单项选择题

You configure and deploy a Group Policy object (GPO) that contains AppLocker settings.  You need to identify whether a specific application file is allowed to run on a computer.  
Which Windows PowerShell cmdlet should you use()

A.Get-AppLockerFileInformation
B.Get-GPOReport
C.Get-GPPermissions
D.Test-AppLockerPolicy


您可能感兴趣的试卷

你可能感兴趣的试题

1.单项选择题

Your network contains an Active Directory domain named contoso.com.  You need to create a central store for the Group Policy Administrative templates.  
What should you do()

A.Run dfsrmig.exe /createglobalobjects.
B.Run adprep.exe /domainprep /gpprep.
C.Copy the %SystemRoot%\PolicyDefinitions folder to the \\contoso.com\SYSVOL\contoso.com\Policies  folder.
D.Copy  the  %SystemRoot%\System32\GroupPolicy  folder  to  the\\contoso.com\SYSVOL\contoso.com\Policies folder.

2.单项选择题

Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows 7 or Windows Vista Service Pack 2 (SP2).  You need to audit user access to the administrative shares on the client computers.  
What should you do()

A.Deploy a logon script that runs Icacls.exe.
B.Deploy a logon script that runs Auditpol.exe.
C.From the Default Domain Policy, modify the Advanced Audit Policy Configuration.
D.From the Default Domain Controllers Policy, modify the Advanced Audit Policy Configuration.

3.单项选择题

Your network contains an Active Directory domain. All domain controllers run Windows Server 2008  R2. Client computers run either Windows XP Service Pack 3 (SP3) or Windows Vista.  You need to ensure that all client computers can apply Group Policy preferences.  
What should you do()

A.Upgrade all Windows XP client computers to Windows 7.
B.Create a central store that contains the Group Policy ADMX files.
C.Install the Group Policy client-side extensions (CSEs) on all client computers.
D.Upgrade all Windows Vista client computers to Windows Vista Service Pack 2 (SP2).

7.单项选择题

You have a Windows PowerShell script that contains the following code:  
import-csv Accounts.csv | Foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword  $_.password}  
When you run the script, you receive an error message indicating that the format of the password is  incorrect. The script fails.  
You need to run a script that successfully creates the user accounts by using the password contained in  accounts.csv.  
Which script should you run()

A.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword convertTo-SecureString "Password" -AsPlainText -force)}
B.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword convertTo-SecureString $_.Password -AsPlainText -force)}
C.import-csv Accounts.csv foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword Read-Host -AsSecureString "Password")}
D.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword (Read-Host -AsSecureString $_.Password)}

最新试题

Active Directory Rights Management Services (AD RMS) is deployed on your network.    You need to configure AD RMS to use Kerberos authentication.  Which two actions should you perform()

题型:多项选择题

You install a standalone root certification authority (CA) on a server named Server1.  You need to ensure that every computer in the forest has a copy of the root CA certificate  installed in the local computer’s Trusted Root Certification Authorities store.    Which command should you run on Server1()

题型:单项选择题

Your network contains two Active Directory forests named contoso.com and    nwtraders.com. A  two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is  configured to use selective authentication.  Contoso.com contains a server named Server1. Server1 contains a shared folder named  Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share  permission and the Modify NTFS permissions for the Marketing folder are assignes to the  G_Marketing group.  Members of G_Marketing report that they cannot accesss the Marketing folder.  You need to ensure that the G_Marketing members can accesss the folder from the network.    What should you do()

题型:单项选择题

Your network contain 10 domain controller that run Windows Server    R2.  The network contain a member server that is configured to collect all of events that occur on the  domain controllers.  Your need to ensure that administrators are notified when a specific event occurs on any of the  domain controllers. You want to achive the goal by using the minimum amount effort.  What should you do()

题型:单项选择题

You need to compact an Active Directory database on a domain controller that runs windows  Server 2008 R2.  What should you do()

题型:单项选择题

You have an enterprise subordinate certification authority (CA). You have a custom certificate  template that has a key length of 1,024 bits. The template is enabled for autoenrollment.    You increase the template key length to 2,048 bits.  You need to ensure that all current certificate holders automatically enroll for a certificate that  uses the new template.    Which console should you use()

题型:单项选择题

Your network contains an Active Directory domain named contoso.com. You have a management  computer named Computer1 that runs Windows 7.    You need to forward the logon events of all the domain controllers in contoso.com to Computer1.    All new domain controllers must be dynamically added to the subscription.  What should you do()

题型:单项选择题

Your network contains an Active Directory domain. All domain controller run Windows Server  2003.    You replace all domain controllers with domain controllers that run Windows Server 2008 R2.    You raise the functional level of the domain to Windows Server 2008 R2.    You need to minimize the amount of SYSVOL replication traffic on the network.    What should you do()

题型:单项选择题

You have an enterprise subordinate certification authority (CA) configured for key archival. Three  key recovery agent certificates are issued.  The CA is configured to use two recovery agents.    You need to ensure that all of the recovery agent certificates can be used to recover all new  private keys.    What should you do()

题型:单项选择题

What should you do() 

题型:单项选择题