單項(xiàng)選擇題

You are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003.  
The network contains servers that have Terminal Server enabled. The terminal servers host legacy applications that currently require users to be members of the Power Users group.  
A new requirement in the company’s written security policy states that the Power Users group must be empty on all resource servers.  
You need to maintain the ability to run the legacy applications on the terminal servers when the new security requirement is implemented. 
 What should you do?  ()

A. Add the Domain Users global group to the Remote Desktop Users built-in group in the domain.  
B. Add the Domain Users global group to the Remote Desktop Users local group on each terminal server.
C. Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Import the security template into the Default Domain Controllers Policy Group Policy object (GPO).
D. Modify the Compatws.inf security template settings to allow members of the local Users group to run the applications. Apply the modified template to each terminal server.

題目列表

你可能感興趣的試題

單項(xiàng)選擇題

You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains 10 domain controllers and 50 servers in application server roles. All servers run Windows Server 2003.  
The application servers are configured with custom security settings that are specific to their roles as application servers. Application servers are required to audit account logon events, object access events, and system events. Application servers are required to have passwords that meet complexity requirements, to enforce password history, and to enforce password aging. Application servers must also be protected against man-in-the-middle attacks during authentication.  You need to deploy and refresh the custom security settings on a routine basis. You also need to be able to verify the custom security settings during audits.
  What should you do? ()

A. Create a custom security template and apply it by using Group Policy.
B. Create a custom IPSec policy and assign it by using Group Policy.
C. Create and apply a custom Administrative Template.
D. Create a custom application server image and deploy it by using RIS.

微信掃碼免費(fèi)搜題