Jesse Collins
Quiz por , criado more than 1 year ago

Brought to you by late night industries!

113
1
0
Jesse Collins
Criado por Jesse Collins aproximadamente 8 anos atrás
Fechar

CIT 214 Microsoft Server Configuration - Final Exam Part 2 - Basic Edition

Questão 1 de 71

1

What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?

Selecione uma das seguintes:

  • DCPROMO

  • LDIFDE

  • CSVDE

  • NSLOOKUP

Explicação

Questão 2 de 71

1

When using CSVDE, what is the first line of the text file that uses proper attribute names?

Selecione uma das seguintes:

  • header row

  • header record

  • name row

  • name record

Explicação

Questão 3 de 71

1

Which of the following utilities do you use to perform an offline domain join?

Selecione uma das seguintes:

  • net join

  • join

  • djoin

  • dconnect

Explicação

Questão 4 de 71

1

Which of the following is not a type of user account that can be configured in Windows Server 2012?

Selecione uma das seguintes:

  • local accounts

  • domain accounts

  • network accounts

  • built-in accounts

Explicação

Questão 5 de 71

1

Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012 R2?

Selecione uma ou mais das seguintes:

  • Network

  • Interactive

  • Administrator

  • Guest

Explicação

Questão 6 de 71

1

What is the PowerShell cmdlet syntax for creating a new user account?

Selecione uma das seguintes:

  • New-ADUser

  • New-User

  • New-SamAccountName

  • There is no PowerShell cmdlet for user creation.

Explicação

Questão 7 de 71

1

What is the PowerShell cmdlet syntax for creating a new computer object?

Selecione uma das seguintes:

  • New-Computer -Name <computer name> –path <distinguished name>

  • New-ADComputer -Name <computer name> –path <distinguished name>

  • New-ComputerName <computer name> –path <distinguished name>

  • There is no PowerShell cmdlet for creating computer objects.

Explicação

Questão 8 de 71

1

When using Netdom.exe to join an account, you may add the parameter [/OU:OUDN]. If this parameter is left out, where is the object placed?

Selecione uma das seguintes:

  • In the same organizational unit (OU) as the administrator running Netdom.exe

  • In the Users container

  • In the Computers container

  • Without the OU specified, the program will fail.

Explicação

Questão 9 de 71

1

Who may join a computer to the domain?

Selecione uma das seguintes:

  • No one, the computer does this itself when authenticating.

  • The computer joins the domain as part of the object creation process.

  • Only the domain administrator may join the computer to the domain.

  • Members of the computer’s local Administrators group may join the computer to the domain.

Explicação

Questão 10 de 71

1

What is the primary means by which people access resources on an Active Directory Domain Service (AD DS) network?

Selecione uma das seguintes:

  • By having a computer account

  • Being within the proper site and domain

  • By having elevated privileges

  • By having a user account

Explicação

Questão 11 de 71

1

What differences matter most in creating a single user versus multiple users?

Selecione uma das seguintes:

  • Single user creation is often done from the graphical user interface (GUI), whereas creating multiple users typically requires using command-line tools.

  • Creating a single user is simple, but manual work.

  • Time does not permit automating the creation of a single user.

  • When creating multiple users, not as many parameters are involved.

Explicação

Questão 12 de 71

1

What two graphical tools will help create either user or computer objects?

Selecione uma das seguintes:

  • Server Manager and PowerShell

  • Active Directory Administrative Center and Active Directory Users and Computer

  • Server Core and PowerShell

  • LDIFDE.exe and CSVDE.exe

Explicação

Questão 13 de 71

1

What is a key benefit to using ADAC or the Active Directory Users and Computers console?

Selecione uma das seguintes:

  • ADAC allows you to modify the properties of both multiple users and multiple computers at once.

  • ADAC allows you to import multiple objects at once.

  • ADAC allows you to modify the properties of multiple users or multiple computers at once.

  • ADAC not only helps create user and computer objects, but it helps join them to a domain.

