网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers.  Users occasionally change the Internet Explorer settings on individual client computers.  The company wants to maintain a standard Internet Explorer configuration on all client computers.   You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.   What should you do?()
A

Enable User Group Policy loopback processing mode.

B

Use the Group Policy Update utility to refresh Group Policy.

C

Enable Internet Explorer Maintenance Policy Processing in Group Policy.

D

Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers.  Users occasionally change the Internet Explorer settings on individual client computers.  The company wants to maintain a standard Internet Explorer configuration on all client computers.   You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.   What should you do?()A Enable User Group Policy loopback processing mode.B Use the Group Policy Update utility to refresh Group Policy.C Enable Internet Explorer Maintenance Policy Processing in Group Policy.D Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.” 相关考题
考题 All client computers on your company network were recently migrated from Windows XP to Windows 7. Employees use Internet Explorer 8. Each time employees access a Web application, they are prompted to install an add-on. After each installation, the application restarts and prompts the employees to install the add-on again. You need to ensure that employees can run the application. What should you do?()A.Use a script to install the add-on in Windows XP Mode.B.Use a script to run the application in Windows XP Compatibility Mode.C.Add the class identifier of the add-on to the Add-on list in Group Policy.D.Set the Deny all add-ons unless specifically allowed in the Add-on list Group Policy setting to Disabled.

考题 You have a portable computer that runs Windows Vista.You use Windows Internet Explorer 7 to browse to a Web site that is Really Simple Syndication (RSS)-enabled.You need to configure Internet Explorer 7 so that you can view the site’s headlines when the computer is offline.What should you do?()A.AB.BC.CD.D

考题 You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()A、Enable the local Group Policy for auditing object access events that are successful.B、Enable the local Group Policy for auditing object access events that are unsuccessful.C、Enable the local Group Policy for auditing process tracking events that are successful.D、Enable the local Group Policy for auditing process tracking events that are unsuccessful. E、Use Windows 2000 Explorer, to enable auditing for your files.F、Run the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

考题 You plan to use Windows PowerShell scripts to configure system settings when you deploy Windows 7.   You need to ensure that Windows PowerShell scripts will run on the client computers during initial setup.   What should you do?()A、Set the script execution policy to RemoteSigned.B、Set the script execution policy to AllSigned.C、Set the script execution policy to Restricted.D、Use Group Policy preferences.

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP)  deployed on the network. You need to ensure that NAP policies are enforced on portable computers taht  use a wireless connection to access the network. What should you do?()A、 Configure all access points to use 802.1X authenticationB、 Configure all protable computers to use MS-CHAP v2 authenticationC、 Use the Group Policy Management Console to access the wireless group policy settings, and enable the Prevent connections to ad-hoc networks option.D、 Use the Group Policy Management Console to access the wireless group policy settings, and disable the Prevent connections to infrastructure networks option.

考题 You need to back up all of the group policies in a domain.     The solution must minimize the size of the backup.     What should you use()A、the Add-WBSystemState cmdletB、the Group Policy Management consoleC、the Wbadmin toolD、the Windows Server Backup feature

考题 You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings.  What should you do?()A、 Use Resultant Set of Policy (RSoP) in Planning mode.B、 Use Resultant Set of Policy (RSoP) in Logging mode.C、 Use Event Viewer to view the system log.D、 Use Event Viewer to view the application log.

考题 You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A、Use Internet Explorer Administration Kit (IEAK) and Group Policy.B、Use Microsoft System Center Configuration Manager.C、Use Windows Server Update Services (WSUS).D、Use Microsoft System Center Essentials.

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You deploy Windows 7 to the computers that are used by your company’s Web developers.  All Web developer user accounts are in a single organizational unit (OU).   Internet Explorer is blocking pop-up windows for multiple internal Web applications that are hosted on different servers.   You need to use Group Policy to ensure that Internet Explorer does not block pop-up windows for internal Web applications.   What should you do?()A、Add each server to the Intranet zone.B、Add each server to the Trusted Sites zone.C、Enable Compatibility View in Internet Explorer.D、Set the default security setting in Internet Explorer to Medium.

考题 You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application.    You need to find out whether an add-on is the cause of the problem.   What should you do?()A、Start Internet Explorer in No Add-ons mode.B、Reset all Internet Explorer security zones to the default levels.C、Use Group Policy to turn on Internet Explorer 7 Standards mode.D、Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.

考题 You need to create a Password Settings object (PSO).     Which tool should you use()A、Active Directory Users and ComputersB、ADSI EditC、Group Policy Management ConsoleD、Ntdsutil

考题 Your company has Active Directory Certificate Services (AD CS) and Network Access Protection (NAP) deployed on the network.You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network.  What should you do?()A、Configure all access points to use 802.1X authentication.B、Configure all portable computers to use MS-CHAP v2 authentication.C、Use the Group Policy Management Console to access the wireless Group Policy settings, and enable the Prevent connections to ad-hoc networks option.D、Use the Group Policy Management Console to access the wireless Group Policy settings, and disable the Prevent connections to infrastructure networks option.

考题 You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers.  Users occasionally change the Internet Explorer settings on individual client computers.  The company wants to maintain a standard Internet Explorer configuration on all client computers.   You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.   What should you do?()A、Enable User Group Policy loopback processing mode.B、Use the Group Policy Update utility to refresh Group Policy.C、Enable Internet Explorer Maintenance Policy Processing in Group Policy.D、Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.

