Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
Centralized management of security settings for users and computers can be accomplished by using __________ Policy. |
Group
|
|
__________ Password Policies allow one or more users or groups of users to specify a more or less stringent password policy for a subset account than the password policy defined for the entire domain.
|
Fine–Grained
|
|
__________ is the default mechanism for authenticating domain users in Windows Server 2008, Windows Server 2003, and Microsoft Windows 2000. |
Kerberos
|
|
When an audited event occurs, Windows Server 2008 writes an event to the __________ log on the domain controller or computer where the event took place.
|
security
|
|
Policy __________ audit log entries are triggered by events such as user rights assignment changes, establishment or removal of trust relationships, IPSec policy agent changes, and grants or removals of system access privileges.
|
change
|
|
The service startup options are Automatic, __________, and Disabled.
|
Manual
|
|
The Wireless Network Policy __________ is provided to enable administrators to specify appropriate settings for the corporate environment.
|
Wizard
|
|
Folder __________ provides administrators with the ability to redirect the contents of certain folders to a network location or to another location on the user’s local computer.
|
Redirection
|
|
Offline Files is configured on the __________ tab of a folder.
|
Sharing
|
|
The __________ command–line tool was introduced in Windows Server 2003, and it is used in Windows Server 2003 and Windows Server 2008 to replace the secedit /refreshpolicy command used in Windows 2000.
|
gpupdate.exe
|
|
The software life cycle is a derivative of the System __________ Life Cycle.
|
Development
|
|
The __________ phase is the final phase before the software life cycle begins again with a new software deployment plan.
|
removal
|
|
A(n) __________ file is a relational database file that is copied to the target computer system with the program files it deploys.
|
.msi
|
|
Before deploying software using Group Policy, you must create a(n) __________ share.
|
distribution
|
|
If you use the __________ option, you must also decide whether you will assign the application to a computer or a user account.
|
Assign
|
|
Use the __________ option to provide all installation messages and screens for users during the installation of all packages in the GPO.
|
Maximum
|
|
When customizing software installation packages, use the __________ tab to specify the transform (.mst) files or patch (.msp) files that are to be applied to the package.
|
Modifications
|
|
The Software __________ Policies node is found in the Windows Settings\Security Settings\ node of the User Configuration or the Computer Configuration node of a Group Policy.
|
Restriction
|
|
A hash is computed by a hash __________, which in effect creates a fingerprint of the file.
|
algorithm
|
|
A(n) __________ rule identifies software by specifying the directory path where the application is stored in the file system.
|
path
|
|
Group Policy Management is located in the __________ Tools folder of the Start menu.
|
Administrative
|
|
The __________ Group Policy Objects tab allows an administrator to change the order of policies, create new policies, edit existing policies, create policy links, and view and change the enabled status.
|
Linked
|
|
By default, Group Policy settings will apply to all __________ objects within the domain, site, or OU to which they are linked.
|
child
|
|
WMI allows administrators to create __________ based on hardware, software, operating systems, and services.
|
queries
|
|
__________ Set of Policy is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing.
|
Resultant
|
|
Group Policy __________, referred to as Planning mode using the Resultant Set of Policy snap–in, is used to simulate the effect of a policy on the user environment.
|
Modeling
|
|
__________ is a command–line tool that allows you to create and display an RSoP query from the command line.
|
GPResult
|
|
The Resultant Set of Policy __________ is provided in Windows Server 2008 to assist administrators in determining the effects of policies on users and computers.
|
Wizard
|
|
Security Group __________ refines the application of a GPO to include or exclude certain users, groups, or computers based on the ACL that is applied to the GPO.
|
Filtering
|
|
A new Group Policy management feature in Windows Server 2008 is the ability to create __________ GPOs that can act as templates when creating new GPOs for your organization.
|
Starter |