Explicação

Questão 14 de 71

1

Are typical, authenticated users able to create computer objects in an Active Directory?

Selecione uma das seguintes:

  • No, it requires administrative rights to create a computer object.

  • Yes, if they are specially granted the Add Workstations To The Domain right.

  • No, users are not able to do so by default.

  • Yes, by default, users who are successfully authenticated to Active Directory are permitted to join up to 10 workstations to the domain, thus creating up to 10 associated computer objects.

Explicação

Questão 15 de 71

1

You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers?

Selecione uma das seguintes:

  • Delegation of control

  • Read-only domain controller

  • Multimaster replication

  • SRV records

Explicação

Questão 16 de 71

1

If the user named Amy is located in the sales OU of the central.cohowinery.com domain, what is the correct syntax for referencing this user in a command line utility?

Selecione uma das seguintes:

  • amy.cohowinery.com

  • cn=amy.ou=sales.dc=cohowinery.com

  • cn=amy,ou=sales,dc=central,dc=cohowinery,dc=com

  • dc=com,dn=cohowinery,ou=sales,cn=amy

Explicação

Questão 17 de 71

1

Which of the following is a container object within Active Directory?

Selecione uma das seguintes:

  • Folder

  • Group

  • User

  • OU

Explicação

Questão 18 de 71

1

Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest?

Selecione uma das seguintes:

  • Global

  • Domain

  • Built-in

  • Universal

Explicação

Questão 19 de 71

1

Which of the following is not a correct reason for creating an OU?

Selecione uma das seguintes:

  • To create a permanent container that cannot be moved or renamed

  • To duplicate the divisions in your organization

  • To delegate administration tasks

  • To assign different Group Policy settings to a specific group of users or computers

Explicação

Questão 20 de 71

1

Which of the following group scope modifications are not permitted? (Choose all answers that are correct.)

Selecione uma das seguintes:

  • Global to universal

  • Global to domain local

  • Universal to global

  • Domain local to universal

Explicação

Questão 21 de 71

1

In a domain running at the Windows Server 2012 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.)

Selecione uma ou mais das seguintes:

  • Users

  • Computers

  • Universal groups

  • Global groups

Explicação

Questão 22 de 71

1

You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)

Selecione uma ou mais das seguintes:

  • There are still members in the group.

  • One of the group’s members has the group set as its primary group.

  • You do not have the proper permissions for the container in which the group is located.

  • You cannot delete global groups from the Active Directory Users and Computers console.

Explicação

Questão 23 de 71

1

Select the best reasons for using organizational units (OUs)?

Selecione uma das seguintes:

  • Organizing by geography, assigning Group Policy settings, and applying security boundaries

  • Applying security boundaries, assigning Group Policy settings, and organizing by geography

  • Duplicating organizational divisions, assigning Group Policy settings, and delegating administration

  • Assigning Group Policy settings, administering delegation, and delegating administration

Explicação

Questão 24 de 71

1

What is the primary difference between universal groups and global groups in Windows Server 2012 R2?

Selecione uma das seguintes:

  • Global groups use less data in the global catalog. So, in considering replication traffic, universal groups should be within a site.

  • Universal groups use less data in the global catalog. So, in considering replication traffic, global groups should be within a site.

  • Universal groups use more data in the global catalog. However, global groups are best in general, both within a site and across sites.

  • Global groups use less data than universal groups, but not significantly.

Explicação

Questão 25 de 71

1

Generally, how do groups differ from OUs?

Selecione uma das seguintes:

  • Groups are security principals, meaning you assign access permissions to a resource based on membership to a group. OUs are for organization and for assigning Group Policy settings.

  • Groups are created by the Server Manager, but you create OUs by scripts.

  • OUs are security principals, meaning you assign access permissions to a resource based on membership to an organizational unit. Groups are for organization and for delegating permissions.

  • Organizational units are container objects made from the Active Directory Users and Computers console.

Explicação

Questão 26 de 71

1

What are the different kinds of groups?

