Deck 8: Configuring Group Policies

ملء الشاشة (f)
exit full mode
سؤال
GPOs linked to a site object can facilitate IP address based policy settings.​
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
​What Active Directory replication method makes use of remote differential compression (RDC)?

A) ​File Replication Service (FRS)
B) ​Distributed File System Replication (DFSR)
C) ​Active Directory Replication Services (ADRS)
D) ​Advanced System Replication (ASR)
سؤال
Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?​

A) ​HKEY_LOCAL_MACHINE
B) ​HKEY_CURRENT_USER
C) ​HKEY_MACHINE_USERS
D) ​HKEY_LOCAL_USER
سؤال
​How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?

A) ​auditpol /remove
B) ​auditpol /delete
C) ​auditpol /clear
D) ​auditpol /clean
سؤال
Selecting the "Allow the connection if it is secure" option when creating a Windows firewall rule relies on what encryption protocol by default?

A) ​AES
B) ​IPSec
C) ​MD5
D) ​SHA-1
سؤال
If a domain consists of DCs that are running verions of Windows Server earlier than Windows Server 2008,what replication method is used?

A) ​Downlevel Server Replication (DSR)
B) ​Distributed File System Replication (DFSR)
C) ​File Replication Service (FRS)
D) ​NT Replication Service (NTRS)
سؤال
The folders containing Group Policy Templates (GPTs)can be found under what folder on a domain controller?

A) ​%systemroot%/SYSVOL/domain/Policies
B) ​​%systemroot%/SYSVOL/sysvol/​domain​/Policies
C) ​​%systemroot%/SYSVOL/Policies
D) ​​%systemroot%/​domain​/Policies
سؤال
What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies?

A) ​C:/Users/​user​/ProgramData
B) ​C:/System32
C) ​C:/Program Files
D) ​C:/Users/​user​/Program Files
سؤال
​Each Group Policy Object is assigned a globally unique identifier (GUID)of what length?

A) ​16 bits
B) ​32 bits
C) ​64 bits
D) ​128 bits
سؤال
Under the Computer Configuration of a GPO,what folder within the "Windows Settings" folder contains policies that can be used to manage network bandwidth use?​

A) ​Name Resolution Policy
B) ​Scripts (Startup/Shutdown)
C) ​Security Settings
D) ​Policy-based QoS
سؤال
In what order are Group Policy Objects applied?​

A) ​Local policies,site-linked GPOs,domain-linked GPOs,OU-linked GPOs
B) ​Site-linked GPOs,domain-linked GPOs,OU-linked GPOs,local policies
C) ​Domain-linked GPOs,OU-linked GPOs,local policies,site-linked GPOs
D) ​Site-linked GPOs,local policies,domain-linked GPOs,OU-linked GPOs
سؤال
Remote computers attempting to connect to the local computer are examples of what type of connection?

A) ​Inbound connections
B) ​Outbound connections
C) ​Concurrent connections
D) ​Firewalled connections
سؤال
What are the two different types of GPO filtering?​

A) ​Security filtering and permissions filtering
B) ​SACL filtering and DACL filtering
C) ​Security filtering and WMI filtering
D) ​SACL filtering and security filtering
سؤال
Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing.​
سؤال
After running the Security Configuration and Analysis snap-in with a template,what does an "X" in a red circle on a template policy indicate?​

A) The policy can't be found
B) The policy is unavailable
C) The template policy and current computer policy do not match
D) ​The local computer is vulnerable to an attack or known issue addressed by the policy
سؤال
Which of the following is not one of the four different ways an application can be designated as an exception to a ​Software Restriction Policy?

A) Hash​
B) ​Certificate
C) ​Developer
D) ​Network zone
سؤال
​When creating a new rule type in the New Inbound (or Outbound)rule Wizard,what rule type can be used for built-in Windows services?

