• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Kerberos is a ticket–based system that allows domain access by using what?

Key Distribution Center
What setting logs events related to successful user logons to a domain?
Account Logon Events
What event category logs user access to files, folders, registry keys, and printers?
Audit Object Access
What policy setting allows an administrator to specify group membership lists?
Restricted Groups
What setting allows computers to automatically submit a request for a certificate from an Enterprise Certification Authority (CA) and install that certificate?
Automatic Certificate Request
What separate Group Policy category allows files to be available to users, even when the users are disconnected from the network?
Offline Files
The Disk Quota feature is only available on volumes formatted with what?
NTFS File System
Computer Configuration group policies are refreshed how often by default?
every 90 minutes
What is the client–side component of Windows Installer?
Windows Installer Service
When repackaging an application is not an option and a Windows Installer file is not available, what type of file can be used to publish an application?
.zap file
What allows published applications to be organized within specific groupings for easy navigation?
software categories
What is designed to identify software and control its execution?
Software Restriction Policies
When configuring Software Restriction Policies, what option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Basic User
What is generated by a formula that makes it nearly impossible for another program to have the same hash?
hash value
What can be used to allow software from a trusted source to run or prevent software that does not come from a trusted source from running?
certificate rule
What rules apply only to Windows Installer packages that attempt to install from a specified zone such as a local computer, local intranet, trusted sites, restricted sites, or the Internet?
network zone rules
What MMC snap–in is a tool for managing Group Policy in Windows Server 2008, Windows Server 2003, and Windows 2000 Active Directory domains?
Group Policy Management
What tab displays the order of precedence for the policies set on a given container?
Group Policy Inheritance
What type of GPO can act as templates when creating new GPOs for your organization?
Starter GPO
What setting can prevent policy settings from applying to all child objects at the current level and all subordinate levels?
Block Policy Inheritance
What can be used to control which users or computers will be affected by a GPO based on defined criteria?
WMI filters
What is the sum of the policies applied to a user or computer after all filters, security group permissions, and inheritance settings, such as Block Policy Inheritance and Enforce, have finished processing?
Resultant Set of Policy
What RSoP mode allows administrators to simulate the effect of policy settings prior to implementing them on a computer or user?
Planning mode
What feature in Group Policy Management is equivalent to the Logging mode within the Resultant Set of Policy MMC snap–in?

Group Policy Results