Selecione uma das seguintes:

  • There are two types: security and distribution.

  • There are two types: security and distribution, and three group scopes: domain local, global, and universal.

  • There are three group scopes: domain local, global, and universal.

  • There are three group types: domain local, global, and universal.

Explicação

Questão 27 de 71

1

What command-line utility allows administrators to modify groups’ type and scope as well as add or remove members?

Selecione uma das seguintes:

  • PowerShell and the applicable cmdlet

  • Active Directory Users and Computers console

  • Active Directory Administrative Center

  • Dsmod.exe

Explicação

Questão 28 de 71

1

Which of the following types of files do Group Policy tools access from a Central Store by default?

Selecione uma das seguintes:

  • ADM files

  • ADMX files

  • Group Policy objects

  • Security templates

Explicação

Questão 29 de 71

1

Which of the following local GPOs takes precedence on a system with multiple local GPOs?

Selecione uma das seguintes:

  • Local Group Policy

  • Administrators Group Policy

  • Nonadministrators Group Policy

  • User-specific Group Policy

Explicação

Questão 30 de 71

1

Which of the following techniques can you use to apply GPO settings to a specific group of users in an OU?

Selecione uma das seguintes:

  • GPO linking

  • Administrative templates

  • Security filtering

  • Starter GPOs

Explicação

Questão 31 de 71

1

Which of the following best describes the function of a starter GPO?

Selecione uma das seguintes:

  • A starter GPO functions as a template for the creation of new GPOs.

  • A starter GPO is the first GPO applied by all Active Directory clients.

  • Starter GPOs use a simplified interface for elementary users.

  • Starter GPOs contain all of the settings found in the default Domain Policy GPO.

Explicação

Questão 32 de 71

1

When you apply a GPO with a value of Not Configured for a particular setting to a system on which that same setting is disabled, what is the result?

Selecione uma das seguintes:

  • The setting remains disabled.

  • The setting is changed to not configured.

  • The settings is changed to enabled.

  • The setting generates a conflict error.

Explicação

Questão 33 de 71

1

Local GPOs are stored ________, whereas Domain GPOs are stored _________.

Selecione uma das seguintes:

  • in Active Directory; in Active Directory

  • in Active Directory; on the local computer

  • on the local computer; in Active Directory

  • on the local computer; on the local computer

Explicação

Questão 34 de 71

1

By default, linking a GPO to a container causes all the users and computers in that container to receive the GPO settings. How can you modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?

Selecione uma das seguintes:

  • You cannot separate or divide permission assignments within the linked container.

  • You can create and link a different GPO to the applicable objects, overriding the previous GPO.

  • You remove the applicable objects and place in a new container.

  • You apply security filtering in the Group Policy Management console.

Explicação

Questão 35 de 71

1

When multiple GPOs are linked to a container, which GPO in the list has the highest priority?

Selecione uma das seguintes:

  • The last

  • The first

  • The most permissive

  • The most restrictive

Explicação

Questão 36 de 71

1

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of these two settings is further organized into three subnodes. What are the three subnodes?

Selecione uma das seguintes:

  • Software Settings, Windows Settings, and Delegation Templates

  • Software Settings, Windows Settings, and Administrative Templates

  • Security Settings, Windows Settings, and Delegation Templates

  • Security Settings, Windows Settings, and Administrative Templates

Explicação

Questão 37 de 71

1

What is the order in which Windows systems receive and process multiple GPOs?

Selecione uma das seguintes:

  • LSOUD (local, site, OU, and then domain)

  • LOUDS (local, OU, domain, and then site)

  • SLOUD (site, local, OU, and then domain)

  • LSDOU (local, site, domain, and then OU)

Explicação

Questão 38 de 71

1

What are the different types of Group Policy objects (GPOs)?

