单项选择题
A. Enable the No auto-restart for scheduled Automatic Updates installations setting.
B. Disable the Specify intranet Microsoft update service location setting.
C. Enable the Remove access to use all Windows Update features setting.
D. Enable the Reschedule Automatic Updates scheduled installations setting.
问答题 You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. Your company uses the lnternet to sell products. Customers place and view the status of orders by using a Web application named App1. App1 is hosted on a Windows Server 2003 computer that runs IIS. Users access App1 by using various Web browsers. You configure SSL for connections to App1. The company’s written security policy states the following requirements: All users must enter a user name and password when they access App1. All users must use the same authentication method. All users must use credentials in the company’s domain. You need to configure IIS to support the required authentication. What should you do? To answer,configure the appropriate option or options in the dialog box in the work area.
单项选择题 You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional. The company occasionally experiences downtime because of malicious lnternet worms that arrive as Microsoft Visual Basic Scripting Edition (VBS) files. You examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook,instant messaging,or peer-to-peer file sharing programs. You need to prevent users from running VBS files regardless of how they arrive on client computers. What should you do?()
单项选择题 You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office. Network administrators in the main office frequently create scripts that automate common administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script. You need to ensure that branch office administrators can verify which scripts are approved scripts. What should you do?()