题目内容

You are the network administrator for your company. The network consists of a single Active Directory domain. The functional level of the domain is Windows Server 2003. All client computers in the domain run Windows XP Professional. An application named Inventory.exe is installed on all computers in the domain to remotely gather software inventory information. The application runs as a service in the security context of the Local System. The startup type of the service is set to Automatic.In the Default Domain Policy Group Policy object (GPO), the security administrator has configured a software restriction policy that is applied to all computers in the domain. The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. The client computers on the network are attacked by a worm that is distributed by e-mail messages received over the Internet. The worm detects the presence of Inventory.exe on a computer, then starts a new instance of the application in the security context of the logged-on user. The worm exploits a bug in the application to cause the computer to fail.You need to ensure that Inventory.exe cannot be started by the worm, while still allowing the application to run as a service. What should you do?()

A. In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
B. In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
C. In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a hash rule for the Inventory.exe application. Configure the hash rule with a security level of Disallowed.
D. In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.

查看答案
更多问题

列车到达终点站后,机车不能及时入段时,将机车移动至脱轨器外方、信号机前或()停车。

A. 警冲标内方
B. 警冲标外方
C. 道岔内方
D. 道岔外方

用示波器检查可控硅整流装置的“脉冲装置”输出脉冲,应将示波器接于可控硅元件的()。

A. 阴极与阳极之间;
B. 控制极与阴极之间;
C. 控制极与阳极之间;
D. 控制极与"地"之

为什么模块的规模要适中?

国家赔偿法赔偿范围为违法实施罚款、()和执照、责令停产停业、没收财产等行政处罚的。

答案查题题库