Selecione uma das seguintes:

  • Computer, user, and organizational unit

  • Local, domain, and starter

  • Local, domain, and universal

  • Site, domain, and organizational unit

Explicação

Questão 39 de 71

1

Installing Windows Server 2012 Active Directory Domain Services (AD DS) installs two default policies: Default Domain Policy and Default Domain Controller Policy. As an administrator, you need different policy settings than the default. What is the best approach to make those changes?

Selecione uma das seguintes:

  • Add new settings in the default policies as needed.

  • Create new GPOs to augment or override the existing default settings.

  • Change existing ones in the default policies as needed.

  • Link a new GPO using the AD DS role.

Explicação

Questão 40 de 71

1

If creating a local GPO, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO?

Selecione uma das seguintes:

  • The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only Computer Configuration settings.

  • Each GPO contains both Computer Configuration and User Configuration settings.

  • All GPOs contain User Configuration settings.

  • The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only User Configuration settings.

Explicação

Questão 41 de 71

1

Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?

Selecione uma das seguintes:

  • Using the Enforce, Block Policy Inheritance, or Loopback settings.

  • Using Active Directory Administrative Center (ADAC) to block inheritance.

  • Inheritance can be altered by making the applicable registry settings.

  • Using the Enforce or Block Policy Inheritance settings.

Explicação

Questão 42 de 71

1

You are an administrator in a mixed environment of Windows Server 2012, Server 2008 R2 and desktops running Vista. You need different settings for users, based on their identities. Can you achieve this through multiple local GPOs?

Selecione uma das seguintes:

  • All these operating systems support for multiple local GPOs. However, some servers are standalone (non-AD DS) systems.

  • Yes, this is achievable through support by all OSs, regardless of whether standalone or whether members of an AD DS domain.

  • No, this is not achievable given the current environment.

  • No, this is not achievable until software is added.

Explicação

Questão 43 de 71

1

Which of the following tools would you use to deploy the settings in a security template to all of the computers in an Active Directory Domain Services domain?

Selecione uma das seguintes:

  • Active Directory Users and Computers

  • Security Templates snap-in

  • Group Policy Object Editor

  • Group Policy Management console

Explicação

Questão 44 de 71

1

Which of the following are local groups to which you can add users with the Windows Control Panel?

Selecione uma ou mais das seguintes:

  • Users

  • Power Users

  • Administrators

  • Nonadministrators

Explicação

Questão 45 de 71

1

Which of the following tools would you use to modify the settings in a security template?

Selecione uma das seguintes:

  • Active Directory Users and Computers

  • Security Templates snap-in

  • Group Policy Object Editor

  • Group Policy Management console

Explicação

Questão 46 de 71

1

The built-in local groups on a server running Windows Server 2012 receive their special capabilities through which of the following mechanisms?

Selecione uma das seguintes:

  • Security options

  • Windows Firewall rules

  • NTFS permissions

  • User rights

Explicação

Questão 47 de 71

1

After configuring and deploying the Audit Directory Service Access policy, what must you do before a computer running Windows Server2012 begins logging Active Directory access attempts?

Selecione uma das seguintes:

  • You must select the Active Directory objects you want to audit in the Active Directory Users and Computer console.

  • You must wait for the audit policy settings to propagate to all of the domain control- lers on the network.

  • You must open the Audit Directory Service Access Properties sheet and select all of the Active Directory objects you want to audit.

  • You must add an underscore character to the name of every Active Directory object you want to audit.

Explicação

Questão 48 de 71

1

What is the purpose of the Audit Policy section of a Local Group Policy objects (GPO)?

Selecione uma das seguintes:

  • Administrators can log successful and failed security events, such as logon events, database errors, and system shutdown.

  • Administrators can log successful and failed security events, such as loss of data, account access, and object access.

  • Administrators can log successful and failed events, forwarded from other systems.

  • Administrators can log events related specifically to domain controllers.

Explicação

Questão 49 de 71

1

What are the three primary event logs?

