ANALYZING A COMPUTER IN THIS PROCEDURE, YOU USE THE SECURITY CONFIGURA...

1. After receiving the security templates from the consultant, you examine one of

them by creating a new database in the Security Configuration And Analysis snap-

in on one of your Web servers, importing the new security template into the data-

base, and performing an analysis. While examining the results of the analysis, you

notice that there are quite a few discrepancies between the security settings you

have configured on the computer and the settings in the template. You decide that

you want to use a combination of the settings in the template and the settings you

have already configured on the computer. Which of the following procedures

should you use to create a composite security configuration and implement it on

all your Web servers?

a. In the new database you created, modify the values of the policies corre­

sponding to the template settings you want to use. Then export the database

to a new template and apply it to the Web servers’ organizational unit object.

b. In the new database you created, modify the values of the policies corre­

sponding to the current computer settings you want to use. Then export the

database to a new template and apply it to the Web servers’ organizational

unit object.

c. Export the database to a new template without making any changes and

apply it to the Web servers’ organizational unit object.

d. Use the Secedit.exe program to apply only the individual policy settings from

the template you want to use on the Web servers.