单项选择题
Your company has an Active Directory domain. You have a server that runs Windows Server 2008. The Terminal Services role is installed on the server.
The company security policy does not allow users to copy and paste information to a local computer during a Terminal Services session.
You deploy the remote application named APP1.
You need to configure Terminal Services to meet the security requirement.
What should you do?()
A.Enable the Use temporary folders per session option.
B.Change the Security Encryption Level to FIPS Compliant.
C.Deselect the Clipboard option in the RDP Settings for the published application.
D.Disable the Drive option in the RDP-Tcp Client Setting properties for the server.
相关考题
-
单项选择题
A server named Server2 runs Windows Server 2008. The Terminal Services server role is installed on Server2. You plan to deploy a new Terminal Services application on Server2. The application vendor confirms that the application can be deployed in a Terminal Services environment. The application does not use Microsoft Windows Installer packages for installation. The application makes changes to the current user registry during installation. You need to install the application to support multiple user sessions. What should you do?()
A.Run the mstsc /v:Server2 /console command from the client computer to log on to Server2. Install the application.
B.Run the change user /execute command on Server2. Install the application and run the change user /install command on Server2.
C.Run the change user /install command on Server2. Install the application and run the change user /execute command on Server2.
D.Run the change logon /disable command on Server2. Install the application and run the change logon /enable command on Server2. -
单项选择题
Your company has a single Active Directory domain. All servers run Windows Server 2008. You install an iSCSI storage area network (SAN) for a group of file servers. Corporate security policy requires that all data communication to and from the iSCSI SAN must be as secure as possible. You need to implement the highest security available for communications to and from the iSCSI SAN. What should you do?()
A.Create a Group Policy object (GPO) to enable the System objects: Strengthen default permission ofinternal systems objects setting.
B.Create a Group Policy object (GPO) to enable the System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing setting.
C.Implement IPsec security in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall.
D.Implement mutual Microsoft Challenge Handshake Authentication Protocol (MS-CHAPv2) authentication in the iSCSI Initiator Properties. Set up inbound and outbound rules by using Windows Firewall. -
单项选择题
You have two servers named FC1 and FC2 that run Windows Server 2008 Enterprise Edition. Both servers have the Failover Clustering feature installed. You configure the servers as a two-node cluster. The cluster runs an application named APP1. Business hours for your company are 09:00 to 17:00. APP1 must be available during these hours. You configure FC1 as the preferred owner for APP1. You need to prevent failback of the cluster during business hours. What should you do?()
A.Set the Period option to 8 hours in the Failover properties.
B.Set the Allow failback option to allow failback between 17 and 9 hours in the Failover properties.
C.Enable the Prevent failback option in the Failover properties.
D.Enable the If resource fails, attempt restart on current node policy for all APP1 resources. Set the maximum restarts for specified period to 0.
