网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()
A

Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types list

B

Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exe

C

Configure Windows Script Host to not execute Windows Script Component file types

D

Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)


参考答案

参考解析
解析: 暂无解析
更多 “单选题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()A Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types listB Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exeC Configure Windows Script Host to not execute Windows Script Component file typesD Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)” 相关考题
考题 All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the R&D group. You need to ensure that members of the R&D group are not allowed to upgrade the software. What should you do?()A.Create an Audit only restriction based on the version of the software.B.Create an Audit only restriction based on the publisher of the software.C.Create an Enforce rule restriction based on the version of the software.D.Create an Enforce rule restriction based on the publisher of the software.

考题 Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()A、software installation in Group PolicyB、startup scripts in Group PolicyC、Microsoft Application Virtualization (App-V)D、baseline Windows 7 image that includes the custom application

考题 You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A、Create a script that installs the Hisecdc.inf security templateB、Use a GPO to distribute and apply the Hisec.inf security templateC、Use the System Policy Editor to configure each server’s security settingsD、Use a GPO to distribute and apply a custom security template

考题 You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A、 Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B、 Compress the folder in which the downloaded updates are stored.C、 Configure Server1 to store only the locales that are needed.D、 Download the updates, and then delete updates that are not approved for client computers.

考题 You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A、Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B、Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C、Create and configure a new security template. Import the template into the local policy on VPN2D、Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 You need to design a method for junior IT administrators to perform more IT support tasks. Your solution must meet business and security requirements. What should you do?()A、Delegate appropriate Active Directory permissions to the junior IT administratorsB、Add the junior IT administrators’ user accounts to the Domain Admins user groupC、Create a custom Microsoft Management Console (MMC) that uses taskpad views to enable the appropriate tasks for the junior IT administratorsD、Make the junior IT administrators’ domain user accounts member of the local Administrators group on all client computersE、Create new domain user accounts for each junior IT administrator. Make the new accounts members of the Domain Admins group and instruct junior IT administrators to use the new accounts only for appropriate administrative tasks

考题 All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The RD department staff are local administrators on their computers and are members of the RD global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the RD group. You need to ensure that members of the RD group are not allowed to upgrade the software. What should you do?()A、Create an Audit only restriction based on the version of the software.B、Create an Audit only restriction based on the publisher of the software.C、Create an Enforce rule restriction based on the version of the software.D、Create an Enforce rule restriction based on the publisher of the software.

考题 You need to design a method to address the chief information officer’s security concerns. What should you do?()A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB、Use the gpresult commandC、Use Mbsacli.exeD、Configure software restriction policy options in the Default Domain Policy GPO

考题 You are developing a custom-collection class.You need to create a method in your class. You need to ensure that the method you create in your class returns a type that is compatible with the Foreach statement. Which criterion should the method meet?()A、The method must return a type of either IEnumerator or IEnumerable.B、The method must return a type of IComparable.C、The method must explicitly contain a collection.D、The method must be the only iterator in the class.

考题 You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()A、 Configure the Sales OU to block inheritance.B、 Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.C、 Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.D、 Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

考题 You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A、 Configure Software Restriction Policies Group Policy settings.B、 Configure the Enable user control over installs Group Policy setting.C、 Assign all approved applications.D、 Publish all approved applications.

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You have an Exchange Server 2010 organization named contoso.com.Your company acquires a company named Fabrikam, Inc. You plan to create new mailboxes for each user from Fabrikam.You need to ensure that each new mailbox can receive e-mail messages sent to fabrikam.com.The solution must not prevent the organization from receiving e-mails sent to contoso.com. What should you do?()A、Create an accepted domain and then create a new e-mail address policy.B、Create a remote domain and then modify the default e-mail address policy.C、Create a Receive connector and then create a managed folder mailbox policy.D、Modify the default accepted domain and then modify the default e-mail address policy.