A) ​Program
B) ​Port
C) ​Predefined
D) Service-based
سؤال
​A Group Policy Container (GPC)stores GPO properties and status information,but no actual policy settings.
سؤال
The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.
سؤال
Local GPOs can affect all computers within a local domain.
سؤال
The _____________ policies determine what happens on a computer when a user attempts to perform an action that requires elevation.
سؤال
What happens when two conflicting GPOs have the Enforced option set?
سؤال
The __________ command can be used to perform many of the same functions as the Security Configuration and Analysis snap-in,and can be used in conjunction with batch files and scripts to automate work with security templates.​
سؤال
Security templates make use of the _________ file extension.​
سؤال
If the Windows Firewall is enabled,how are rules applied when multiple network connections are available?
سؤال
​Where can all ADMX and ADML files be found on a Windows Server 2008 or Vista and later computer?

A) ​%systemroot%/PolicyFiles
B) ​%systemdrive%/​PolicyDefinitions
C) ​​%systemroot%/PolicyDefinitions
D) ​​%system%/PolicyFiles
سؤال
When utilizing roaming profiles,what should be done to minimize logon/logoff delays and reduce bandwidth used by uploading / downloading profile data?
سؤال
In the New Connection Security Rule Wizard,what option can be used to set up a rule that requires authentication between two computers,between IP subnets,or between a specific computer and a group of computers in a subnet?​

A) ​Isolation
B) ​Authentication exemption
C) Server-to-server​
D) ​Tunnel
سؤال
By default,how many previous logons are cached locally to a computer?​

A) ​3
B) ​5
C) ​7
D) ​10
Enter the appropriate word(s)to complete the statement.
سؤال
The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.​
سؤال
What does a blue exclamation point next to a domain mean within the GPMC utility?
سؤال
What is the difference between a managed policy setting and an unmanaged policy setting?
سؤال
​What tool within Windows Server 2012/R2 must be used in order to change the default auditing settings?

A) ​auditpol.exe
B) ​secaudit.exe
C) secpol.exe
D) ​auditpolicies.exe
سؤال
How are Group Policy Objects linked to Active Directory?
سؤال
How can an administrator force the use of a specific version of an application using a GPO?
سؤال
When creating a custom Applocker rule,how does the file hash option work?
سؤال
In the New Connection Security Rule Wizard,which connection security rule restricts connections based on authentication criteria,such as domain membership or health status?

A) ​Authentication exemption
B) ​Isolation
C) ​Server-to-server
D) ​Health check
سؤال
When applying GPOs in order,what policies take precedence?
سؤال
If a GPO's link status is "disabled",what affect does this have on the GPO?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 8: Configuring Group Policies
1
GPOs linked to a site object can facilitate IP address based policy settings.​
True
2
​What Active Directory replication method makes use of remote differential compression (RDC)?

A) ​File Replication Service (FRS)
B) ​Distributed File System Replication (DFSR)
C) ​Active Directory Replication Services (ADRS)
D) ​Advanced System Replication (ASR)
B
3
Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?​

A) ​HKEY_LOCAL_MACHINE
B) ​HKEY_CURRENT_USER
C) ​HKEY_MACHINE_USERS
D) ​HKEY_LOCAL_USER
B
4
​How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?

A) ​auditpol /remove
B) ​auditpol /delete
C) ​auditpol /clear
D) ​auditpol /clean
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
5
Selecting the "Allow the connection if it is secure" option when creating a Windows firewall rule relies on what encryption protocol by default?

A) ​AES
B) ​IPSec
C) ​MD5
D) ​SHA-1
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
6
If a domain consists of DCs that are running verions of Windows Server earlier than Windows Server 2008,what replication method is used?

A) ​Downlevel Server Replication (DSR)
B) ​Distributed File System Replication (DFSR)
C) ​File Replication Service (FRS)
D) ​NT Replication Service (NTRS)
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
7
The folders containing Group Policy Templates (GPTs)can be found under what folder on a domain controller?

A) ​%systemroot%/SYSVOL/domain/Policies
B) ​​%systemroot%/SYSVOL/sysvol/​domain​/Policies
C) ​​%systemroot%/SYSVOL/Policies
D) ​​%systemroot%/​domain​/Policies
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
8
What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies?

A) ​C:/Users/​user​/ProgramData
B) ​C:/System32
C) ​C:/Program Files
D) ​C:/Users/​user​/Program Files
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
9
​Each Group Policy Object is assigned a globally unique identifier (GUID)of what length?

