相关考题

单项选择题 You are a security administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.   The company occasionally experiences downtime because of malicious lnternet worms that arrive as Microsoft Visual Basic Scripting Edition (VBS) files. You examine several client computers and discover that VBS files are downloaded by using Microsoft Outlook,instant messaging,or peer-to-peer file sharing programs.    You need to prevent users from running VBS files regardless of how they arrive on client computers.  What should you do?()

单项选择题 You are a security administrator for your company. The company has one main office and five branch offices. Network administrators work in the main office and each branch office.    Network administrators in the main office frequently create scripts that automate common  administrative tasks. You review each script to ensure it does not introduce security vulnerabilities. Scripts that do not introduce security vulnerabilities are considered approved. Occasionally, branch office administrators modify these scripts and distribute the modified scripts to other  branch office administrators. Branch office administrators often report that they accidentally run a modified version of a script.    You need to ensure that branch office administrators can verify which scripts are approved scripts.  What should you do?()

单项选择题 You are a security administrator for your company. The network consists of three Active Directory domains. All Active Directory domains are running at a Windows Server 2003 mode functionality level.    Employees in the editorial department of your company need access to resources on file servers that are in each of the Active Directory domains. Each Active Directory domain in the company contains at least one editorial department employee user account.    You need to create a single group named Company Editors that contains all editorial department employee user accounts and that has access to the resources on file server computers.  What should you do?()