Why would you use multicasting for WDS?
It requires less space on the client system
It decreases deployment time
It supports IPv6 and DHCPv6
It minimizes network traffic
What two things should you check if a particular client is having problems downloading and installing software?
local policy and the update schedule
group policy and the update schedule
local policy and the Windows Update log
group policy and the Windows Update log
What single performance indicator can tell you if your CPU is over capacity and needs to be replaced?
Disk Queue Length
Paging File % Usage
Physical Disk Time
Processor Time
What is the primary difference between domain-based namespace and stand-alone namespace?
Where the namespaces are stored
The names given to namespaces
The number of servers participating in the namespace
The requirement for at least one Windows Server 2008 system
By default, where are storage reports saved?
C:\StorageReports\Scheduled
C:\StorageReports\Saved
C:\StorageReports\Queued
C:\StorageReports\Quotas
If you’re a command-line user, what command will encrypt files and folders?
encrypt.exe
compress.exe
cipher.exe
efs.exe
Which utility do you use to access advanced audit policy settings?
Local Policy Editor
Group Policy Editor
Domain Policy Editor
Schema Policy Editor
What is the major reason behind using a forwarder?
To decrease client DNS lookups outside your network
To improve the efficiency of name resolution for your computers
So that your servers only perform recursive queries
To justify the use of multiple DNS server layers
Before creating PTR records, what DNS objects should you create?
reverse lookup zones
CNAME records
SOA records
NS records
Which Windows Server 2012 R2 server role is useful to install the Web Application proxy for AD FS?
AD FS
Remote Access
Remote Desktop
Web Services
What does the netsh namespace show policy command do?
Shows the DNS search order
Displays the static routing table for a namespace
Shows the NRPT rules are configured on the policy
Displays local direct access security policy
What process determines what a user is permitted to do on a computer or on a network?
access
authorization
authentication
permission
Identify the correct NPS templates. Select all that apply.
Shared Secrets
NPS Filters
Health Policies
RADIUS Clients
Which computers are not affected by VPN enforcement?
Newly deployed computers
Computers that access the LAN remotely
Isolated computers
Locally connected computers
Identify another utility that you can use to add SPNs to an account.
setspn
spnedit
dnscmd
netsh
The global catalog stores a partial copy of all objects in the forest. What are the reasons for keeping that partial copy? Select all that apply.
logon
object searches
universal group memberships
schema integrity
Which of the following ntdsutil commands cleans up metadata?
metadata defrag
metadata cleanup
metadata restore
metadata repair
What is the secpol.msc utility used for?
editing group policies
editing local security policies
editing global security policies
editing domain-level policies
If a site, domain or OU has multiple GPOs, how are the group policies processed?
by precedence
by importance
by administrative control
by GPO controller policy
What are MST files used for?
They deploy customized software installation files
They are template files for software packages
They are custom patch files
They specialize in software installation test files
GPP can be configured on domain controllers running which version of Windows Server? Select all that apply.
2003
2008
2008 R2
2012
What is a collection of files store in the SYSVOL (%SystemRood%\SYSVOL\<Domain>\Policies\<GPOCUID>) of each domain controller?
Group Policy Container (GPC)
Group Policy Template (GPT)
migration table
delegation
To give someone permission to manage a particular GPO, you use the Delegate Permissions Security Settings( Delegate, Permissions, Security, Settings ) tab of the individual GPO.
Which domain users are automatically granted permissions to perform Group Policy Management tasks?
local administrators
power users
domain administrators
domain users
Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files?
.ini
files
folders
environment
Which items can you configure shortcuts to in performing GPP deployments? Select all that apply.
Windows Firewall applet
Documents folder
Microsoft Excel
Printer
Which utility do you use to create GPO preferences?
Group Policy Management Editor
Group Policy Preference Editor
Group Policy Wizard
Which component allows you to create multiple Registry preference items based on registry settings that you select?
the Registry Scope
the Registry Extension
the Registry Configurator
the Registry Wizard
When working with Network Drive Mapping Preferences, which preference behaviours delete drive mappings? Select all that apply.
Create
Replace
Update
Delete
To copy, replace, update, or delete files, you can use wildcard characters. Which wildcard characters can you use? Select all that apply.
?
X
$
*
Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply.
