Multiple Choice
An application named Inventory.exe is installed on all Windows XP client computers in the domain with the startup type of the service set to Automatic. In the Default Domain Policy Group Policy object the security administrator has configured a software restriction policy that is applied to all computers in the domain.
The policy contains a hash rule for the Inventory.exe application, and the hash rule is configured with a security level of Unrestricted. What should you do to ensure that Inventory.exe cannot be started by a worm, while still allowing the application to run as a service?
A) In the computer settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
B) In the user settings section of the Default Domain Policy GPO, configure a software restriction policy that contains a zone rule for the Internet zone. Configure the zone rule with a security level of Disallowed.
C) In the computer settings section of the Default Domain Policy GPO, modify the existing software restriction policy hash rule for the Inventory.exe application so that the hash rule has a security level of Disallowed.
D) Configure a software restriction policy that contains a hash rule for the Inventory.exe application in the user settings section of the Default Domain Policy GPO. Configure the hash rule with a security level of Disallowed.
Correct Answer:

Verified
Correct Answer:
Verified
Q96: Users on your network complain that they
Q97: Which term refers to an administrative grouping
Q98: On your network, the Domain Admins group
Q99: Which of the following is not a
Q100: When performing performance baselining on Server 1,
Q102: Which of the following folders cannot be
Q103: David installs Windows Software Update Services on
Q104: Chad installs and configures Windows Server Update
Q105: A network uses RIP version 2 for
Q106: David is experiencing a delay when he