Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
What Computer Configuration node setting includes three subcategories: Audit Policy, User Rights Assignment, and Security Options? |
Local Policies
|
|
What policies can be applied to one or more users or groups of users, allowing you to specify a more or less stringent password policy for this subset than the password policy defined for the entire domain?
|
Fine–Grained Password Policies
|
|
What is the default mechanism for authenticating domain users in Windows Server 2008, Windows Server 2003, and Microsoft Windows 2000? |
Kerberos
|
|
What term refers to tracking events that take place on the local computer?
|
auditing
|
|
What section of GPO Local Policies allows administrators to log successful and failed security events such as logon events, account access, and object access?
|
Audit Policy
|
|
What policy setting is set to audit successes in the Default Domain Controllers GPO?
|
account management events
|
|
What policy setting allows an administrator to specify group membership lists?
|
Restricted Groups
|
|
Settings available in the __________ area of Group Policy allow greater administrative control in establishing rules and governing the issuance, maintenance, and guidelines within a public key infrastructure (PKI).
|
Public Key Policies
|
|
What provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer?
|
Folder Redirection
|
|
What term means that the Group Policy setting continues to apply until it is reversed by using a policy that overwrites the setting?
|
tattooing
|
|
What separate Group Policy category allows files to be available to users, even when the users are disconnected from the network?
|
Offline Files
|
|
By implementing the __________ feature when Folder Redirection is also configured, administrators can control the amount of information that is stored on the server.
|
Disk Quotas
|
|
If you set the refresh interval to zero, the system attempts to update the policy at what interval?
|
every 7 seconds
|
|
What command–line tool can be used to manually refresh group policy?
|
gpupdate.exe
|
|
How often are Computer Configuration group policies refreshed by default?
|
every 90 minutes
|
|
What policy can specify software that you wish to run on computers?
|
Software Restriction Policies
|
|
Which of these is not an option when configuring Fine–Grained Password Policies?
|
PasswordCommonNameUsage
|
|
What setting logs events related to successful user logons to a domain?
|
Account Logon Events
|
|
What category is used to configure the startup and security settings for services running on a computer?
|
System Services
|
|
Where can you configure the Group Policy refresh interval?
|
Computer Configuration\Administrative Templates\System\Group Policy
|
|
What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use?
|
software life cycle
|
|
Which of the following is not a phase of the software life cycle?
|
evaluation
|
|
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
|
.msi
|
|
Modifications to .msi files require transform files, which have the __________ extension.
|
.mst
|
|
__________ files are used to apply service packs and hotfixes to installed software.
|
Patch
|
|
Before deploying software using Group Policy, what must you create?
|
distribution share
|
|
What option allows users to install the applications that they consider useful to them?
|
Publish
|
|
What option is helpful when you are deploying required applications to pertinent users and computers?
|
Assign
|
|
What allows published applications to be organized within specific groupings for easy navigation?
|
software categories
|
|
What policies are designed to identify software and control its execution?
|
Software Restriction |