单项选择题
A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers.
Which technology should the team choose?()
A. Starter GPOs
B. Group Policy Objects
C. Software Restriction Policies
D. AppLocker
相关考题
-
单项选择题
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed. You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13. Which of the following actions should you take?()
A. You should consider making use of the Winrs.exe command.
B. You should consider making use of the Winsat.exe command.
C. You should consider making use of the Winpop.exe command.
D. You should consider making use of the Dsrm.exe command. -
单项选择题
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01. You need to add an RODC to the domain by using the Install From Media (IFM) option. Which tool should you use to create the media?()
A. the ntdsutil command
B. the Set-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. the Set-ADForest cmdlet -
多项选择题
You have a server named Server1 that runs Windows Server 2012 R2. You configure IPSec rules for connections to Server1. On Server1, you plan to create an inbound firewall rule that contains the following settings: Allows inbound connections to an application named App1.exe Applies to the domain profile Overrides any block rules You need to identify the minimum information required to create the rule. Which two pieces of information should you identify? Each correct answer presents part of the solution.()
A. the list of computers that are authorized to use the application
B. the list of Active Directory users who are authorized to use the application
C. the hash of the application
D. the name of the IPSec policies that apply to Server1
E. the local path of the application