A) ​16 bits
B) ​32 bits
C) ​64 bits
D) ​128 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
10
Under the Computer Configuration of a GPO,what folder within the "Windows Settings" folder contains policies that can be used to manage network bandwidth use?​

A) ​Name Resolution Policy
B) ​Scripts (Startup/Shutdown)
C) ​Security Settings
D) ​Policy-based QoS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
11
In what order are Group Policy Objects applied?​

A) ​Local policies,site-linked GPOs,domain-linked GPOs,OU-linked GPOs
B) ​Site-linked GPOs,domain-linked GPOs,OU-linked GPOs,local policies
C) ​Domain-linked GPOs,OU-linked GPOs,local policies,site-linked GPOs
D) ​Site-linked GPOs,local policies,domain-linked GPOs,OU-linked GPOs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
12
Remote computers attempting to connect to the local computer are examples of what type of connection?

A) ​Inbound connections
B) ​Outbound connections
C) ​Concurrent connections
D) ​Firewalled connections
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
13
What are the two different types of GPO filtering?​

A) ​Security filtering and permissions filtering
B) ​SACL filtering and DACL filtering
C) ​Security filtering and WMI filtering
D) ​SACL filtering and security filtering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
14
Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
15
After running the Security Configuration and Analysis snap-in with a template,what does an "X" in a red circle on a template policy indicate?​

A) The policy can't be found
B) The policy is unavailable
C) The template policy and current computer policy do not match
D) ​The local computer is vulnerable to an attack or known issue addressed by the policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the four different ways an application can be designated as an exception to a ​Software Restriction Policy?

A) Hash​
B) ​Certificate
C) ​Developer
D) ​Network zone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
17
​When creating a new rule type in the New Inbound (or Outbound)rule Wizard,what rule type can be used for built-in Windows services?

A) ​Program
B) ​Port
C) ​Predefined
D) Service-based
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
18
​A Group Policy Container (GPC)stores GPO properties and status information,but no actual policy settings.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
19
The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
20
Local GPOs can affect all computers within a local domain.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
21
The _____________ policies determine what happens on a computer when a user attempts to perform an action that requires elevation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
22
What happens when two conflicting GPOs have the Enforced option set?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
23
The __________ command can be used to perform many of the same functions as the Security Configuration and Analysis snap-in,and can be used in conjunction with batch files and scripts to automate work with security templates.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
24
Security templates make use of the _________ file extension.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
25
If the Windows Firewall is enabled,how are rules applied when multiple network connections are available?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
26
​Where can all ADMX and ADML files be found on a Windows Server 2008 or Vista and later computer?

A) ​%systemroot%/PolicyFiles
B) ​%systemdrive%/​PolicyDefinitions
C) ​​%systemroot%/PolicyDefinitions
D) ​​%system%/PolicyFiles
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
27
When utilizing roaming profiles,what should be done to minimize logon/logoff delays and reduce bandwidth used by uploading / downloading profile data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
28
In the New Connection Security Rule Wizard,what option can be used to set up a rule that requires authentication between two computers,between IP subnets,or between a specific computer and a group of computers in a subnet?​

A) ​Isolation
B) ​Authentication exemption
C) Server-to-server​
D) ​Tunnel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
29
By default,how many previous logons are cached locally to a computer?​

A) ​3
B) ​5
C) ​7
D) ​10
Enter the appropriate word(s)to complete the statement.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
30
The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
31
What does a blue exclamation point next to a domain mean within the GPMC utility?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
32
What is the difference between a managed policy setting and an unmanaged policy setting?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
33
​What tool within Windows Server 2012/R2 must be used in order to change the default auditing settings?

A) ​auditpol.exe
B) ​secaudit.exe
C) secpol.exe
D) ​auditpolicies.exe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
34
How are Group Policy Objects linked to Active Directory?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
35
How can an administrator force the use of a specific version of an application using a GPO?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
36
When creating a custom Applocker rule,how does the file hash option work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
37
In the New Connection Security Rule Wizard,which connection security rule restricts connections based on authentication criteria,such as domain membership or health status?

A) ​Authentication exemption
B) ​Isolation
C) ​Server-to-server
D) ​Health check
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
38
When applying GPOs in order,what policies take precedence?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
39
If a GPO's link status is "disabled",what affect does this have on the GPO?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 39 في هذه المجموعة.