• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

What is the proper term for associating a Group Policy to a set ofAD DS objects?


a. Linkingb. Connectingc. Implementingd. Granting

A. Linking



68. When multiple GPOs are linked to a container, which GPO in thelist has the highest priority?


a. the firstb. the lastc. the most permissived. the most restrictive

A. The first

69. The three types of Group Policy Objects (GPOs) include local,domain and _____.


a. OUb. universalc. starterd


. nonlocal

C

Where is the path to the default GPT structure for a domain?


a. %systemroot%\SYSVOL\sysvol\\Policies\


.b. %systemroot%\SYSVOL\sysvol\\Policies\{GUID}


c. %systemroot%\SYSVOL\sysvol\\Policies


d. %systemroot%\SYSVOL\sysvol\92867"



c

Local GPOs contain fewer options than domainGPOs. Local GPOs do not support......

Folder redirection or Group Policysoftware installation

Configuring a Central Store of ADMX files help solvethe problem of

SYSVOL bloat

Regarding Group Policy in Windows Server 2008 and Windows Vista,Microsoft used the token-based administrative template (ADM) files. What didMicrosoft replace ADM files with in Windows Server 2012?

ADMXfiles (XML-based file format)

Whatis the Microsoft Management Console (MMC) snap-in that you use to create GPOsand manage their deployment to AD DS objects?

Group Policy Management consolemily:'?V-]

Canan administrator launch the Group Policy Management console from a workstation:"Tim'?7L]

Yes, if the workstation is running the RemoteServer Administration Tools package'?h+]

Group Policy settingsare divided into two subcategories: User Configuration and ComputerConfiguration. Each of those two are further organized into three subnodes.What are the three?

Softwaresettings, Windows settings, and Administrative Templates

What application orinterface allows you to configure security filteringe

Group Policy Management console

What is the order inwhich Windows systems receiving and process multiple GPOs.

LSDOU (local, site, domain, then OU)

Whatare the two categories of security settings within Group Policy?

User AND Computer

ComputerConfiguration node security settings include several security areas. Which ofthe following is NOT one of them

Wireless NetworkPolicies (IEEE 802.3)/

Whatare the three primary event logs

Application, Security, and System

Whatimpacts the types of logs and events logged on a server

Roles installed

Whatis the default size for each of the three Event logs"

16,384 KB

Whatpolicy setting enables you to specify group membership lists, allowing you tocontrol membership in important groups, such as the local Administrators andBackup Operators groups??

Restricted Groups policy

Whatis a collection of configuration settings stored as a text fileser

1.Security template

Whendoes Windows apply Computer Configuration policies by default

1.When the computer starts up

Whendoes Windows apply User Configuration policies by default

As the user logs in

Whatis the simplest way to deploy a security template on several computerssimultaneously-

Importing the security template into a GPO

What is the purpose of the Audit Policy section of alocal GPO?

Administrators canlog successful and failed security events, such as loss of data, accountaccess, and object access

You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?

You can disable the setting area that is notconfigured for faster processing

Whatare the two interfaces for creating and managing local user accounts a computerjoined to the domain?

User Accounts control panel and the Local Users andGroups snap-in for MMC

Whatservice works with Group Policy to install, upgrade, patch, or remove softwareapplications

Windows Installer

Whatis required to prepare applications with an approval stamp from Microsoft onits packaging, including the Certified for Windows Server 2012 R2 logo, forWindows Installer?

Nothing—the application is Windows Installer-enabled-

When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?

Assigning forces the application, whereas publishingprovides the option to install.

Afterdeploying software by GPO using the Assigned option, where is the package madeavailable for the user

Start menu or desktop

Whenconfiguring software restriction policies, there are four rules that helpdetermine the programs that can or cannot run. Select which of the following isNOT one of those rules

File location rule?

MicrosoftWindows Server 2008 uses the Windows Installer with Group Policy to install andmanage software that is packaged into what type of file-

.msi

Whatis AppLocker also known as

Application control policies-x

Inwhat Group Policy objects container are AppLocker settings locatedz

Computer Configuration\Windows Settings\SecuritySettings\Application Control Policies\AppLockerx

WhatWindows versions support the use of AppLocker polices, which poses adisadvantage compared to using software restriction policiesz

1.Windows 7 and Windows Server 2008 R2 or laterz

Howdoes AppLocker handle all executables, installer packages, and scripts bydefaultxx

AppLocker blocks all by default, except for thosespecified in Allow rules.

Whatservice does AppLocker require running to function properly? z

Application Identitys.

Whatare the three default security levels within software restriction policiesx

? Unrestricted, Disallowed, and Basic Userx

Firewall rules function in two ways: admit alltraffic, except that which conforms to the applied rules, and secondly, blockall traffic, except that which conforms to the applied rules. How does theWindows Firewall work for inbound traffic and for outbound traffic?

Inbound—block all. Outbound—permit all

Whatdoes a firewall protect your company against-familyx

? Network intrusion attempts, such as a denial ofservice attackx

Whatare the three profiles for firewalls/html>x

The firewall is turned on. Incoming traffic is blocked unless itmatches a rule.Outgoing traffic is allowed unless itmatches a rule.

Forthe Windows Firewall private profile, what type of network is expected;

Aninternal network that is not accessible by unauthorized users

Afeature that enables you to display inbound or outbound rules according to theprofile they apply to, their current state, or the group to which they belong

filter

Ifa user attempts to use an Internet-based e-mail account, how will WindowsFirewall respond

1.The firewall does not block client-initiated network traffic bydefault.

Whattool offers more flexibility in creating rules compared with the WindowsFirewall interface under Control Panel?

1.Windows Firewall With Advanced Securitysnap-in for the Microsoft Management console

Inthe Windows Firewall With Advanced Security console, while creating a new rule,the Program page specifies whether the ..................

1.rule applies to all programs, to onespecific program, or to a specific servicel>

Whatis a file with a.wfw extension

1.Policy file

Ifan administrator wants to enable the "Block all incoming connections,including those in the list of allowed apps" setting, to which of the firewallprofiles does it apply? ;

1.Public, private, and domain/

WindowsFirewall allows an administrator to import and export firewall rules. What arethe rules' file extension

.wfwk

Whatis the typical incoming port number for a web server?

80

WhatGPO node presents the interface with which to configure Windows Firewallproperties

Computer Configuration\Policies\WindowsSettings\Security Settings\Windows Firewall with Advanced Security