Michael Marcus
Quiz by , created more than 1 year ago

Final test quiz

957
1
0
Michael Marcus
Created by Michael Marcus almost 9 years ago
Close

Quiz 19-20

Question 1 of 37

1

Which utilities do you use to set up loopback policies?

Select one of the following:

  • Server Manager

  • Active Directory users and groups

  • Groups Policy Management Editor

  • PowerShell

Explanation

Question 2 of 37

1

Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings

Select one of the following:

  • GPO Turbo Mode

  • GPO Enhance Mode

  • Group Policy Update

  • Group Policy Caching

Explanation

Question 3 of 37

1

What happens when an application deployed via group policies become damage or corrupt?

Select one of the following:

  • The installer notifies the administrator of the faulty application

  • The installer will detect and reinstall or repair the application

  • The user must request a reinstall of the application

  • The user must initiate a repair of the application

Explanation

Question 4 of 37

1

Where is the default location for ADMX files?

Select one of the following:

  • C:\Windows\SYSVOL\ADMX

  • C:\Windows\System32\XML\ADMX

  • C:\Windows\inf

  • C:\Windows\PolicyDefinitions

Explanation

Question 5 of 37

1

GPOs are processed on computer startup and after logon. Why is the user never aware of the processing ?

Select one of the following:

  • processing is hidden form the user

  • the user is too busy to be aware of the processing

  • the processing occurs when the system is not being use

  • the user is aware of only startup delays

Explanation

Question 6 of 37

1

In which order are Group Policy objects (GPOs) processed?

Select one of the following:

  • Local group policy, site, domain, user

  • OU, domain, site, local group policy

  • local security policy, site, domain, OU

  • Local group policy, site, domain, OU

Explanation

Question 7 of 37

1

For users to receive GPO settings, they must have which two permissions to the GPO?

Select one or more of the following:

  • Allow Read

  • Allow Write

  • Allow Modify

  • Allow Apply

Explanation

Question 8 of 37

1

What is the primary purpose of running the Group Policy Results Wizard? check all that apply

Select one or more of the following:

  • to guarantee that GPOs are enforced in full

  • to analyze the cumulative effect of GPOs

  • for GPO troubleshooting

  • to ensure that you have administrative rights to the client computer

Explanation

Question 9 of 37

1

To use WMI filters, you must have one domain controller running which version of Windows Server or higher?

Select one of the following:

  • NT 4.0

  • 2000

  • 2003

  • The is no such requirement to use WMI filters

Explanation

Question 10 of 37

1

By default which GPO permissions are all authenticated users given?

Select one of the following:

  • Apply Group

  • Allow Group

  • Apply Global

  • Allow Global

Explanation

Question 11 of 37

1

How many WMI filters can be configured for a GPO?

Select one of the following:

  • one

  • two

  • four

  • eigth

Explanation

Question 12 of 37

1

What is an ADMX file?

Select one of the following:

  • An ADM file tranalator

  • the ADM format for newer operating systems

  • a template buffer

  • the protocol that deploys ADM files across networks

Explanation

Question 13 of 37

1

Windows installer cannot install .exe files. To distribute a software package that installs whit an .exe file, what must you do to do it?

Select one of the following:

  • convert it to ZIP file

  • convert it to an MSI file

  • convert it to an MSP file

  • convert it to an MST file

Explanation

Question 14 of 37

1

Which two of the following methods can you use to deploy security templates?

Select one or more of the following:

  • using Active Directory GPOs

  • using the Security configuration and Analysis snap-in

  • copying a text file to each managed computer's admin$ share

  • using a logon script

Explanation

Question 15 of 37

1

Which feature affects all users in the domain, including domain controllers?

Select one of the following:

  • Global Group Policy

  • Default Domain Policy

  • Default Group Policy

  • Default Global Domain Policy

Explanation

Question 16 of 37

1

Where would using Replace mode GPOs be appropriate?

Select one of the following:

  • in a classroom

  • in a developer environment

  • in a group of system administrator users

  • in a graphic design department

Explanation

Question 17 of 37

1

What language are ADMX files based on?