If they've become corrupted
If someone deleted one of the policies
To refresh policy settings
As a regular part of domain maintenance and housekeeping
If you don't want a GPO to apply, which group policy permission do you apply to a user or group?
Disallow Apply
Disallow Read
Disallow Write
Disallow Modify
Which of the following is the most efficient method of using WDS on a very large network?
Unattended installation using bootable media
Bootable media using discover images
Unattended installation using PXE boot
Installation using PXE boot
What two things should you check if a particular client is having problems downloading and installing updates?
Local policy and update schedule
Group policy and update schedule
Local policy and the windows update log
Group policy and the windows update log
The event viewer is essentially what kind of tool?
Registry cleanup
Conflict resolver
Log viewer
Performance monitor
When should you increase the default quota size for the staging folder?
When the staging folder approaches 90% capacity
When bandwidth is available
When you have multiple large files that change frequently
When replication queues back up for more than two hours
What FSRM feature can you use to show the state of file server volumes, quotas, and disallowed files?
Storage reports
Storage Exceptions
Storage Quotas
Storage Assessment
Public-key cryptography uses how many keys?
Two
One
Two-pair
256
Why are success audits as important as failure audits?
Successes are important to troubleshooting for establishing baselines of normal behaviour
Successes are included by default and can be filtered out
Successes can point to security breaches as well as normal behaviour
Successes allows you to track activity such as a new account creation
Why would you implement a caching-only DNS server on your network?
To speed DNS queries and decrease networking traffic
To avoid installing and configuring a full-blown DNS server
To reduce the amount of maintenance for administrators
To reduce complexity in a network environment
If you issue the command nslookup 192.168.1.50 and got no response, but then issue nslookup server1 and receive 192.168.1.50 ?
The CNAME record is incorrect
The PTR record doesn’t exist
The A record doesn’t exits
The SOA for the zone is malformed
What is the first thing to check when troubleshooting VPN problems?
Network connectivity
Usernames and passwords
DNS lookups
Firewall settings
Which one of the Remote Access Management interfaces gives you the most control?
The Run the Remote Access Setup Wizard
The Run the Getting Started Wizard
The Remote Access Management Console
The command line dnsmcd.exe command
What kind of RADIUS server is placed between the RADIUS server and RADIUS clients?
A RADIUS proxy server
A RADIUS engine server
A ARDIUS client server
A RADIUS relay server
RADIUS Access-Request message are processed and forwarded by NPS only if the settings of the incoming message match what on the NPS server?
One of the connection request policies
The time zone of the requestor
The client type of the requestor
The TCP/IP port of the requestor
Health policies are connected to what two policies?
Compliance policies
Network policies
Connection request policies
Performance policies
What type of account is an account under which operating system, process, and service runs?
User
System
Service
Network
What two things must you do to a Windows Server to convert it to a domain controller?
Install AD DS
Execute dcpromo from Server Manager
Install Server Manager
Install DNS
Install Server Manager Tools
Why can you not modify snapshots?
They are read-only
They are encrypted
They are compressed and zipped
They are binary files
By default, who has read/write capability to the Default Domain Policy?
Local administrators
Power users
Domain users
Domain administrators
GPO are processed on computer start up and after logon. Why is the user never aware of the processing?
Processing is hidden from the users
The user is too busy to be aware of to the processing
The processing occurs when the system is not being used
The user is aware of the only startup delays
What is the central Store?
An App store from which you can deploy GPO
A public share that allows users to place GPO request into a queue
A repository for Administrative Templates
An online App Store for Administrative Templates
Where do you place a discover image to ensure proper deployment?
In the PXE configuration parameters
In memory
On a network share
On bootable media
What two ways can you assign computers to groups in WSUS?
Client-side and Server-side targeting
Upstream and Downstream targeting
Client-side and Upstream targeting
Downstream and Distributed targeting
You have a centralized file server and a remote file server. You want to configure DFS replication between the two servers so that you can perform backups with the centralized file server. You started to perform DFS replication but determine that it will take weeks for the initial replication to occur. How can you speed up the initial replication?
Configure the replication to use full speed
Assign two NICs to the site server
Ship a disk with the files, preseed the files, clone the database from the remote file server, and import the database into the centralized file server
Copy the files manually from the site server to the centralized file server
Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of many audit subsettings?
23
53
56
64
Which one of the following is an example of an FQDN?
