You need to recommend a solution that prevents this warning message from appearing, without compromising the security protection of the computers

You are a systems administrator for your company. The company has employees who work remotely by using
a virtual private network (VPN) connection from their computers, which run Windows 8.1 Pro. These
employees use an application to access the company intranet database servers. The company recently decided
to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they
receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without
compromising the security protection of the computers.
What should you do?

You are a systems administrator for your company. The company has employees who work remotely by using
a virtual private network (VPN) connection from their computers, which run Windows 8.1 Pro. These
employees use an application to access the company intranet database servers. The company recently decided
to distribute the latest version of the application through using a public cloud.
Some users report that every time they try to download the application by using Internet Explorer, they
receive a warning message that indicates the application could harm their computer.
You need to recommend a solution that prevents this warning message from appearing, without
compromising the security protection of the computers.
What should you do?

A.
Instruct employees to disable the SmartScreen Filter from within the Internet Explorer settings.

B.
Publish the application through a public file transfer protocol (FTP) site.

C.
Digitally sign the application by using a trusted certificate, and then update the default App Package
Deployment policy on all computers.

D.
Change the default Software Restriction Policies on the client computers.

Explanation:
Administrators can use software restriction policies for the following tasks:
Define what is trusted code
Design a flexible Group Policy for regulating scripts, executable files, and ActiveX controls



Leave a Reply 0

Your email address will not be published. Required fields are marked *