Selecione uma das seguintes:

  • Application, Forwarded, and System

  • Application, Security, and Setup

  • Application, Security, and System

  • Application, System, and Setup

Explicação

Questão 50 de 71

1

After you create a GPO that contains computer or user settings, but not both, what can you do for faster GPO processing?

Selecione uma das seguintes:

  • Set the priority higher for the configured setting area.

  • Manually refresh the GPO settings.

  • Disable the setting area that is not configured.

  • Regardless of whether part or all of a GPO is configured, the GPO is processed at the same speed.

Explicação

Questão 51 de 71

1

What are the two interfaces for creating and managing local user accounts for a computer joined to the domain?

Selecione uma das seguintes:

  • Control Panel and ADAC

  • User Accounts control panel and the Local Users and Groups snap-in for MMC

  • ADAC and the Active Directory of Users and Computers snap-in for MMC

  • Server Manager and PowerShell

Explicação

Questão 52 de 71

1

What did Microsoft introduce in Windows Server 2012 to ensure users with administra- tive privileges still operate routine tasks as standard users?

Selecione uma das seguintes:

  • New Group Policy and Local Security Policy

  • Secure desktop

  • User Account Control (UAC)

  • Built-in administrator account

Explicação

Questão 53 de 71

1

When would you need to create a user account through the Control Panel?

Selecione uma das seguintes:

  • You can create users through the Control Panel or with the Local Users and Groups snap-in.

  • You can create users through the Control Panel when the Windows Server 2012 computer is part of a workgroup.

  • When you join a computer to an Active Directory Domain Services (AD DS) domain, you can create only new local user accounts with the Local Users and Groups snap-in. Control Panel is while the computer is not a member of an AD DS domain.

  • Creating users through the Control Panel is not possible.

Explicação

Questão 54 de 71

1

What is the best approach for planning a security template strategy?

Selecione uma das seguintes:

  • Plan according to the needs of individual computers, not users.

  • Plan according to the needs of computer roles, and also company locations.

  • Plan according to the needs of computer roles, but not individual computers.

  • Plan according to the needs of users.

Explicação

Questão 55 de 71

1

What are the key benefits of security templates?

Selecione uma das seguintes:

  • Apply consistent, scalable, and reproducible security settings throughout an enterprise.

  • Deploy alongside with group policies.

  • Although a text editor is possible, Windows Server 2012 enables the use of a graphical interface.

  • Simple deployment as configuration files are text (.inf extension) and uses a graphical and unified interface.

Explicação

Questão 56 de 71

1

How are most Group Policy settings applied or reapplied?

Selecione uma das seguintes:

  • Every time a computer starts up

  • At the refresh interval

  • Whenever a user logs on

  • Whenever the domain controller is restarted

Explicação

Questão 57 de 71

1

What are the two interfaces available for creating and managing user accounts in Windows Server 2012?

Selecione uma das seguintes:

  • Control Panel and the MMC snap-in

  • Server Manager and Control Panel

  • Control Panel and Active Directory Users and Computers

  • User Accounts control panel and the Local Users and Groups snap-in for MMC

Explicação

Questão 58 de 71

1

Which of the following rule types apply only to Windows Installer packages?

Selecione uma das seguintes:

  • Hash rules

  • Certificate rules

  • Internet zone rules

  • Path rules

Explicação

Questão 59 de 71

1

Which file type is used by Windows Installer?

Selecione uma das seguintes:

  • .inf

  • .bat

  • .msf

  • .msi file

Explicação

Questão 60 de 71

1

Which of the following is not one of the Default Security Levels that can be used with a software restriction policy?

Selecione uma das seguintes:

  • Basic User

  • Unrestricted

  • Restricted

  • Disallowed

Explicação

Questão 61 de 71

1

As part of your efforts to deploy all new applications using Group Policy, you discover that several of the applications you wish to deploy do not include the necessary installer files. What can you use to deploy these applications?

Selecione uma das seguintes:

  • Software restriction policies

  • .msi files

  • .mdb files

  • .zap files

Explicação

Questão 62 de 71

1

Which of the following describes the mathematical equation that creates a digital “fingerprint” of a particular file?