SERVER1
192.168.50.1
sales.microsoft.com
C:\WINDOWS\SYSTEM32\DRIVERS\ETC\HOSTS
A Start of Authority record specifies what kind of information about a zone?
A list of hosts or A names
A list of canonical (CNAME) records
The zone serial number
A reverse lookup record
Why are phone lines and ISDN not used today for remote access services (RAS)?
They no longer supply acceptable bandwidth
They create dedicated access
They’re not secure enough
They’re too expensive
Which one of the following operating systems may not act as a DirectAccess client?
Windows 7 Enterprise
Windows Server 2008
Windows Server 2008 R2
Windows 8
Using what feature can streamline the creation and setup of RADIUS servers?
build guidelines
documentation
templates
wizards
The default connection request policy uses NPS as what kind of server?
DNS
Active Domain controller
RADIUS
RRAS
What is the purpose of the System Health Agent (SHA)?
To provide feedback to the system for CPU, memory, and disk health
To provide feedback to the Security Health Validator (SHV)
To provide feedback on the status of system protection and updates
To provide feedback on overall critical performance to a central collector
NTLM uses a challenge-response mechanism for authentication without doing what?
Revealing the client’s operating system to the server
Revealing the protocol to the server
Sending a password to the server
Sending an encrypt/decrypt message to the server
When you add attributes to an Active Directory object, what part of the domain database are you actually changing?
FSMO
Schema
Directory Structure
Organizational Units
If a single domain controller’s AD database becomes corrupt, which types of restore should you perform on it?
authoritative
nonauthoritative
explicit
full
The default maximum password age is how long?
12 days
36 days
42 days
86 days
Which utility do you use to set up loopback policies?
Server Manager
Active Directory Users and Groups
PowerShell
What is an Active Directory object stored in the Group Policy Objects container with the domain naming content of the directory that defines basic attributes of the GPO but does not contain any of the settings?
What object can you create to organize Registry preference items?
A Collection
A file system folder
A Control Panel applet
An OU
To convert a discover image to a bootable ISO image, what non-included component do you need to download and install?
Windows Assessment and Deployment Kit (ADK)
Windows Application Programming Interface (API)
Windows Public Key Infrastructure(PKI)
Windows Software Development Kit(SDK)
You work for an organization that has a mix of Windows 7,Windows 8, and Windows 8.1 computers. You will be using WSUS to deploy Microsoft updates to those computers. What is the number of computer groups required for the updates?
None
Three
What can Task Manager tell you about performance?
That you might have a bottleneck
That you need to reboot the system
That you need a larger hard drive
That your system needs to be replaced
If you want to save on CPU and disk I/0 but consume more network bandwidth for replication, which DFS feature can you disable?
Remote differential compression (RDC)
Collective compression technology (CCT)
Shortest path replication (SPR)
Server-to-server replication compression (S2SRC)
What effect does using quotas in File Server Resource Manager have?
It limits the number of files allocated to a user
It limits the number of access licenses allotted to a server
It limits the number of drive mappings to a shared resource
It limits the number of gigabytes allocated to a volume or folder
An encrypted file can be converted back to its original format by a process known as what?
Encryption
Digitization
Decryption
Encapsulation
What command do you use to manage auditing at the command prompt?
Auditpol.exe
Adpolicy.exe
Audit.exe
Policy.exe
What is the first and most important step in installing and deploying DNS in your network?
Planning the infrastructure and service requirements
Setting up an AD so that DNS can be integrated into it
Configuring the forward and reverse lookup zones correctly
Splitting the network into subdomains
If you have a server named server1.blah.com, want to use it as your web server, and have requests point to www.blah.com, what kind of DNS record would you create?
A CNAME record
An A record
A PTR record
An NS record
Why would you set verify Caller ID on a remote dial-up connection for a user?
For enhanced security
Because you don’t trust the user
Because you want users to call in only from specific numbers
Because it’s the default setting
What is the best reason for deploying DirectAccess connectivity for remote users?
Remote users computers can be easily managed and kept up to date
Remote users computers connect automatically
Remote computers connect via encrypted links over the internet
Remote users can access corporate resources
What is the final step in the authentication, authorization and accounting scenario between an access client and the RADIUS server?
An accounting-response to the access server
A log entry that the connection is established
An access-reject message to the access server
A final credential check with the domain controller
To what type of file do you export an NPS configuration?
