You create a Password Settings object (PSO).
You need to apply the PSO to a domain user named User1.
What should you do()
A.Modify the properties of the PSO.
B.Modify the account options of the User1 account.
C.Modify the security settings of the User1 account.
D.Modify the password policy of the Default Domain Policy Group Policy object (GPO).
您可能感兴趣的试卷
你可能感兴趣的试题
You configure and deploy a Group Policy object (GPO) that contains AppLocker settings.
You need to identify whether a specific application file is allowed to run on a computer.
Which Windows PowerShell cmdlet should you use()
A.Get-AppLockerFileInformation
B.Get-GPOReport
C.Get-GPPermissions
D.Test-AppLockerPolicy
Your network contains an Active Directory domain named contoso.com.
You need to create a central store for the Group Policy Administrative templates.
What should you do()
A.Run dfsrmig.exe /createglobalobjects.
B.Run adprep.exe /domainprep /gpprep.
C.Copy the %SystemRoot%\PolicyDefinitions folder to the \\contoso.com\SYSVOL\contoso.com\Policies folder.
D.Copy the %SystemRoot%\System32\GroupPolicy folder to the \\contoso.com\SYSVOL\contoso.com\Policies folder
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. Client computers run either Windows 7 or Windows Vista Service Pack 2 (SP2).
You need to audit user access to the administrative shares on the client computers.
What should you do()
A.Deploy a logon script that runs Icacls.exe.
B.Deploy a logon script that runs Auditpol.exe.
C.From the Default Domain Policy, modify the Advanced Audit Policy Configuration.
D.From the Default Domain Controllers Policy, modify the Advanced Audit Policy Configuration.
Your network contains an Active Directory domain. All domain controllers run Windows Server 2008 R2. Client computers run either Windows XP Service Pack 3 (SP3) or Windows Vista.
You need to ensure that all client computers can apply Group Policy preferences.
What should you do()
A.Upgrade all Windows XP client computers to Windows 7.
B.Create a central store that contains the Group Policy ADMX files.
C.Install the Group Policy client-side extensions (CSEs) on all client computers.
D.Upgrade all Windows Vista client computers to Windows Vista Service Pack 2 (SP2).
Your network contains a single Active Directory domain. All client computers run Windows Vista Service Pack 2 (SP2).
You need to prevent all users from running an application named App1.exe.
Which Group Policy settings should you configure()
A.Application Compatibility
B.AppLocker
C.Software Installation
D.Software Restriction Policies
Your network contains an Active Directory forest.
You add an additional user principal name (UPN) suffix to the forest. You need to modify the UPN suffix of all users.
You want to achieve this goal by using the minimum amount of administrative effort.
What should you use()
A.the Active Directory Domains and Trusts console
B.the Active Directory Users and Computers console
C.the Csvde tool
D.the Ldifde tool
Your network contains an Active Directory forest. The functional level of the forest is Windows Server 2008 R2.
Your company’s corporate security policy states that the password for each user account must be changed at least every 45 days.
You have a user account named Service1. Service1 is used by a network application named Application1. Every 45 days, Application1 fails.
After resetting the password for Service1, Application1 runs properly. You need to resolve the issue that causes Application1 to fail. The solution must adhere to the corporate security policy.
What should you do()
A.Run the Set-ADAccountControl cmdlet.
B.Run the Set-ADServiceAccount cmdlet.
C.Create a new password policy.
D.Create a new Password Settings object (PSO).
You have a Windows PowerShell script that contains the following code:
import-csv Accounts.csv | Foreach {New-ADUser -Name $_.Name -Enabled $true -AccountPassword $_.password}
When you run the script, you receive an error message indicating that the format of the password is incorrect. The script fails.
You need to run a script that successfully creates the user accounts by using the password contained in accounts.csv.
Which script should you run()
A.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true - AccountPassword (ConvertHost-
B.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true - AccountPassword (ConvertTo-
C.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true - AccountPassword (Read-To
D.import-csv Accounts.csv Foreach {New-ADUser -Name $_.Name -Enabled $true - AccountPassword (Read-Host
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects.
You need to give the human resources department a file that contains the last logon time and the custom attribute values for each user in the forest.
Which should you use()
A.the Dsquery tool
B.the Export-CSV cmdlet
C.the Get-ADUser cmdlet
D.the Net.exe user command
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects.
You need to modify the custom attribute value of 500 user accounts.
Which tool should you use()
A.Csvde
B.Dsmod
C.Dsrm
D.Ldifde
最新试题
You need to receive an e-mail message whenever a domain user account is locked out. Which tool should you use()
You have an enterprise subordinate certification authority (CA). You have a group named Group1. You need to allow members of Group1 to publish new certificate revocation lists. Members of Group1 must not be allowed to revoke certificates. What should you do()
Your company has four offices. The network contains a single Active Directory domain. Each office has domain controller. Each office has an organitational unit (OU) that contains the user accounts for the users in that office. In each office, support technicians perform basic troubleshooting for the users in their respective office. You need to ensure that the support technicians can reset the password for the user accounts in their respective office only. The solution must prevent the thechnicians from creating user accounts. What shoul you do()
Your network contains three Active Directory forest named Forest1, Forest2, and Forest3. Each forest contains three domains. A two-way forest trust exists between Forest1 and Forest2. A two-way forest trust exists between Forest2 and Forest3. You need to configure the forest to meet the following requirements Users in Forest3 must be able to access resources in Forest1. Users in Forest1 must be able to access resources in Forest3. The number of trusts must be minimized. What should you do()
What should you do()
You have a domain controller named Server1 that runs Windows Server 2008 R2. You need to determine the size of the Active Directory database on Server1. What should you do()
Your network contains an Active Directory domain. A user named User1 takes a leave of absence for one year. You need to restrict access to the User1 user account while User1 is away. What should you do()
Your network contains two Active Directory forests named contoso.com and nwtraders.com. A two-way forest trust exists between contoso.com and nwtraders.com. The forest trust is configured to use selective authentication. Contoso.com contains a server named Server1. Server1 contains a shared folder named Marketing. Nwtraders.com contains a global group named G_Marketing. The Change share permission and the Modify NTFS permissions for the Marketing folder are assignes to the G_Marketing group. Members of G_Marketing report that they cannot accesss the Marketing folder. You need to ensure that the G_Marketing members can accesss the folder from the network. What should you do()
You remotely monitor several domain controllers. You run winrm.exe quickconfig on each domain controller. You need to create a WMI script query to retrieve information from the bios of each domain controller. Which format should you use to write the query()
You have an enterprise subordinate certification authority (CA) configured for key archival. Three key recovery agent certificates are issued. The CA is configured to use two recovery agents. You need to ensure that all of the recovery agent certificates can be used to recover all new private keys. What should you do()