• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

Centralized management of security settings for users and computers can be accomplished by using __________ Policy.

Group
__________ Password Policies allow one or more users or groups of users to specify a more or less stringent password policy for a subset account than the password policy defined for the entire domain.
Fine–Grained

__________ is the default mechanism for authenticating domain users in Windows Server 2008, Windows Server 2003, and Microsoft Windows 2000.

Kerberos
When an audited event occurs, Windows Server 2008 writes an event to the __________ log on the domain controller or computer where the event took place.
security
Policy __________ audit log entries are triggered by events such as user rights assignment changes, establishment or removal of trust relationships, IPSec policy agent changes, and grants or removals of system access privileges.
change
The service startup options are Automatic, __________, and Disabled.
Manual
The Wireless Network Policy __________ is provided to enable administrators to specify appropriate settings for the corporate environment.
Wizard
Folder __________ provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer.
Redirection
Offline Files is configured on the __________ tab of a folder.
Sharing
The __________ command–line tool was introduced in Windows Server 2003, and it is used in Windows Server 2003 and Windows Server 2008 to replace the secedit /refreshpolicy command used in Windows 2000.
gpupdate.exe
The software life cycle is a derivative of the System __________ Life Cycle.
Development
The __________ phase is the final phase before the software life cycle begins again with a new software deployment plan.
removal
A(n) __________ file is a relational database file that is copied to the target computer system with the program files it deploys.
.msi
Before deploying software using Group Policy, you must create a(n) __________ share.
distribution
If you use the __________ option, you must also decide whether you will assign the application to a computer or a user account.
Assign
Use the __________ option to provide all installation messages and screens for users during the installation of all packages in the GPO.
Maximum
When customizing software installation packages, use the __________ tab to specify the transform (.mst) files or patch (.msp) files that are to be applied to the package.
Modifications
The Software __________ Policies node is found in the Windows Settings\Security Settings\ node of the User Configuration or the Computer Configuration node of a Group Policy.
Restriction
A hash is computed by a hash __________, which in effect creates a fingerprint of the file.
algorithm
A(n) __________ rule identifies software by specifying the directory path where the application is stored in the file system.
path
Group Policy Management is located in the __________ Tools folder of the Start menu.
Administrative
The __________ Group Policy Objects tab allows an administrator to change the order of policies, create new policies, edit existing policies, create policy links, and view and change the enabled status.
Linked
By default, Group Policy settings will apply to all __________ objects within the domain, site, or OU to which they are linked.
child
WMI allows administrators to create __________ based on hardware, software, operating systems, and services.
queries
__________ Set of Policy is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing.
Resultant
Group Policy __________, referred to as Planning mode using the Resultant Set of Policy snap–in, is used to simulate the effect of a policy on the user environment.
Modeling
__________ is a command–line tool that allows you to create and display an RSoP query from the command line.
GPResult
The Resultant Set of Policy __________ is provided in Windows Server 2008 to assist administrators in determining the effects of policies on users and computers.
Wizard
Security Group __________ refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO.
Filtering
A new Group Policy management feature in Windows Server 2008 is the ability to create __________ GPOs that can act as templates when creating new GPOs for your organization.

Starter