Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
What is the proper term for associating a Group Policy to a set ofAD DS objects? a. Linkingb. Connectingc. Implementingd. Granting |
A. Linking |
|
68. When multiple GPOs are linked to a container, which GPO in thelist has the highest priority? a. the firstb. the lastc. the most permissived. the most restrictive |
A. The first |
|
69. The three types of Group Policy Objects (GPOs) include local,domain and _____. a. OUb. universalc. starterd . nonlocal |
C |
|
Where is the path to the default GPT structure for a domain? a. %systemroot%\SYSVOL\sysvol\\Policies\ .b. %systemroot%\SYSVOL\sysvol\\Policies\{GUID} c. %systemroot%\SYSVOL\sysvol\\Policies d. %systemroot%\SYSVOL\sysvol\92867" |
c |
|
Local GPOs contain fewer options than domainGPOs. Local GPOs do not support...... |
Folder redirection or Group Policysoftware installation |
|
Configuring a Central Store of ADMX files help solvethe problem of |
SYSVOL bloat |
|
Regarding Group Policy in Windows Server 2008 and Windows Vista,Microsoft used the token-based administrative template (ADM) files. What didMicrosoft replace ADM files with in Windows Server 2012? |
ADMXfiles (XML-based file format) |
|
Whatis the Microsoft Management Console (MMC) snap-in that you use to create GPOsand manage their deployment to AD DS objects? |
Group Policy Management consolemily:'?V-] |
|
Canan administrator launch the Group Policy Management console from a workstation:"Tim'?7L] |
Yes, if the workstation is running the RemoteServer Administration Tools package'?h+] |
|
Group Policy settingsare divided into two subcategories: User Configuration and ComputerConfiguration. Each of those two are further organized into three subnodes.What are the three? |
Softwaresettings, Windows settings, and Administrative Templates |
|
What application orinterface allows you to configure security filteringe |
Group Policy Management console |
|
What is the order inwhich Windows systems receiving and process multiple GPOs. |
LSDOU (local, site, domain, then OU) |
|
Whatare the two categories of security settings within Group Policy? |
User AND Computer |
|
ComputerConfiguration node security settings include several security areas. Which ofthe following is NOT one of them |
Wireless NetworkPolicies (IEEE 802.3)/ |
|
Whatare the three primary event logs |
Application, Security, and System |
|
Whatimpacts the types of logs and events logged on a server |
Roles installed |
|
Whatis the default size for each of the three Event logs" |
16,384 KB |
|
Whatpolicy setting enables you to specify group membership lists, allowing you tocontrol membership in important groups, such as the local Administrators andBackup Operators groups?? |
Restricted Groups policy |
|
Whatis a collection of configuration settings stored as a text fileser |
1.Security template |
|
Whendoes Windows apply Computer Configuration policies by default |
1.When the computer starts up |
|
Whendoes Windows apply User Configuration policies by default |
As the user logs in |
|
Whatis the simplest way to deploy a security template on several computerssimultaneously- |
Importing the security template into a GPO |
|
What is the purpose of the Audit Policy section of alocal GPO? |
Administrators canlog successful and failed security events, such as loss of data, accountaccess, and object access |
|
You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing? |
You can disable the setting area that is notconfigured for faster processing |
|
Whatare the two interfaces for creating and managing local user accounts a computerjoined to the domain? |
User Accounts control panel and the Local Users andGroups snap-in for MMC |
|
Whatservice works with Group Policy to install, upgrade, patch, or remove softwareapplications |
Windows Installer |
|
Whatis required to prepare applications with an approval stamp from Microsoft onits packaging, including the Certified for Windows Server 2012 R2 logo, forWindows Installer? |
Nothing—the application is Windows Installer-enabled- |
|
When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application? |
Assigning forces the application, whereas publishingprovides the option to install. |
|
Afterdeploying software by GPO using the Assigned option, where is the package madeavailable for the user |
Start menu or desktop |
|
Whenconfiguring software restriction policies, there are four rules that helpdetermine the programs that can or cannot run. Select which of the following isNOT one of those rules |
File location rule? |
|
MicrosoftWindows Server 2008 uses the Windows Installer with Group Policy to install andmanage software that is packaged into what type of file- |
.msi |
|
Whatis AppLocker also known as |
Application control policies-x |
|
Inwhat Group Policy objects container are AppLocker settings locatedz |
Computer Configuration\Windows Settings\SecuritySettings\Application Control Policies\AppLockerx |
|
WhatWindows versions support the use of AppLocker polices, which poses adisadvantage compared to using software restriction policiesz |
1.Windows 7 and Windows Server 2008 R2 or laterz |
|
Howdoes AppLocker handle all executables, installer packages, and scripts bydefaultxx |
AppLocker blocks all by default, except for thosespecified in Allow rules. |
|
Whatservice does AppLocker require running to function properly? z |
Application Identitys. |
|
Whatare the three default security levels within software restriction policiesx |
? Unrestricted, Disallowed, and Basic Userx |
|
Firewall rules function in two ways: admit alltraffic, except that which conforms to the applied rules, and secondly, blockall traffic, except that which conforms to the applied rules. How does theWindows Firewall work for inbound traffic and for outbound traffic? |
Inbound—block all. Outbound—permit all |
|
Whatdoes a firewall protect your company against-familyx |
? Network intrusion attempts, such as a denial ofservice attackx |
|
Whatare the three profiles for firewalls/html>x |
The firewall is turned on. Incoming traffic is blocked unless itmatches a rule.Outgoing traffic is allowed unless itmatches a rule. |
|
Forthe Windows Firewall private profile, what type of network is expected; |
Aninternal network that is not accessible by unauthorized users |
|
Afeature that enables you to display inbound or outbound rules according to theprofile they apply to, their current state, or the group to which they belong |
filter |
|
Ifa user attempts to use an Internet-based e-mail account, how will WindowsFirewall respond |
1.The firewall does not block client-initiated network traffic bydefault. |
|
Whattool offers more flexibility in creating rules compared with the WindowsFirewall interface under Control Panel? |
1.Windows Firewall With Advanced Securitysnap-in for the Microsoft Management console |
|
Inthe Windows Firewall With Advanced Security console, while creating a new rule,the Program page specifies whether the .................. |
1.rule applies to all programs, to onespecific program, or to a specific servicel> |
|
Whatis a file with a.wfw extension |
1.Policy file |
|
Ifan administrator wants to enable the "Block all incoming connections,including those in the list of allowed apps" setting, to which of the firewallprofiles does it apply? ; |
1.Public, private, and domain/ |
|
WindowsFirewall allows an administrator to import and export firewall rules. What arethe rules' file extension |
.wfwk |
|
Whatis the typical incoming port number for a web server? |
80 |
|
WhatGPO node presents the interface with which to configure Windows Firewallproperties |
Computer Configuration\Policies\WindowsSettings\Security Settings\Windows Firewall with Advanced Security |