单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()AConfigure the software restriction policy in the Default Domain Policy Group Policy object (GPO)BCreate a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersCCreate and configure a local security policy on both of the ISA server computersDConfigure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

单选题
You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()
A

Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)

B

Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers

C

Create and configure a local security policy on both of the ISA server computers

D

Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)


参考解析

解析: 暂无解析

相关考题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()A、You must set up an IP Block list.B、You must set up sender filtering.C、You must set up managed folders.D、You must build a transport rule

As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A、 Audit policy settingsB、 Software deployment needsC、 Client operating systems in useD、 Delegation of administrative authority

You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()A、On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs listB、Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accountsC、Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call centerD、Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

Your network contains a single Active Directory domain. All client computers run Windows Vista  Service Pack 2 (SP2).     You need to prevent all users from running an application named App1.exe.     Which Group Policy settings should you configure()A、Application CompatibilityB、AppLockerC、Software InstallationD、Software Restriction Policies

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settingsB、On all computers in the domain, configure the Local Security Policy7 with the required account policy settingsC、Configure the Default Domain Policy GPO with the required account policy settingsD、Configure the Default Domain Controllers Policy GPO with the required account policy settings

You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()A、Microsoft System Center Operations ManagerB、Microsoft System Center Virtual Machine ManagerC、Microsoft System Center Data Protection ManagerD、Microsoft System Center Configuration Manager

You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()A、 Configure the Sales OU to block inheritance.B、 Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.C、 Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.D、 Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()A、Acct-Session-IdB、Acct-Status-TypeC、ClassD、NAS-Identifier

You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A、 Configure Software Restriction Policies Group Policy settings.B、 Configure the Enable user control over installs Group Policy setting.C、 Assign all approved applications.D、 Publish all approved applications.

You need to recommend a solution for deploying and managing App2. What should you recommend?() A、Publish App2 as a RemoteApp program.B、Deploy App2 by using a Group Policy logon script.C、Assign App2 by using Group Policy software distribution.D、Publish App2 by using Group Policy software distribution.

You need to recommend a solution for managing App1. The solution must require the minimum  amount of administrative effort.What should you include in the recommendation?()A、Group Policy Administrative TemplatesB、Group Policy PreferencesC、Group Policy Software SettingsD、Windows Remote Management (WinRM)

As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required. Which factor necessitates the need for a second-level OU structure?()A、Audit policy settingsB、Software deployment needs  C、Client operating systems in useD、Delegation of administrative authority

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a localgroup from starting a specific application. You must achieve this goal by using the minimum amount ofadministrative effort.  What should you create?()A、administrative template.B、application control policy.C、IPSec policy.D、software restriction policy.

You need to design a password policy that meets business requirements. What should you do? Select all that apply.()A、Increase the number of passwords that are rememberedB、Disable reversible encryptionC、Set the minimum password age to zero daysD、Increase the maximum password age

单选题You need to design security for messages exchanged between Northwind Traders employees and its vendors. What should you do?()ARequire employees to access e-mail only over connections that use SSLBPlace Exchange mailbox stores on NTFS volumes. Use Encrypting File System (EFS) to encrypt the storesCUse the internal certification authority (CA) to issue certificates to all employees. Require employees to digitally sign outbound e-mailDUse the internal certification authority (CA) to issue certificates to all employees and vendors. Instruct employees and vendors to use secure MIME to encrypt all e-mail sent between them

单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()AUse Internet Explorer Administration Kit (IEAK) and Group Policy.BUse Microsoft System Center Configuration Manager.CUse Windows Server Update Services (WSUS).DUse Microsoft System Center Essentials.

单选题You need to design a patch management strategy that meets business requirements. What should you do?()AInstall Systems Management Server (SMS) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the SMS client software to all computers in the domainBInstall Microsoft Operations Manager (MOM) on a computer on the internal network. Use the Default Domain Policy GPO to distribute the MOM client software to all computers in the domainCInstall Software Update Services (SUS) on a Web server, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the Web server. Ensure that users restart their client computers dailyDInstall Software Update Services (SUS) on a domain controller, and configure it to synchronize and approve updates nightly. Configure client computers to receive automatic updates from the domain controller. Ensure that users restart their client computers daily

多选题You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()AOn each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs listBUsing NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accountsCDesign a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call centerDDesign a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

单选题Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()AAcct-Session-IdBAcct-Status-TypeCClassDNAS-Identifier

单选题You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()A Configure the Sales OU to block inheritance.B Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.C Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.D Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

单选题As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()A Audit policy settingsB Software deployment needsC Client operating systems in useD Delegation of administrative authority

单选题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()ACreate a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types listBCreate a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exeCConfigure Windows Script Host to not execute Windows Script Component file typesDConfigure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)

单选题You need to design the deployment of antivirus software. What should you do?()AInstall the antivirus software on each mailbox storage serverBInstall the antivirus software on each Outlook Web Access serverCInstall the antivirus software on one Outlook Web Access server at each officeDInstall the antivirus software on a back-end server that contains no mailboxes

单选题Your company uses Remote Desktop Services (RDS). You install and configure the Remote Desktop Gateway (RD Gateway) role service on a server that runs Windows Server 2008 R2. Employees connect to RDS from unmanaged remote computers. Employees are unable to access the RD Gateway server from the unmanaged remote computers.You need to ensure that employees can access the RD Gateway server. What should you do?()ACreate a Remote Desktop resource authorization policy (RD RAP).BCreate a Remote Desktop connection authorization policy (RD CAP).COn the RD Gateway server, open port 3389 on the Windows Firewall.DOn the RD Gateway server, configure Network Access Protection (NAP) health policy checking.