Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
141. What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use? |
software life cycle
|
|
142. Which of the following is not a phase of the software life cycle?
|
evaluation
|
|
143. Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
|
.msi
|
|
144. Modifications to .msi files require transform files, which have the __________ extension.
|
.mst
|
|
145. __________ files are used to apply service packs and hotfixes to installed software.
|
Patch
|
|
146. Before deploying software using Group Policy, what must you create?
|
distribution share
|
|
147. What option allows users to install the applications that they consider useful to them?
|
Publish
|
|
148. What option is helpful when you are deploying required applications to pertinent users and computers?
|
Assign
|
|
149. What allows published applications to be organized within specific groupings for easy navigation?
|
software categories
|
|
150. What policies are designed to identify software and control its execution?
|
Software Restriction
|
|
151. When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
|
Basic User
|
|
152. By default, the Software Restriction Policies area has what value in the Default Security Level setting?
|
Unrestricted
|
|
153. Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
|
hash rule; certificate rule; Path rule; all of the above
|
|
154. What is a series of bytes with a fixed length that uniquely identifies a program or file?
|
hash
|
|
155. What identifies software by specifying the directory path where the application is stored in the file system?
|
path rule
|
|
156. What type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network?
|
network zone rules
|
|
157. When implementing multiple Software Restriction Policy rules, which rule is always applied last?
|
path rule
|
|
158. What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?
|
enforcement
|
|
159. What Software Restriction Policy properties allow an administrator to control how certificate rules are handled?
|
trusted publishers
|
|
160. What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?
|
.zap |