You need to design a software usage policy for the employees

题目
单选题
You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()
A

Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)

B

Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computers

C

Create and configure a local security policy on both of the ISA server computers

D

Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

As part of your design, you are evaluating whether a second-level organizational unit (OU) structure is required.  Which factor necessitates the need for a second-level OU structure?()

  • A、 Audit policy settings
  • B、 Software deployment needs
  • C、 Client operating systems in use
  • D、 Delegation of administrative authority

正确答案:B

第2题:

Your network contains a single Active Directory domain. All client computers run Windows Vista  Service Pack 2 (SP2).     You need to prevent all users from running an application named App1.exe.     Which Group Policy settings should you configure()

  • A、Application Compatibility
  • B、AppLocker
  • C、Software Installation
  • D、Software Restriction Policies

正确答案:D

第3题:

Your company has a single Active Directory Domain Services (AD DS) domain and 1,000 Windows Vista computers.  You are planning to deploy Windows 7 and a custom application.   You have the following requirements:   The application must be available to only a specific group of users. You must be able to monitor application usage.   You need to design a deployment method for the custom application that meets the requirements.  Which deployment method should you use in your design?()

  • A、software installation in Group Policy
  • B、startup scripts in Group Policy
  • C、Microsoft Application Virtualization (App-V)
  • D、baseline Windows 7 image that includes the custom application

正确答案:C

第4题:

You have a single Active Directory directory service domain. All domain controllers run Windows Server 2003. All client computers run Windows Vista. The computers in the sales department are located in an organizational unit (OU) named Sales. You use a Default Domain Policy to configure company user and computer settings. You configure a software restriction policy for the domain. The policy prevents users from running software that is not approved.  You need to allow computers in the Sales OU to run software that is not approved while maintaining other required settings.  What should you do?()

  • A、 Configure the Sales OU to block inheritance.
  • B、 Create a new software restriction policy that reverses the settings in the Default Domain Policy. Link the new software restriction policy to the Sales OU.
  • C、 Link the software restriction policy to the Sales OU. Disable the user configuration settings of this policy.
  • D、 Link the software restriction policy to the Sales OU. Disable the computer configuration settings of this policy.

正确答案:B

第5题:

You need to design a method to address the chief information officer’s security concerns. What should you do?()

  • A、Configure Windows Management Instrumentation (WMI) filtering options in the Default Domain Policy GPO
  • B、Use the gpresult command
  • C、Use Mbsacli.exe
  • D、Configure software restriction policy options in the Default Domain Policy GPO

正确答案:C

第6题:

You need to design desktop and security settings for the client computers in the Seattle call center. Your solution must be implemented by using the minimum amount of administrative effort.Which two actions should you perform?()

  • A、On each client computer in the call center, configure a local policy that lists only authorized programs in the Allowed Windows Programs list
  • B、Using NTFS permissions, assign the Deny – Read permission for all unauthorized executable files to the client computer domain accounts
  • C、Design a Group Policy object (GPO) that enforces a software restriction policy on all client computers in the call center
  • D、Design a Group Policy object (GPO) that implements an IPSec policy on all client computers in the call center. Ensure that the IPSec policy rejects connections to any Web servers that the company does not operate

正确答案:C,D

第7题:

You need to design a method to implement account policies that meets the requirements in the written security policy. What should you do?()

  • A、Create a GPO and link it to the New York OU, to the Denver OU, and to the Dallas OU.Configure the GPO with the required account policy settings
  • B、On all computers in the domain, configure the Local Security Policy7 with the required account policy settings
  • C、Configure the Default Domain Policy GPO with the required account policy settings
  • D、Configure the Default Domain Controllers Policy GPO with the required account policy settings

正确答案:C

第8题:

You work as the enterprise exchange administrator at Xxx .Xxx is using Microsoft Exchange Server 2010 as their messaging solution.A new Xxx usage policy prohibits the employees from using certain words in internal e-mail messaging.What actions must you take to have the policy implemented?()

  • A、You must set up an IP Block list.
  • B、You must set up sender filtering.
  • C、You must set up managed folders.
  • D、You must build a transport rule

正确答案:D

第9题:

You are evaluating the implementation of two Hyper-V hosts for the Web servers. You need to design a solution that will move the Web servers automatically between the Hyper-V hosts based on the physical resources available. Which software should you include in the design?()

  • A、Microsoft System Center Operations Manager
  • B、Microsoft System Center Virtual Machine Manager
  • C、Microsoft System Center Data Protection Manager
  • D、Microsoft System Center Configuration Manager

正确答案:A,B

第10题:

Your network contains a Network Policy Server (NPS) named Server1.NPS1 provides authentication for all of the VPN servers on the network.You need to track the usage information of all VPN connections.Which RADIUS attribute should you log?()

  • A、Acct-Session-Id
  • B、Acct-Status-Type
  • C、Class
  • D、NAS-Identifier

正确答案:C

更多相关问题