A company’s server security team needs a solution that will prevent users from installing and using unauthorized applications on their Windows 8 desktop computers.
Which technology should the team choose?()
A. Starter GPOs
B. Group Policy Objects
C. Software Restriction Policies
D. AppLocker
您可能感兴趣的试卷
你可能感兴趣的试题
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain have Windows Server 2012 R2 installed.
You have logged on to a server, named ENSUREPASS-SR07, and would like to obtain the IP configurations of a server, named ENSUREPASS-SR13.
Which of the following actions should you take?()
A. You should consider making use of the Winrs.exe command.
B. You should consider making use of the Winsat.exe command.
C. You should consider making use of the Winpop.exe command.
D. You should consider making use of the Dsrm.exe command.
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You need to add an RODC to the domain by using the Install From Media (IFM) option.
Which tool should you use to create the media?()
A. the ntdsutil command
B. the Set-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. the Set-ADForest cmdlet
You have a server named Server1 that runs Windows Server 2012 R2.
You configure IPSec rules for connections to Server1.
On Server1, you plan to create an inbound firewall rule that contains the following settings:
Allows inbound connections to an application named App1.exe
Applies to the domain profile
Overrides any block rules
You need to identify the minimum information required to create the rule.
Which two pieces of information should you identify? Each correct answer presents part of the solution.()
A. the list of computers that are authorized to use the application
B. the list of Active Directory users who are authorized to use the application
C. the hash of the application
D. the name of the IPSec policies that apply to Server1
E. the local path of the application
A company’s server deployment team needs to introduce many new Windows Server 2012 R2 domain controllers throughout the network into a single Windows Server 2008 R2 domain. The team has chosen to use Windows PowerShell.
Which Windows PowerShell module includes the command-line options for installing domain controllers?()
A. AD DS Administration cmdlets
B. AD DS Deployment cmdlets
C. AD CS Deployment cmdlets
D. AD CS Administration cmdlets
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.
You plan to replace a domain controller named DC1. DC1 has the schema operations master role.
You need to transfer the schema master role to another domain controller named DC10 before you remove Active Directory from DC1.
Which tool should you use?()
A. the ntdsutil command
B. the Set-ADDomain cmdlet
C. the Install-ADDSDomain cmdlet
D. the dsadd command
E. the dsamain command
F. the dsmgmt command
G. the net user command
H. the Set-ADForest cmdlet
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com.
Contoso.com has a Windows Server 2012 R2 domain controller, named ENSUREPASS-DC01, which has the Domain Naming master and the Schema master roles installed.
Contoso.com also has a Windows Server 2008 R2 domain controller, named ENSUREPASS-DC02, which has the PDC Emulator, RID master, and Infrastructure master roles installed.
You have deployed a new Windows Server 2012 server, which belongs to a workgroup, in Contoso.com’s perimeter network.
You then executed the djoin.exe command.
Which of the following is the purpose of the djoin.exe command?()
A. It sets up a computer account in a domain and requests an offline domain join when a computer restarts.
B. It sets up a user account in a domain and requests an online domain join when a computer restarts.
C. It sets up a computer account in a domain and requests an offline domain join immediately.
D. It sets up a computer account in a domain and requests an online domain join immediately.
A.Global
B.Domainlocal
C.Built-in
D.Universal
You perform a Server Core Installation of Windows Server 2012 R2 on a server named Server1.
You need to add a graphical user interface (GUI) to Server1.
Which tool should you use?()
A. The Install-WindowsFeature cmdlet
B. The Install-Module cmdlet
C. The Install-RoleService cmdlet
D. The setup.exe command
RODC comes with a number of features that focus on heightened security with limited functionality to remote office users.
Which of the following are features of RODC?()
A. Filtered Attribute Sets
B. Read-Only DNS
C. Unidirectional Replication
D. All of these
You work as an administrator at Contoso.com. The Contoso.com network consists of two Active Directory forests, named Contoso.com and test.com. There is no trust relationship configured between the forests.