TXT
XML
DOC
NPS
What happens to a computer that isn’t running Windows Firewall?
The computer is isolated
The computer is powered off
A server message is sent off the computer
An event is logged
What are the two restrictions for adding SPNs to an account?
Domain Administrators privileges
Full control permissions for the folder
Local administrator privileges
The editor runs from the domain controller
Which command-line command do you use to allow Windows Server 2003 domain controllers to replicate to RODCs?
ADPrep /RODCPrep
Netdom /RODCPrep
Netsh /RODCPrep
Ntdsutil /RODCPrep
What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory controllers and objects?
The Active Directory Recycling Bin
The Active Directory Lost and Found Folder
The Active Directory Undelete utility
Active Directory Snapshots
How should you assign Password Settings Object(PSOs) to users?
Assign the PSOs to a global security group and add users to the group
Assign the PSOs to a new group and add the users to the new group
Assign the PSOs directly to individual users
Assign the PSOs to various Active Directory groups as needed
What is the default timeout value for GPOs to process on system startup?
600 seconds
300 seconds
120 seconds
60 seconds
Which of the following are legitimate Administrative Template Property Filters? Select all that apply?
Keyword Filters
Requirements Filters
Security Filters
Operating System Filters
21. To give someone permission to manage to particular GPO, you use the Delegation Security Settings Permissions( Delegation, Security, Settings, Permissions ) tab of the individual GPO?
To copy, replace, upload, or delete files, you can use wildcard characters. Which wildcard characters can you use?
Which feature allows you to add driver packages to WDS and then deploy them?
dynamic driver provisioning
dynamic image provisioning
dynamic package provisioning
dynamic service provisioning
Other than the default computer group, how many other groups may a computer be assigned to in WSUS?
Four
Sixteen
Resource Monitor is a powerful tool for understanding how your system resources are used by what two system consumers?
services and processes
handles and services
files and processes
processes and handles
Which replication topology is more efficient than the default replication topology and allows you to set bandwidth, timing, and directionality to your configuration?
meshless
hub/spoke
token ring
collective mesh
When using File System Resource Manager, which group must you be a member of to enable SMTP?
Administrators
Domain Users
Schema Admins
Power Users
Where can you view audit events?
In security logs in Event Viewer
In the C:\Temp\Logs folder as text file
In System logs in Event Viewer
By using audit /logs at the command line
What is one of the primary advantages to using Active Directory to store DNS information?
Fault tolerance
Zero configuration
Low maintenance
Reverse zone lookups
Which command do you use to verify local DNS settings?
ipconfig /all
ping localhost
tracert <dns_servername>
nslookup <dns_servername>
Of the four VPN tunneling protocols, which has the weakest encryption?
PPTP
SSTP
IKEv2
L2TP
What does the acronym ISATAP stand for?
Intra-Site Automatic Tunneling Address Protocol
Industry Standard Architecture Tunnel Access Protocol
Industry Standard Architecture Tunnel Addressing Protocol
Inter-Site Automated Tunnel Addressing Protocol
Which system is the destination for Accounting-Start messages?
The RADIUS accounting server
The RADIUS relay server
The RADIUS proxy server
The RADIUS web server
Which two of the following are Routing and Remote Access IP settings?
Client May Request an IP Address
Server Must Supply an IP Address
Server Must Request an IP address
Client Must Supply an IP address
Which of the following is the format for a virtual account used with Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?
NT Service\servicename
Domainname\servicename
Computername\servicename
NT Servie\servicename$
What utility must you run on a cloned system to ensure that the clone receives its own SID?
sysprep
adprep /renew
dcpromo
ntconfig
What is a GUID?
A unique identifier for a snapshot
A special file permission
An Active Directory object ID
A group-user ID in Active Directory
The downward flow of group policies is known as what feature of GPOs?
Cumulative processing
Inherent processing
Inheritance
Control
Where is the default location for ADMX files?
C:\Windows\PolicyDefinitions
C:\Windows\Inf
C:\Windows\System32\XML\ADMX
C:\Windows\SYSVOL\ADMX
How do you stop processing a preference if an error occurs?
Select the Stop processing items option on the Common tab
Select the Remove this item option on the Common tab
Select the Stop on any error option in the CPP Wizard
Select the Stop on all errors option in the GPP Wizard
Where in a system do you configure PXE?
