当前位置:MCSE(70-291)题库

问题:

[单选]

You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All client computers in the domain run Windows XP Professional. An application named Inventory.exe is installed on all computers in the domain to remotely gather software inventory information. The application runs as a service in the security context of the Local System. The startup type of the service is set to Automatic.In the Default Domain Policy Group Policy object (GPO), the security administrator has configured a software restriction policy that is applied to all computers in the domain. The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. The client computers on the network are attacked by a worm that is distributed by e-mail messages received over the Internet. The worm detects the presence of Inventory.exe on a computer, then starts a new instance of the application in the security context of the logged-on user. The worm exploits a bug in the application to cause the computer to fail.You need to ensure that Inventory.exe cannot be started by the worm, while still allowing the application to run as a service.  
What should you do?()

A . In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
B . In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
C . In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a hash rule for the Inventory.exe application. Configure the hash rule with a security level of Disallowed.
D . In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.

在现金需要总量既定的前提下,现金持有量越多,则现金持有成本越高、现金转化成本也相应越高。 You are the administrator of your company's network. Your network has 20 Windows 2000 server computers in the contoso.com domain. Your network also has 250 Windows 98 computers. You want to perform a clean installation of Windows 2000 Professional on all of the Windows 98 computers. All of the Windows 98 computers are identical models and are PXE complaint.   You want to accomplish the following goals:   • An unattended installation of Windows 2000 Professional will be performed.  • An unattended installation of company's standard applications will be performed during the     installation of Windows 2000 Professional.  • Each computer will be assigned a unique security identifier description.  • The unattended installation script will be modified so that the computers automatically join the    contoso.com domain.   You take the following actions:  • Install Windows 2000 Professional on a Windows 98 computer named computer1. • Install and configure computer standard applications on computer1.  • Use Setup Manager on computer1 to create an unattended.txt file based on the current    configuration including domain membership.  • Start the remaining Windows 98 computers and then install Windows 2000 Professional. Use    the unattended.txt file to provide the setting for the installation.   Which result or results do these actions produce?()  An unattended installation of Windows 2000 Professional will be performed.。  An unattended installation of company’s standard applications will be performed during the   Installation of Windows 2000 Professional.。  Each computer will be assigned a unique security identifier description.。  The unattended installation script will be modified so that the computers automatically join the  contoso.com domain.。 You are developing a Windows Presentation Foundation (WPF) application. You need to use XAML to create a custom control that contains two Button controls. From which base class should you inherit? () FrameworkElement。 UIElement。 UserControl。 Butto。 在Photoshop中,()工具可以用来擦除指定的颜色,指定的颜色显示为背景色。 魔术橡皮擦。 橡皮擦。 涂抹工具。 背景色橡皮擦。 高炉煤气的一氧化碳含量是23%-30%,其爆炸极限是()%。 4~36。 35~72。 12~75。 7~75。

You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All client computers in the domain run Windows XP Professional. An application named Inventory.exe is installed on all computers in the domain to remotely gather software inventory information. The application runs as a service in the security context of the Local System. The startup type of the service is set to Automatic.In the Default Domain Policy Group Policy object (GPO), the security administrator has configured a software restriction policy that is applied to all computers in the domain. The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. The client computers on the network are attacked by a worm that is distributed by e-mail messages received over the Internet. The worm detects the presence of Inventory.exe on a computer, then starts a new instance of the application in the security context of the logged-on user. The worm exploits a bug in the application to cause the computer to fail.You need to ensure that Inventory.exe cannot be started by the worm, while still allowing the application to run as a service.  
What should you do?()

参考答案:

  参考解析

本题暂无解析

相关题目:

在线 客服