考题 Your network contains a server named Server1 that runs Windows Server 2012 R2. Server1 is a member of a workgroup. You need to configure a local Group Policy on Server1 that will apply only to non- administrators. Which tool should you use?()A、Server ManagerB、Group Policy Management EditorC、Group Policy ManagementD、Group Policy Object Editor

考题 Your network has client computers that run Windows 7.   A custom Web-based application requires specific security settings.   You need to prevent users from permanently modifying their Internet Explorer browser’s security settings.   What should you do?()A、Use Windows Internet Explorer Maintenance (IEM) extension settings in Preference mode.B、Use Windows Internet Explorer Maintenance (IEM) extension settings in Normal mode.C、Reset the Internet Explorer settings.D、Restore the advanced settings in Internet Explorer.

考题 You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers.  Your company decides to deploy all custom settings by using Group Policy.    You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings.   Which two actions should you perform?()A、 Use the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image.B、 Use the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deploymentimage.C、 Update the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers.D、 Update the Internet Explorer Manage Add-ons settings for all computers.

考题 单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()A Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)B Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersC Create and configure a local security policy on both of the ISA server computersD Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

考题 单选题You deploy Windows 7 and several custom Internet Explorer add-ons to 1,000 client computers. Internet Explorer closes when users run a specific Web application.    You need to find out whether an add-on is the cause of the problem.   What should you do?()A Start Internet Explorer in No Add-ons mode.B Reset all Internet Explorer security zones to the default levels.C Use Group Policy to turn on Internet Explorer 7 Standards mode.D Use Group Policy to disable the Programs tab in Internet Explorer for all client computers.

考题 单选题You are planning to upgrade Internet Explorer.   You have the following requirements:   Create a report that identifies which computers are successfully upgraded. Do not install additional software on the client computers.   You need to design a deployment method that meets the requirements.   What should you do?()A Use Internet Explorer Administration Kit (IEAK) and Group Policy.B Use Microsoft System Center Configuration Manager.C Use Windows Server Update Services (WSUS).D Use Microsoft System Center Essentials.

考题 多选题You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers.  Your company decides to deploy all custom settings by using Group Policy.    You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings.   Which two actions should you perform?()AUse the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image.BUse the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deploymentimage.CUpdate the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers.DUpdate the Internet Explorer Manage Add-ons settings for all computers.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office youconnect the portable computer to a docking station and use Internet Explorer to access the Internetthrough your LAN connection.At home, you configure a new dial-up connection to the Internet. Now when you attempt to access theInternet from the office you are prompted to connect via your dial-up connection. When you cancel thismessage, you can only work offline and cannot access the Internet.You want to maintain your dial-up connection for home use and your ability to access the Internet whenconnected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect to a privatenetwork though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 单选题Your company has active directory certificate services (AD CS) and network access protection (NAP) deployed on the network. You need to ensure that NAP policies are enforced on portable computers that use a wireless connection to access the network. What should you do?()A Configure all access points to use 802.1x authentication.B Configure all protable computers to use MS-CHAP v2 authentication.C Use the group policy management console to access the wireless group policy settings, and enable the prevent connections to ad-hoc network option.D Use the group policy management console to access the wireless group policy settings, and disable the prevent connections to infrastructure networks option.

考题 单选题You use a Windows 2000 Professional portable computer both at the office and at home. In the office you connect the portable computer to a docking station and use Internet Explorer to access the Internet through your LAN connection.  At home, you configure a new dial-up connection to the Internet. Now when you attempt to access the Internet from the office you are prompted to connect via your dial-up connection. When you cancel this message, you can only work offline and cannot access the Internet.  You want to maintain your dial-up connection for home use and your ability to access the Internet when connected to the company LAN. What should you do?()A Reconfigure the dial-up connection to dial-up to a private network.B Create another connection that uses a virtual private network (VPN) to connect a private network though the Internet.C Configure Internet Explorer to automatically detect proxy settings.D Configure Internet Explorer to dial whenever a network connection is not present.

考题 多选题You use a shared Windows 2000 Professional Computer. You notice, that some of your Microsoft Word documents that were on the local hard drive have been deleted. You restore the documents from a recent backup. Now, you want to be able to track all users who access your Word documents in the future. What should you do? ()AEnable the local Group Policy for auditing object access events that are successful.BEnable the local Group Policy for auditing object access events that are unsuccessful.CEnable the local Group Policy for auditing process tracking events that are successful.DEnable the local Group Policy for auditing process tracking events that are unsuccessful.EUse Windows 2000 Explorer, to enable auditing for your files.FRun the diskperf - y command. Use System Monitor to examine the logical I/O counter.  Restart the Computer.

考题 单选题You use Group Policy to standardize Internet Explorer settings on Windows 7 client computers.  Users occasionally change the Internet Explorer settings on individual client computers.  The company wants to maintain a standard Internet Explorer configuration on all client computers.   You need to ensure that the standard Internet Explorer configuration is in place each time users log on to client computers.   What should you do?()A Enable User Group Policy loopback processing mode.B Use the Group Policy Update utility to refresh Group Policy.C Enable Internet Explorer Maintenance Policy Processing in Group Policy.D Use Group Policy to disable the Advanced tab of the Internet Explorer Properties dialog box.

考题 单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You create several new Group Policies. You need to determine the end result of these Group Policies before applying the settings.  What should you do?()A  Use Resultant Set of Policy (RSoP) in Planning mode.B  Use Resultant Set of Policy (RSoP) in Logging mode.C  Use Event Viewer to view the system log.D  Use Event Viewer to view the application log.