Selecione uma das seguintes:

  • Hash rule

  • Hash algorithm

  • Software restriction policy

  • Path rule

Explicação

Questão 63 de 71

1

Which of the following rules will allow or disallow a script or a Windows Installer file to run on the basis of how the file has been signed?

Selecione uma das seguintes:

  • Path rule

  • Hash rule

  • Network zone rule

  • Certificate rule

Explicação

Questão 64 de 71

1

You want to deploy several software applications using Group Policy, such that the applications can be manually installed by the users from the Add/Remove Programs applet in their local Control Panel. Which installation option should you select?

Selecione uma das seguintes:

  • Assign

  • Disallowed

  • Publish

  • Unrestricted

Explicação

Questão 65 de 71

1

You have assigned several applications using GPOs. Users have complained that there is a delay when they double-click on the application icon, which you know is the result of
the application being installed in the background. What option can you use to pre-install assigned applications when users log on or power on their computers?

Selecione uma das seguintes:

  • Uninstall when the application falls out of scope

  • Install This Application At Logon

  • Advanced Installation Mode

  • Path rule

Explicação

Questão 66 de 71

1

Which of the following Default Security Levels in Software Restriction Policies will disallow any executable from running that has not been explicitly enabled by the Active Directory administrator?

Selecione uma das seguintes:

  • Basic User

  • Restricted

  • Disallowed

  • Power User

Explicação

Questão 67 de 71

1

When installing software using Group Policy, what file or files does an administrator use?

Selecione uma das seguintes:

  • Windows Installer package files, or .msi files. Modifications to the package files are transform files, or .mst files. Further, patch files are designated as .msp files.

  • Any approved software from Microsoft, including the Certified for Windows Server 2012 logo on the packaging.

  • Windows Installer package files, or .mst files. Modifications to the package files are instruction files, or .msi files.

  • Windows Installer packages that contain all the information about the software.

Explicação

Questão 68 de 71

1

You want to deploy software using Group Policy. What is necessary before deciding to Assign the software to your user accounts?

Selecione uma das seguintes:

  • You must create a Group Policy object (GPO) or modify an existing GPO. As part of configuring the GPO, you decide whether to Assign or Publish the application.

  • You create the GPO. Whether to Assign or Publish is decided elsewhere.

  • You must create a distribution share, also called a software distribution point. Then create the GPO, specifying how to deploy the application.

  • You decide whether to Assign or Publish the application. If using .zap files, you might need user intervention.

Explicação

Questão 69 de 71

1

If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should you avoid this method?

Selecione uma das seguintes:

  • If users have slow links between their workstations and the software distribution point

  • If computers are already under a very strict security policy and computer configuration

  • If users often take their computer home

  • If computers require administrative logon for each new package

Explicação

Questão 70 de 71

1

What does file-activated installation mean, and where is it utilized?

Selecione uma das seguintes:

  • When a user opens a file associated with an application that does not currently exist on the user’s workstation, the application is installed. It is used for both Publishing and Assigning an application to a user.

  • When a user logs on and the local computer has a file associated with an application that does not exist, the application is installed. It is used when Assigning an applica- tion to a user.

  • When a user opens a file associated with an application that does not currently exist on the user’s workstation, the application is installed. It is used when Assigning an application to a user.

  • When a user logs on and the local computer has a file associated with an applica- tion that does not exist, the application is installed. It is used when Publishing an application to a user.

Explicação

Questão 71 de 71

1

What is the most common way to implement software restriction policies?

Selecione uma das seguintes:

  • By configuring software restriction policies on individual computers by using Local Security Policy

  • Through Active Directory Users and Computers

  • Through GPOs linked to Active Directory Domain Services (AD DS) containers, so that you can apply their policy settings to several computers simultaneously

  • By using AppLocker, provided you apply to a computer running Windows 7 and Windows Server 2008 R2 or later

Explicação