单项选择题
You are the network administrator for your company. The network consists of a single Active Directory domain. The domain includes an organizational unit (OU) named Processing. There are 100 computer accounts in the Processing OU. You create a Group Policy object (GPO) named NetworkSecurity and link it to the domain. You configure NetworkSecurity to enable security settings through the Computer Configuration section of the Group Policy settings. You need to ensure that NetworkSecurity will apply only to the computers in the Processing OU. You need to minimize the number of GPO links.
What should you do?()
A. Link NetworkSecurity to the Processing OU. Disable the User Configuration section of NetworkSecurity.
B. Link NetworkSecurity to the Processing OU. Remove the link from NetworkSecurity to the domain.
C. Modify the discretionary access control list (DACL) for NetworkSecurity to assign all computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.
D. Modify the discretionary access control list (DACL) for NetworkSecurity to assign the Authenticated Users group the Deny - Apply Group Policy permission and to assign all of the computer accounts in the Processing OU the Allow - Read and the Allow - Apply Group Policy permissions.
相关考题
-
多项选择题
You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run either Windows XP Professional or Windows 2000 Professional. All client computer accounts are located in an organizational unit (OU) named Workstation. A written company policy states that the Windows 2000 Professional computers must not use offline folders. You create a Group Policy object (GPO) to enforce this requirement. The settings in the GPO exist for both Windows 2000 Professional computers and Windows XP Professional computers. You need to configure the GPO to apply only to Windows 2000 Professional computers. What are two possible ways to achieve this goal?()
A. Create a WMI filter that will apply the GPO to computers that are running Windows 2000 Professional.
B. Create a WMI filter that will apply the GPO to computers that are not running Windows XP Professional.
C. Create two OUs under the Workstation OU. Place the computer accounts for the Windows XP Professional computers in one OU, and place the computer accounts for the Windows 2000 Professional computers in the other OU. Link the GPO to the Workstation OU.
D. Create a group that includes the Windows XP Professional computers. Assign the group the Deny - Generate Resultant Set of Policy(Logging) permission.
E. Create a group that includes the Windows 2000 Professional computers. Assign the group the Deny - Apply Group Policy permission. -
单项选择题
You have a single Active Directory directory service domain. All servers run Windows Server 2003. You need to specify the list of applications that users are permitted to run. You create a new Group Policy object (GPO) and link it to the domain. What should you do next?()
A. Configure Software Restriction Policies Group Policy settings.
B. Configure the Enable user control over installs Group Policy setting.
C. Assign all approved applications.
D. Publish all approved applications. -
多项选择题
You have two Active Directory directory service forests named contoso.com and fabrikam.com. All users log on to the contoso.com domain. All servers run Windows Server 2003 and are members of the fabrikam.com domain. You create a one-way forest trust in which fabrikam.com is trusting contoso.com. Forest-wide authentication is enabled. You need to provide only selected users with access to a server in the fabrikam.com domain. Which two actions should you perform?()
A. Grant the users the Allowed to Authenticate permission on the computer object representing the server.
B. Grant the users the Modify permission on the computer object representing the server.
C. Change the one-way forest trust to a two-way forest trust.
D. Change the properties of the forest trust from Forest-wide authentication to Selective authentication.
