All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 Active Directory Domain Services domain.Malicious software is spreading automatically from removable drives.You need to ensure that malicious software does not automatically run on the computers.What should you do?
A client computers on your company network run Windows 7. Employees log on to their computers as Standard users.There is a zero-day malicious software attack affecting your network. Employees receive User AccountControl (UAC) messages frequently requesting permission to elevate privileges. You know that this malicious software attack is responsible for these UAC prompts.You need to ensure that employees are unable to provide elevated credentials.What should you do?
You have an Active Directory domain. All client computers run Windows 7 and are joined to the domain.The help desk reports that several users recently downloaded and installed malware.You discover that the users modified the Windows Defender settings on their computers.You need to recommend a solution to prevent users from modifying their Windows Defender settings.What should you recommend?
All client computers on your company network run Windows 7. The computers are members of a Windows Server 2008 R2 domain.You need to ensure that data stored on removable drives is encrypted.What should you do?
All client computers on your company network run Windows 7. Your company has a Windows Server2008 domain.You plan to use Group Policy to enable BitLocker Drive Encryption (BDE).You need to ensure that the following requirements are met:✑ All BitLocker recovery keys are stored in a central location.✑ Data is encrypted only after a backup of the recovery key is available.What should you do?
All client computers on your company network run Windows 7 and are members of a Windows Server 2008 R2 domain. The R&D department staff are local administrators on their computers and are members of the R&D global security group.A new version of a business software application is available on the network.You plan to apply an AppLocker security policy to the R&D group.You need to ensure that members of the R&D group are not allowed to upgrade the software.What should you do?