• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

141. What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use?

software life cycle
142. Which of the following is not a phase of the software life cycle?
evaluation
143. Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
.msi
144. Modifications to .msi files require transform files, which have the __________ extension.
.mst
145. __________ files are used to apply service packs and hotfixes to installed software.
Patch
146. Before deploying software using Group Policy, what must you create?
distribution share
147. What option allows users to install the applications that they consider useful to them?
Publish
148. What option is helpful when you are deploying required applications to pertinent users and computers?
Assign
149. What allows published applications to be organized within specific groupings for easy navigation?
software categories
150. What policies are designed to identify software and control its execution?
Software Restriction
151. When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Basic User
152. By default, the Software Restriction Policies area has what value in the Default Security Level setting?
Unrestricted
153. Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
hash rule; certificate rule; Path rule; all of the above
154. What is a series of bytes with a fixed length that uniquely identifies a program or file?
hash
155. What identifies software by specifying the directory path where the application is stored in the file system?
path rule
156. What type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network?
network zone rules
157. When implementing multiple Software Restriction Policy rules, which rule is always applied last?
path rule
158. What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?
enforcement
159. What Software Restriction Policy properties allow an administrator to control how certificate rules are handled?
trusted publishers
160. What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?

.zap