Which utilities do you use to set up loopback policies?
Server Manager
Active Directory users and groups
Groups Policy Management Editor
PowerShell
Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings
GPO Turbo Mode
GPO Enhance Mode
Group Policy Update
Group Policy Caching
What happens when an application deployed via group policies become damage or corrupt?
The installer notifies the administrator of the faulty application
The installer will detect and reinstall or repair the application
The user must request a reinstall of the application
The user must initiate a repair of the application
Where is the default location for ADMX files?
C:\Windows\SYSVOL\ADMX
C:\Windows\System32\XML\ADMX
C:\Windows\inf
C:\Windows\PolicyDefinitions
GPOs are processed on computer startup and after logon. Why is the user never aware of the processing ?
processing is hidden form the user
the user is too busy to be aware of the processing
the processing occurs when the system is not being use
the user is aware of only startup delays
In which order are Group Policy objects (GPOs) processed?
Local group policy, site, domain, user
OU, domain, site, local group policy
local security policy, site, domain, OU
Local group policy, site, domain, OU
For users to receive GPO settings, they must have which two permissions to the GPO?
Allow Read
Allow Write
Allow Modify
Allow Apply
What is the primary purpose of running the Group Policy Results Wizard? check all that apply
to guarantee that GPOs are enforced in full
to analyze the cumulative effect of GPOs
for GPO troubleshooting
to ensure that you have administrative rights to the client computer
To use WMI filters, you must have one domain controller running which version of Windows Server or higher?
NT 4.0
2000
2003
The is no such requirement to use WMI filters
By default which GPO permissions are all authenticated users given?
Apply Group
Allow Group
Apply Global
Allow Global
How many WMI filters can be configured for a GPO?
one
two
four
eigth
What is an ADMX file?
An ADM file tranalator
the ADM format for newer operating systems
a template buffer
the protocol that deploys ADM files across networks
Windows installer cannot install .exe files. To distribute a software package that installs whit an .exe file, what must you do to do it?
convert it to ZIP file
convert it to an MSI file
convert it to an MSP file
convert it to an MST file
Which two of the following methods can you use to deploy security templates?
using Active Directory GPOs
using the Security configuration and Analysis snap-in
copying a text file to each managed computer's admin$ share
using a logon script
Which feature affects all users in the domain, including domain controllers?
Global Group Policy
Default Domain Policy
Default Group Policy
Default Global Domain Policy
Where would using Replace mode GPOs be appropriate?
in a classroom
in a developer environment
in a group of system administrator users
in a graphic design department
What language are ADMX files based on?
HTML
XML
SGML
Java
When configuring Group policy to deploy applications, the applications must be mapped to where?
UNC path
drive letter
shared folder
full install path
if you, as administrator, change an installed application, how do you update your users?
by redeploying the application via the GPO
by instructing the users to reinstall the application
by creating a GPO to remove the old application and installing the new one
by distributing the updates on next logon
the security template allows you to configure which of the following settings? Select all that apply.
System Services
Registry Entries
Registry Permissions
File System permissions
What is the filename extension for the files in which installation information is stored?
.txt
.xml
.ini
.msi
What is the name of the software component used for installation, maintenance, and removal of software on Windows
Control Panel
Add/Removed Programs applet
Windows Installer
Application Installer
What is the default timeout value for GPOs to process on Systems startup?
60 seconds
120 seconds
300 seconds
600 seconds
The downward flow of group policies is known as what feature of GPOs?
cumulative processing
inherent processing
inheritance
control
How are client-side extensions applied?
as part of group policies
as startup and logon scripts
to the local computer or currently logged-on user
as part of another policy
Identify all possible states of an Administrative Template.
Not Configured
Enable
Disable
Deployed
Which of the following operating systems can have its security settings managed by using security templates apply
Windows XP
Windows Vista
Windows 7
Windows 8
Unlike ADM files, ADMX files are not stored where?
in the Central Store
on the domain controller
in the SYSVOL folder
in individual GPOs
Where is the Central store located?
in the SYSVOL directory
Microsoft Online
TechNet
on a domain controller public share
At what point are WMI filters evaluated
when the filter is created
when the policy is applied
when the filter is applied
when the policy is processed
What is the best method of dealing with slow-link processing?
increasing the link bandwidth above 500 kbps
changing the slow-link policy processing behavior
disabling GPO processing for slow-link systems
placing a read-only domain controller at the slow-link site
What kind of group policies should you enable for student computers?
generic
loopback
extensive
compliant
Which two filters can you use to control who or what receives a group policy?
policy filter
Security Group Filter
domain filter
WMI filter
What is the first step in the GPO processing order?
the user initiates interactive logon
the computer obtains a list of GPOs from the domain controller
The computer establishes a secure link to the domain controller
the GPOs are applied to the computer and to the user
What are MST files used for?
They deploy customized software installation files
they are template files for software packages
they are custom patch files
they specialize in software installation test files
An application cannot be published to a ___________
GPO
user
group
computer
Which of the following are legitimate Administrative Template Property Filters? Select all that apply.
keyword filters
requirements filters
security filters
operating system filters