adplus-dvertising
frame-decoration

Question

Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

a.

Use Performance Monitor to create a log of all logon attempts

b.

Use User Manager for Domains to set an Audit policy for all logon attempts

c.

Use the Services option in Control Panel to start the Alerter service to audit logon attempts

d.

Use server Manager to set an Audit policy for all logon attempts to be on the user's assigned computer only

Posted under Operating System

Answer: (b).Use User Manager for Domains to set an Audit policy for all logon attempts

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Several college interns are working at your company for the summer. You want to increase security by monitoring all user logons. How must you do this?

Similar Questions

Discover Related MCQs

Q. The system administrator wants to make sure that users have access only to certain programs on their systems. Which actions accomplish this?

Q. Assume that you are a user of a Windows NT workstation in the SYCON domain, and the Windows NT workstation has local accounts. You wish to have administrative rights to all Windows NT Advanced Servers in the SYCON domain. How would you achieve this with a minimum amount of administration"?

Q. As the network administrator, you create a new local group in the RESEARCH domain named R-Editors. The LAB domain trusts the RESEARCH domain. You can assign access permissions to the R-Editors group from

Q. With a cell-backplane architecture, the data rate on the backplane is significantly greater than the aggregate data rate of the ports

Q. What is the purpose of the token in a network that employs a media access control method based on the IEEE 802.5 specification?

Q. Server Manager

Q. Bridges introduce small delays into a network.

Q. Bridges offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segment

Q. Your company uses both Ethernet and token-ring LAN's in the same building. Users need access to resources and the ability to transmit data between the LAN's. Which device would you use to enable communications between dissimilar LAN's that use different protocols?

Q. Your 10Base2 Ethernet cable is 185 meters long. You are planning to extend your network by adding another 100 meters of cable. The total length of the cable will be 285 meters. The network uses NetBEUI. Which device should you use?

Q. Each network segment must have a unique address

Q. You create home directories for users Jan and Kim on a Windows NT Server computer. Jan works on a Windows NT Workstation computer. Kim works on a Microsoft Windows for Workgroups computer. After they log on, Jan can access her home directory, but Kim cannot access her home directory. What should you do?

Q. Win32 application programming interfaces is for

Q. Windows explorer program are

Q. When was the first version of internet explorer was introduced

Q. Cut, copy and paste are the features of

Q. Feature of windows include