欢迎来到PP题库网 PP题库官网
logo
全部科目 > 微软认证考试 > MCSE > MCSE(70-298)

单项选择题

You need to design a permission structure for registry objects that enables the legacy application at the resorts to run. Your solution must comply with the written security policy. 
What should you do?()

    A.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application, Use the GPO to give the Domain Users security group full control on the partitions of the registry that the legacy application uses
    B.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the legacy application. Use the GPO to give the Domain Users security group full control on the HKEY_USERS partition of the registry
    C.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to make all users who require access to the application members of Local Administrators group on each computer
    D.Create a GPO. Link the GPO to the OUs that contain computer accounts for computers that run the Legacy application. Use the GPO to give all users who require access to the application full control for the Ntuser.dat file

点击查看答案

相关考题

  • 单项选择题
    YouneedtodesignanaccesscontrolandpermissionstrategyforuserobjectsinActiveDirectory.Whatshouldyoudo?()

    A.Make the members of the AdvancedSupport security group members of the Domain Admins security group
    B.Give each desktop support technician permission to reset passwords for the top-level OU that contains user accounts at their own location
    C.Delegate full control over all OUs that contain user accounts to all AllSupport  security group
    D.Change the permissions on the domain object and its child objects so that the BasicSupport security group is denied permissions. Then, add a permission to each OU that contains user accounts that allows AllSupport security group members to reset passwords in that OU

  • 单项选择题
    YouneedtodesignaSecuritystrategyforthewirelessnetworkatallresortlocations.Whatshouldyoudo?()

    A.Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resources
    B.Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authentication
    C.Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networks
    D.Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

  • 多项选择题
    Youaredesigningasecuritystrategyfortheinfrastructureserversattheresorts.Whichtwoactionsshouldyouperform?(Eachcorrectanswerpresentspartofthesolution.Choosetwo)()

    A.Place all infrastructure servers in subnets that cannot exchange information with the Internet
    B.Establish a custom security template that contains unique required settings for each combination of services that run on the infrastructure servers
    C.Use Group Policy objects (GPOs) to apply the custom security template or templates to the Infrastructure servers
    D.Edit the local policy settings to configure each individual server

微信小程序免费搜题
微信扫一扫,加关注免费搜题

微信扫一扫,加关注免费搜题