多项选择题
A. On the domain, grant Mikhail the permission to manage user objects.
B. On the domain, grant Mikhail the permission to manage InetOrgPerson objects.
C. On the Sales OU, block the inheritance of permissions.
D. On the Marketing OU, block the inheritance of permissions.
E. On the Dev OU, block the inheritance of permissions
单项选择题 You have a single Active Directory directory service domain. All user accounts in the sales department are in an organizational unit (OU) named Sales. Your company has five public computers that are members of the domain. You notice a sales tracking application on one of the public computers. You verify that this application is assigned to users in the Sales OU through a Group Policy object (GPO). You need to ensure that when sales department users log on to the public computers, the applications that are assigned to the Sales OU are not made available on the public computers. What should you do?()
多项选择题 You have a single Active Directory directory service forest named contoso.com. You create baseline security settings for a group of computers, and you store the settings in a database. You deploy thebaseline security settings. You need to confirm that the security settings on one of the computers are applied correctly. What are two possible commands that you can run to achieve this goal?()
单项选择题 You are the network administrator for your company. The network consists of a single Active Directory domain that contains four domain controllers. All servers run Windows Server 2003. All user accounts are located in an organizational unit (OU) named CompanyUsers. A written company policyrequires all users to use strong passwords. User passwords must contain a mixture of letters, numbers, or special characters. Passwords must be at least 10 characters long. Passwords must be changed at least every 60 days, and the new password cannot be the same as the old one. To enforce this requirement, you create a Group Policy object (GPO) named Password Policies and link the GPO to the CompanyUsers OU. The settings in the Password Policy section of the Password Policies GPO are shown in the exhibit. (Click the Exhibit button.) You discover that users are creating simple passwords that do not meet the complexity requirements. You need to ensure that the company password requirements are enforced. What should you do?()