BIOS
Windows PE
Dism
Sysprep
What critical steps you should perform before applying patches or updates?
Select all critical updates for installation
Be sure that you have a good backup
If you install SQL Server and third-party backup service on the same system, what rule should you follow when creating service accounts?
Use separate accounts for both services
create difficult-to-guess usernames and passwords
add the service accounts to the local administrator groups
Use a single account for both services
What type of special cache folder does each replication folder use to hold files ready to be replicated?
Staging folder
Replication folder
Upload folder
Cache folder
What is the purpose of setting soft quotas?
To notify users when they have reached the quota limits
To list files that need to be deleted
To identify users who violate quotas
To determine where hard quotas need to be set
Encryption is the process of converting data into what kind of format?
Unreadable
Compiled
Hidden
Non-functional
Why should you avoid using basic audit policy settings and advanced audit policy settings together?
Audit policies might cause conflicts or erratic behaviour
Setting too many policies can put your system in an “out of compliance” state
The two audit settings ranges have too much redundancy or overlap between them
The amount of auditing will fill up event logs to quickly
A specific, individual computer or other network device in a domain is known as what?
Host
Top-level system
Entity
Server
You can use the dnscmd command to create zones. What other tasks can you perform with it?
Delete resource records
start/stop the DNS service
perform name service queries
install DNS services
You would create a RADIUS template so that you can do what with it?
Easily create multiple RADIUS servers from it
Consistently create multiple RADIUS servers from it
Create RADIUS servers without affecting the functionality of NPS
Apply it to the select servers
What is the last setting in the Routing and Remote Access IP Settings?
How IP addresses are assigned
The number of assigned IP Addresses
Which DHCP server will supply the requests
Which NPS server to connect to
What type of protocol is Kerberos?
A secure network authentication protocol
A simple Microsoft-only protocol
A uni-directional authentication protocol
A certification-based authentication protocol
What version of Windows Server introduced incremental universal group membership replication?
2000
What is the purpose procedure for removing a domain controller from active directory?
Shut down the domain controller and manually remove it from AD
Uninstall Active Directory Domain Services
Use dcpromo to demote the domain controller
Enter the DSRM and delete Active Directory
Account Policies contain various subnets. Which one of the following are legitimate subnet of account policies. Choose all that apply?
Password Policy
Account Lockout Policy
Kerberos Policy
Username Policy
What is the best method of dealing with slow-link processing?
Changing the slow-link policy processing behaviour
Placing a read-only domain controller at the slow-link site
Disabling GPO processing for slow-link systems
Increasing the link bandwidth above 5000 kbps
The security template allows you to configure which of the following settings? Choose all that apply
System Services
Registry Permissions
File System Permissions
Registry Entries
If you don’t want a GPO to apply, which group policy permission do you apply to a group or user?
Windows Settings has multiple preference extensions. Identify all that apply.
Registry
Shortcuts
Folders
Storage
What Microsoft tool do you use to create and manage Windows setup answer files?
System Image Manager (SIM)
Deployment Image Servicing and Managing (Dism.exe)
System Preparation utility (Sysprep.exe)
Windows Preinstallation Environment (Windows PE)
Which of the following is the proper method of starting the Windows Update service?
net start wuauserv
net start wsusrv
service start suauserv
service start wsusrv
When you set a service to start automatically with delayed start, how long is the delay?
Two minutes
One minute
Five minutes
Delayed until all other services start
What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers?
File Screening
Windows Defender
Quotas
Windows Firewall
From a security standpoint, which BitLocker operational mode is most secure?
TPM + startup key
TPM + startup PIN
Startup key only
TPM only
Auditing is used for what purpose?
Recording user's actions
Authenticating users
Authorizing users
Assessing a user’s permissions
What type of structure does DNS have?
Hierarchical distributed
Flat distributed
Top-down distributed
Wheel-spoke distributed
What does Time to Live (TTL) mean in DNS parlance?
The length of time a record remains in DNS cache
The length of time it takes a DNS query to process
The length of time required to process an iterative query
The length of time between zone updates
DirectAccess was introduced with which workstation/server pair?
Windows 7/Windows Server 2008 R2
Windows XP/Windows Server 2003
Windows Vista/Windows Server 2008
Windows 8/Windows Server 2012
Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server?
