多项选择题
You create a Windows 7 deployment image that includes custom Internet Explorer branding and search providers.
Your company decides to deploy all custom settings by using Group Policy.
You need to restore the Internet Explorer settings in the deployment image to the Microsoft default settings.
Which two actions should you perform?()
A. Use the Reset Internet Explorer Settings (RIES) feature, and run the Reset process on the deployment image.
B. Use the Reset Internet Explorer Settings (RIES) feature, and run the Remove Branding process on the deploymentimage.
C. Update the Internet Explorer Maintenance policy processing Group Policy object (GPO) settings for all computers.
D. Update the Internet Explorer Manage Add-ons settings for all computers.
相关考题
-
单项选择题
You have a single Active Directory domain. All domain controllers run Windows Server 2003 with Service Pack 1 (SP1). You plan to store Windows BitLocker Drive Encryption recovery passwords in Active Directory. You need to recommend the solution that uses the least amount of administrative effort. What should you recommend?()
A.Extend the Active Directory schema.
B.Upgrade all domain controllers to Windows Server 2008 R2.
C.Upgrade all domain controllers to Windows Server 2003 SP2.
D.Upgrade the domain controller that has the role of operations master to Windows Server 2008 R2. -
单项选择题
All client computers in your network run Windows 7 with default firewall settings. You have a server-based application that requires an agent to be installed on all client computers. You need to use Group Policy to allow the application to initiate installation of the agent on all client computers. What should you do?()
A.Create inbound port rules.
B.Create inbound program rules.
C.Create connection security rules.
D.Create Windows service hardening rules. -
单项选择题
All client computers in your network run Windows 7 Enterprise. You need to prevent all standard user accounts from running programs that are signed by a specific publisher. What should you do?()
A.Use software restriction policies. Create a path rule.
B.Use software restriction policies. Create a hash rule.
C.Use AppLocker application control policies. Create an Executable rule.
D.Use AppLocker application control policies. Create a Windows Installer rule.