A backup of Group Policy object (GPO) from the test.com domain is stored on a domain controller in the Contoso.com domain.
You are informed that a GPO must be created in the Contoso.com domain, and must be based on the settings of the GPO in the test.com domain.
You start by creating the new GPO using the New-GPO Windows PowerShell cmdlet. You want to complete the task via a Windows PowerShell cmdlet.
Which of the following actions should you take?()
A. You should consider making use of the Invoke-GPUpdate Windows PowerShell cmdlet.
B. You should consider making use of the Copy-GPO Windows PowerShell cmdlet.
C. You should consider making use of the New-GPLink Windows PowerShell cmdlet.
D. You should consider making use of the Import-GPO Windows PowerShell cmdlet.
最新试题
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.You have been instructed to make sure that Contoso.com users are not able to install a Windows Store application. You then create a rule for packaged apps.Which of the following is the rule based on? ()
Your directory contains one AD domain named contoso.com.The domain contains 10 DC that run WS2012R2. 8 DC are writable DC.You need to deploy several read-only DC in contoso by using pre-staged computer accounts.Which two tasks should you perform? Each correct answer presents part of solution.()
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers in the Contoso.com domain, including domain controllers, have Windows Server 2012 R2 installed.Contoso.com has a server, named ENSUREPASS-SR15, which is configured as a file server.You have received instructions to make sure that a user, named Mia Hamm, has the ability to generate a complete backup of ENSUREPASS-SR15 via Windows Server Backup.Which of the following actions should you take?()
You work as an administrator at Contoso.com. The Contoso.com network consists of a single domain named Contoso.com. All servers on the Contoso.com network have Windows Server 2012 R2 installed.Contoso.com has a server, named ENSUREPASS-SR13, which is configured as the primary DNS server in the Contoso.com domain. Contoso.com has another server, named ENSUREPASS-SR14, which makes use of ENSUREPASSSR13 for DNS queries.You want to make sure that running nslookup.exe from ENSUREPASS-SR14 produces a result that shows the proper name of the default server.Which of the following actions should you take?()
A company’s network administrator needs to ensure a specific IP address is never assigned by a Windows Server 2012 R2 DHCP server to any device connecting to the network.Which of the following should the administrator configure on the Windows Server 2012 R2 DHCP server?()
Your network contains a Hyper-V host named Server1 that runs Windows Server 2012 R2.Server1 hosts a virtual machine named VM1 that runs Windows Server 2012 R2.You take a snapshot of VM1, and then you install an application on VM1.You verify that the application runs properly.You need to ensure that the current state of VM1 is contained in a single virtual hard disk file. The solution must minimize the amount of downtime on VM1.What should you do?()
Your network contains an Active Directory domain named contoso.com.You create a software restriction policy to allow an application named App1 by using a certificate rule.You need to prevent the software restriction policy from applying to users that are members of the local Administrators group.What should you do?()
You have a Hyper-V host named Hyper1 that runs Windows Server 2012 R2.Hyper1 hosts several virtual machines that run Windows 8.1.Several developers connect to the virtual machines by using the Virtual Machine Connection tool.You need to ensure that the devlopers can print to their local printers from within virtual machine sessions.What should you configure?()
Your network contains one Active Directory domain named contoso.com. The domain contains 10 domain controllers and a read-only domain controller (RODC) named RODC01.You need to ensure that when administrators create users in contoso.com, the default user principal name (UPN) suffix is litwareinc.com.Which cmdlet should you use?()
Your network contains one Active Directory forest named contoso.com. The forest contains a single domain.A user named User5 has the required permissions to link Group Policy (GPOs) to any container in the domain.You need to assign permissions to User5 to meet the following requirements:User5 must be able to edit the GPO settings for all of the GPOs linked to the contoso.com domain.User5 must be able to edit the GPO settings for all of the unlinked GPOs in the domain.User5 must use the principle of least priviledge.What command should you run? To answer, select the appropriate options in the answer area.