考题 You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()A、Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types listB、Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exeC、Configure Windows Script Host to not execute Windows Script Component file typesD、Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)

考题 You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A、Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB、Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC、Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD、Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You need to design a method to standardize and deploy a baseline security configuration for servers. You solution must meet business requirements. What should you do?()A Create a script that installs the Hisecdc.inf security templateB Use a GPO to distribute and apply the Hisec.inf security templateC Use the System Policy Editor to configure each server’s security settingsD Use a GPO to distribute and apply a custom security template

考题 单选题You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A Permit administrators to use an HTTP interface to manage servers remotelyB Permit only administrators to connect to the servers’ Telnet serviceC Permit administrators to manage the servers by using Microsoft NetMeetingD Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 单选题You need to recommend a solution to ensure that all of the client computers that run Windows 7 meet the company’s security requirements.   What should you include in the recommendation?()A Encrypted File System (EFS)B the AppLocker Group Policy settingsC the IPSec enforcement methodD Windows BitLocker Drive Encryption (BitLocker)

考题 单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()A Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)B Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersC Create and configure a local security policy on both of the ISA server computersD Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

考题 单选题All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The RD department staff are local administrators on their computers and are members of the RD global security group. A new version of a business software application is available on the network. You plan to apply an AppLocker security policy to the RD group. You need to ensure that members of the RD group are not allowed to upgrade the software. What should you do?()A Create an Audit only restriction based on the version of the software.B Create an Audit only restriction based on the publisher of the software.C Create an Enforce rule restriction based on the version of the software.D Create an Enforce rule restriction based on the publisher of the software.

考题 单选题You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()A  Configure the Sales OU to block inheritance.B  Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.C  Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.D  Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

考题 单选题You need to design a security strategy for VPN2. Your solution must meet business requirements. What should you do?()A Create and configure a new security template. Import the template into the Default Domain Policy Group Policy object (GPO)B Install Internet Authentication Service (IAS) on RAS1. Configure VPN2 to be the RADIUS client of RAS1. Configure the remote access policy on VPN2C Create and configure a new security template. Import the template into the local policy on VPN2D Move VPN2 into the VPN Servers OU. Configure the remote access policy on VPN2

考题 单选题You need to design an authentication strategy for users of portable computers. Your solution must meet business requirements. What should you do?()A Issue smart cards and smart card readers to all portable computer users. Configure the domain to require smart cards for login and to log off users who remote their smart cardsB Configure the portable computers to connect to only wireless networks that use Wired Equivalent Privacy (WEP). Install digital certificates on all portable computersC Install computer certificates on all portable computers. Configure all portable computers to respond to requests for IPSec encryptionD Install biometric authentication devices on all portable computers. Configure the Default Domain Policy GPO to require complex passwords for all users

考题 单选题You have an Exchange Server 2010 organization named contoso.com.Your company acquires a company named Fabrikam, Inc. You plan to create new mailboxes for each user from Fabrikam.You need to ensure that each new mailbox can receive e-mail messages sent to fabrikam.com.The solution must not prevent the organization from receiving e-mails sent to contoso.com. What should you do?()A Create an accepted domain and then create a new e-mail address policy.B Create a remote domain and then modify the default e-mail address policy.C Create a Receive connector and then create a managed folder mailbox policy.D Modify the default accepted domain and then modify the default e-mail address policy.

考题 单选题You are a security administrator for your company. All servers run Windows Server 2003. All client computers run Windows XP Professional.    You install Software Update Services (SUS) on a server named Server1. The company’s written security policy states that all updates must be tested and approved before they are installed on network computers.    You need to ensure that SUS uses the minimum amount of disk space on Server1.  What should you do?()A  Configure Server1 to redirect client computers to the Microsoft Windows Update servers.B  Compress the folder in which the downloaded updates are stored.C  Configure Server1 to store only the locales that are needed.D  Download the updates, and then delete updates that are not approved for client computers.

考题 单选题You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain.  What should you do next?()A  Configure Software Restriction Policies Group Policy settings.B  Configure the Enable user control over installs Group Policy setting.C  Assign all approved applications.D  Publish all approved applications.

考题 单选题You need to design a method to address the chief information officer’s security concerns. What should you do?()A Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPOB Use the gpresult commandC Use Mbsacli.exeD Configure software restriction policy options in the Default Domain Policy GPO

考题 单选题You need to design a method to ensure that only scripts that are approved by the IT department can run on company computers. Your solution must meet business requirements. What should you do?()A Create a new software restriction policy in the Default Domain Policy GPO that removes the Microsoft Visual Basic Scripting Edition and the Windows Script Component file types from the File Types listB Create a new software restriction policy in the Default Domain Policy GPO that disables the use of Wscript.exe and Cscript.exeC Configure Windows Script Host to not execute Windows Script Component file typesD Configure Windows Script Host to execute only scripts that are signed by a certificate issued by an approved certification authority (CA)