Select one of the following:

  • HTML

  • XML

  • SGML

  • Java

Explanation

Question 18 of 37

1

When configuring Group policy to deploy applications, the applications must be mapped to where?

Select one of the following:

  • UNC path

  • drive letter

  • shared folder

  • full install path

Explanation

Question 19 of 37

1

if you, as administrator, change an installed application, how do you update your users?

Select one of the following:

  • by redeploying the application via the GPO

  • by instructing the users to reinstall the application

  • by creating a GPO to remove the old application and installing the new one

  • by distributing the updates on next logon

Explanation

Question 20 of 37

1

the security template allows you to configure which of the following settings? Select all that apply.

Select one or more of the following:

  • System Services

  • Registry Entries

  • Registry Permissions

  • File System permissions

Explanation

Question 21 of 37

1

What is the filename extension for the files in which installation information is stored?

Select one of the following:

  • .txt

  • .xml

  • .ini

  • .msi

Explanation

Question 22 of 37

1

What is the name of the software component used for installation, maintenance, and removal of software on Windows

Select one of the following:

  • Control Panel

  • Add/Removed Programs applet

  • Windows Installer

  • Application Installer

Explanation

Question 23 of 37

1

What is the default timeout value for GPOs to process on Systems startup?

Select one of the following:

  • 60 seconds

  • 120 seconds

  • 300 seconds

  • 600 seconds

Explanation

Question 24 of 37

1

The downward flow of group policies is known as what feature of GPOs?

Select one of the following:

  • cumulative processing

  • inherent processing

  • inheritance

  • control

Explanation

Question 25 of 37

1

How are client-side extensions applied?

Select one of the following:

  • as part of group policies

  • as startup and logon scripts

  • to the local computer or currently logged-on user

  • as part of another policy

Explanation

Question 26 of 37

1

Identify all possible states of an Administrative Template.

Select one or more of the following:

  • Not Configured

  • Enable

  • Disable

  • Deployed

Explanation

Question 27 of 37

1

Which of the following operating systems can have its security settings managed by using security templates apply

Select one or more of the following:

  • Windows XP

  • Windows Vista

  • Windows 7

  • Windows 8

Explanation

Question 28 of 37

1

Unlike ADM files, ADMX files are not stored where?

Select one of the following:

  • in the Central Store

  • on the domain controller

  • in the SYSVOL folder

  • in individual GPOs

Explanation

Question 29 of 37

1

Where is the Central store located?

Select one of the following:

  • in the SYSVOL directory

  • Microsoft Online

  • TechNet

  • on a domain controller public share

Explanation

Question 30 of 37

1

At what point are WMI filters evaluated

Select one of the following:

  • when the filter is created

  • when the policy is applied

  • when the filter is applied

  • when the policy is processed

Explanation

Question 31 of 37

1

What is the best method of dealing with slow-link processing?

Select one of the following:

  • increasing the link bandwidth above 500 kbps

  • changing the slow-link policy processing behavior

  • disabling GPO processing for slow-link systems

  • placing a read-only domain controller at the slow-link site

Explanation

Question 32 of 37

1

What kind of group policies should you enable for student computers?

Select one of the following:

  • generic

  • loopback

  • extensive

  • compliant

Explanation

Question 33 of 37

1

Which two filters can you use to control who or what receives a group policy?

Select one or more of the following:

  • policy filter

  • Security Group Filter

  • domain filter

  • WMI filter

Explanation

Question 34 of 37

1

What is the first step in the GPO processing order?

Select one of the following:

  • the user initiates interactive logon

  • the computer obtains a list of GPOs from the domain controller

  • The computer establishes a secure link to the domain controller

  • the GPOs are applied to the computer and to the user

Explanation

Question 35 of 37

1

What are MST files used for?

Select one of the following:

  • They deploy customized software installation files

  • they are template files for software packages

  • they are custom patch files

  • they specialize in software installation test files

Explanation

Question 36 of 37

1

An application cannot be published to a ___________

Select one of the following:

  • GPO

  • user

  • group

  • computer

Explanation

Question 37 of 37

1

Which of the following are legitimate Administrative Template Property Filters? Select all that apply.

Select one or more of the following:

  • keyword filters

  • requirements filters

  • security filters

  • operating system filters

Explanation