Priority
Relay link number
Weight
Precedence
To which type of file do you export an NPS configuration?
Which two components must a NAP client have enabled in order to use NAP?
Security Centre
NAP Agent
Windows Update
DHCP client
What is the name by which a client uniquely identifies an instance of a service?
service principal name
service instance name
service account name
service provider name
Where are you most likely to see a Read-Only Domain Controller (RODC)?
In a remote site
In a small network instead of an enterprise
In an enterprise network
In the place of a standard domain controller
By default, how often does Active Directory “garbage collection” occur?
Every 12 hours
Every 45 mins
Every 2 hours
Every 6 hours
What is an easy method of creating a strong password?
Start with a sentence and then add numbers and special characters
As a friend for some ideas for good passwords and then add your own number and characters
Use your favorite football team name with numbers and special characters
Use your username and add numbers and special characters.
What is the primary purpose of running the Group Policy Results Wizard? Select all that apply.
To analyze the cumulative effect of GPOs
For GPO troubleshooting
To guarantee that GPOs are enforced in full
To ensure that you have administrative rights to the client computer
Which of the following are legitimate Administrative Template Property Filters? Select all that apply.
Operating System Files
GPPs are divided into which two sections?
Windows and Control Panel
Applications and Control Panel
Applications and Registry
Windows and Registry
It decrease deployment time
It supports IPV6 and DHCPv6
WSUS can retrieve updates directly from Microsoft or from what other sources?
Another WSUS server on your network
a secondary Microsoft Windows Update location
the original Windows installation media
a public FTP site
When troubleshooting services on your system, why might you want you want to start up in Safe mode?
Because the system starts only the core services
Because the system gives you limited rights
Because the system loads a minimal set of drivers
Because the system boots with a lower screen resolution
What is the default quota size of the conflict and deleted folder?
660 MB
500 MB
800 MB
1250(1.25 GB)
When storage space is at a premium, what should you do to ensure that everyone has enough space?
Set up hard quota limits with email notification
Set up very restricted soft quota for users with email notification
Set up file groups so that users can’t save very large files
Set up a soft quota limits with no notification
What key length is considered to be minimally strong for encryption algorithms?
80
120
By using what type of policy can you track, limit or deny a user’s ability to use removable storage devices such as a USB in Windows 2012?
Removable Device Access
Storage Device Audit
Removable Storage Access
USB Storage Access
Which TCP/UPD port does the DNS Server use to communicate?
25
443
What term is defined as private data placed in a packet with a header containing routing information that allows the data to traverse a transit network, such as the Internet?
Routing
VPN
Tunneling
What utility do you use to configure DirectAccess?
Remote Access Management Console
DNS Console
Active Directory Console
DirectAccess Console
What information does the Accounting-Start message contain?
The type of service and the users it is delivered to
The RADIUS server name and IP address
The list of permissions granted to the user
The list of service provided to RADIUS access servers
What command-line utility is used to import and export NPS templates?
Netsh
Dnscmd
Msconfig
Net
Why do you need a web server as part of your NAP remediation infrastructure?
To provide internet access to users who fail compliance
To provide user information in case of a compliance failure
To redirect user request for restored network access
To further access how far out of compliance a user system is
When creating accounts for operating systems, processes, and services, you should always configure them with?
Using strong passwords
Grand the least rights possible
Using cryptic user names
Using built-in accounts
How many global catalogs are recommended for every organization?
At least two
At least one
At least three
No fewer than four
Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. What is that feature?
Restartable AD DS
The DSRM console
The ntdsutil comman0line utility
Active Directory Maintenance Mode
Which aspect of passwords is a key component of their strength?
Number of characters
Easy to remember
Dictionary basis
Keyboard complexity
What is an ADMX file?
An ADM file translator
The ADM format for newer operating systems
A template buffer
The protocol that deploys ADM files across networks
When you’re about to reset domain policy and domain controllers policy back to default with the dcgpofix.exe command, what final warning are you given before you accept the chance?
That all User Rights Assignments will be replaced
That you’re about to reset policies to their defaults
That all security for all the domain will be overwritten
That you’re about to restore all security to the default
Which Windows extension allows you to copy registry settings and apply them to other computers create, replace, or delete registry settings?
Applications
Environment
Files