单项选择题
You are responsible for administering the Production OU. You are assigned the Allow - Full Control permission for the OU. All computer objects in the Production OU are administered by another administrator named Tom.
The Production OU contains the computer account for a Windows Server 2003 computer named Testking1. Tom submits a list of configuration settings that he wants to apply to Testking1 by means of a Group Policy object (GPO). A GPO that contains Tom's required settings is created in another OU by the domain administrator.
You only want to allow Tom to link existing GPOs to the Production OU. He must not have any more rights than he needs to perform the required tasks.
What should you do?()
A. Add Tom's user account to the Group Policy Creator Owners group in the domain.
B. Run the Delegation of Control Wizard and assign Tom's user account the Allow - Manage group policy links permission for the Production OU.
C. Run the Delegation of Control wizard and assign Tom's user account the Allow - Change permission for the Production OU.
D. Run the Delegation of Control wizard and assign Tom's user account the Allow - Apply group policy permission for all GPOs that are linked to the Production OU.
相关考题
-
多项选择题
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. All network servers run Windows Server 2003, and all client computers run Windows XP Professional. A new management directive states that users can log to the domain only during business hours. Users who remain logged on after business hours must be automatically disconnected from network resources. You need to enforce this directive by using the minimum amount of administrative effort. Which two actions should you perform?() (Each correct answer presents part of the solution. Choose two)
A. Configure the Default Domain Policy Group Policy object (GPO) to increase scheduling priority for all users.
B. Configure the Default Domain Policy Group Policy object (GPO) to force users to log off when their logon hours expire.
C. Select all user accounts. Modify the account properties to restrict logon hours to business hours.
D. Create a domain user account named Temp. Configure the account properties to restrict logon hours to business hours.
E. Modify the DACL on the Default Domain Policy Group Policy object (GPO) to assign the Allow - Read permission to the Users group. -
单项选择题
You are the network administrator for TestKing.com. The network consists of a single Active Directory domain named testking.com. The domain contains Windows Server 2003 computers and Windows XP Professional computers. You use a non-administrative user account named Joseph to log on to a client computer. You need to change the password for a domain user account named Sophia. You open the Active Directory Users and Computers console. When you attempt to change Sophias password, you receive the following error message: "Access is denied". You need to remain logged on to the client computer as Joseph, and you need to be able to change Sophias password. What should you do?()
A. Add the non-administrative domain user account to the local Administrators group.
B. Use the runas command to run Active Directory Users and Computers with domain administrative credentials.
C. From a command prompt, run the net user Sophia /add /passwordreq:yes command.
D. From a command prompt, run the net accounts /uniquepw: /domain command. -
多项选择题
You are the network administrator for TestKing. The network consists of a single Active Directory forest that contains three domains. The functional level of the forest is Windows 2000. The NetBIOS names of the domains are TesKing1, TesKing2, TestKing3. The functional level of all three domains is Windows 2000 mixed. You manage resources in TesKing1. A new file server is added to TesKing1. Users in all three domains need access to resources on the file server. You need to create a group that will be used to grant access to the file server in TesKing1. Which two actions should you perform? Each correct answer presents part of the solution. Select two.()
A. Create a security group.
B. Create a distribution group.
C. Configure the group to be a global group.
D. Configure the group to be a universal group.
E. Configure the group to be a domain local group.
