allow logon through Terminal Services user right to the ITSecurity global group.<br \/>\nD. Assign the Act as part of the operating system user right to the ITSecurity global group.<br \/>\nAnswer: B<br \/>\n2. You are the domain administrator for your company&#8217;s Active Directory domain. All client computers run<br \/>\nWindows 2000 Professional.<br \/>\nYou recently deployed 10 new servers that run Windows Server 2003. You placed the servers in a new<br \/>\norganizational unit (OU) named W2K3Servers.<br \/>\nAnne is another network administrator.<br \/>\nYou need to configure the appropriate permissions to allow Anne to manage the new servers by using<br \/>\nTerminal Services from her client computer. You need to assign Anne only the permissions she needs to<br \/>\nperform her job.<br \/>\nWhat should you do?<br \/>\nA. Add Anne&#8217;s user account to the local Power Users group on each server that runs Windows Server<br \/>\n2003.<br \/>\nB. Add Anne&#8217;s user account to the Remote Desktop Users group on each server that runs Windows<br \/>\nServer 2003.<br \/>\nC. Assign Anne&#8217;s user account the Allow &#8211; Read and the Allow &#8211; Write permissions for the W2K3Servers<br \/>\nOU.<br \/>\nD. Configure the Managed By property for the W2K3Servers OU to Anne&#8217;s user account<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MCSE 70-290\u8003\u8a66\u984c\u5eab\u7531KillTest\u8a8d\u8b49\u984c\u5eab\u7db2\u8cc7\u6df1IT\u8a8d\u8b49\u8b1b\u5e2b\u548cMCSE\u7522\u54c1\u5c08\u5bb6\u7d50\u5408PROMETRIC\u6216VUE\u7684\u771f\u5be670-290\u8003\u8a66\u74b0\u5883\u6700\u65b0\u539f\u984c\u50be\u5fc3\u6253\u9020\u3002\u984c\u5eab\u8986\u84cb\u4e86\u7576\u524d\u6700\u65b0\u7684\u771f\u5be6\u8003\u984c\uff0c\u4e26\u4e14\u5168\u90e8\u9644\u6709\u6b63\u78ba\u7b54\u6848\uff0c\u6211\u5011\u627f\u8afe\u984c\u5eab\u5c0dMCSE 70-290(Managing and Maintaining a Microsoft Windows Server 2003 Environment)\u8003\u8a66\u539f\u984c\u5b8c\u6574\u8986\u84cb\u300270-290\u984c\u5eab\u52a9\u60a8\u8f15\u9b06\u901a\u904e\u8a8d\u8b49\u8003\u8a66\uff0c\u58f9\u6b21\u4e0d\u904e\u5168\u984d\u9000\u6b3e\u3002 1. You are a network administrator for your company. The network consists of a single Active Directory domain. A user named Mary works in the information technology (IT) security department. Mary is a member of the ITSecurity global group. Mary reports that no one [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[327],"tags":[224,572,560],"class_list":["post-2078","post","type-post","status-publish","format-standard","hentry","category-70-290-microsoft","tag-70-290","tag-70-290-"],"_links":{"self":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2078","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2078"}],"version-history":[{"count":7,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2078\/revisions"}],"predecessor-version":[{"id":2185,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2078\/revisions\/2185"}],"wp:attachment":[{"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.killtest.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}