找考题网-背景图
单项选择题

You need to design a method to configure the servers in the development department to meet the requirements of the chief information officer. What should you do?()

A.Use error reporting on all servers in the development department to report errors for a custom application
B.Configure all servers in the development department so that they do not require the CTRL+ALT+DELTE keys to pressed in order to log on interactively to the server
C.Create a Group Policy object (GPO) and link it to the development department’s Servers OU. Configure the GPO with an interactive logon policy to display a message for users who attempt to log on
D.Configure the screen saver on all servers in the development department to require a password

热门试题

单项选择题Youneedtodesignanaccesscontrolstrategythatmeetsbusinessandsecurityrequirements.Yoursolutionmustminimizeforestwidereplication.Whatshouldyoudo?()

A.Create a global group for each department and a global group for each location. Add users to their respective departmental groups as members. Place the departmental global groups within the location global groups. Assign the location global groups to file and printer resources in their respective domains, and then assign permissions for the file and printer resources by using the location global groups
B.Create a global group for each department, and add the respective users as members. Create domain local groups for file and printer resources. Add the global groups to the respective domain local groups. Then, assign permissions to the file and printer resources by using the domain local groups
C.Create a local group on each server and add the authorized users as members. Assign appropriate permissions for the file and printer resources to the local groups
D.Create a universal group for each location, and add the respective users as members. Assign the universal groups to file and printer resources. Then, assign permissions by using the universal groups

单项选择题You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy.  What should you do?()

A.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application uses
B.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registry
C.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computer
D.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file