Deck 8: Configuring Group Policies

Full screen (f)
exit full mode
Question
GPOs linked to a site object can facilitate IP address based policy settings.​
Use Space or
up arrow
down arrow
to flip the card.
Question
​What Active Directory replication method makes use of remote differential compression (RDC)?

A) ​File Replication Service (FRS)
B) ​Distributed File System Replication (DFSR)
C) ​Active Directory Replication Services (ADRS)
D) ​Advanced System Replication (ASR)
Question
Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?​

A) ​HKEY_LOCAL_MACHINE
B) ​HKEY_CURRENT_USER
C) ​HKEY_MACHINE_USERS
D) ​HKEY_LOCAL_USER
Question
​How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?

A) ​auditpol /remove
B) ​auditpol /delete
C) ​auditpol /clear
D) ​auditpol /clean
Question
Selecting the "Allow the connection if it is secure" option when creating a Windows firewall rule relies on what encryption protocol by default?

A) ​AES
B) ​IPSec
C) ​MD5
D) ​SHA-1
Question
If a domain consists of DCs that are running verions of Windows Server earlier than Windows Server 2008,what replication method is used?

A) ​Downlevel Server Replication (DSR)
B) ​Distributed File System Replication (DFSR)
C) ​File Replication Service (FRS)
D) ​NT Replication Service (NTRS)
Question
The folders containing Group Policy Templates (GPTs)can be found under what folder on a domain controller?

A) ​%systemroot%/SYSVOL/domain/Policies
B) ​​%systemroot%/SYSVOL/sysvol/​domain​/Policies
C) ​​%systemroot%/SYSVOL/Policies
D) ​​%systemroot%/​domain​/Policies
Question
What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies?

A) ​C:/Users/​user​/ProgramData
B) ​C:/System32
C) ​C:/Program Files
D) ​C:/Users/​user​/Program Files
Question
​Each Group Policy Object is assigned a globally unique identifier (GUID)of what length?

A) ​16 bits
B) ​32 bits
C) ​64 bits
D) ​128 bits
Question
Under the Computer Configuration of a GPO,what folder within the "Windows Settings" folder contains policies that can be used to manage network bandwidth use?​

A) ​Name Resolution Policy
B) ​Scripts (Startup/Shutdown)
C) ​Security Settings
D) ​Policy-based QoS
Question
In what order are Group Policy Objects applied?​

A) ​Local policies,site-linked GPOs,domain-linked GPOs,OU-linked GPOs
B) ​Site-linked GPOs,domain-linked GPOs,OU-linked GPOs,local policies
C) ​Domain-linked GPOs,OU-linked GPOs,local policies,site-linked GPOs
D) ​Site-linked GPOs,local policies,domain-linked GPOs,OU-linked GPOs
Question
Remote computers attempting to connect to the local computer are examples of what type of connection?

A) ​Inbound connections
B) ​Outbound connections
C) ​Concurrent connections
D) ​Firewalled connections
Question
What are the two different types of GPO filtering?​

A) ​Security filtering and permissions filtering
B) ​SACL filtering and DACL filtering
C) ​Security filtering and WMI filtering
D) ​SACL filtering and security filtering
Question
Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing.​
Question
After running the Security Configuration and Analysis snap-in with a template,what does an "X" in a red circle on a template policy indicate?​

A) The policy can't be found
B) The policy is unavailable
C) The template policy and current computer policy do not match
D) ​The local computer is vulnerable to an attack or known issue addressed by the policy
Question
Which of the following is not one of the four different ways an application can be designated as an exception to a ​Software Restriction Policy?

A) Hash​
B) ​Certificate
C) ​Developer
D) ​Network zone
Question
​When creating a new rule type in the New Inbound (or Outbound)rule Wizard,what rule type can be used for built-in Windows services?

A) ​Program
B) ​Port
C) ​Predefined
D) Service-based
Question
​A Group Policy Container (GPC)stores GPO properties and status information,but no actual policy settings.
Question
The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.
Question
Local GPOs can affect all computers within a local domain.
Question
The _____________ policies determine what happens on a computer when a user attempts to perform an action that requires elevation.
Question
What happens when two conflicting GPOs have the Enforced option set?
Question
The __________ command can be used to perform many of the same functions as the Security Configuration and Analysis snap-in,and can be used in conjunction with batch files and scripts to automate work with security templates.​
Question
Security templates make use of the _________ file extension.​
Question
If the Windows Firewall is enabled,how are rules applied when multiple network connections are available?
Question
​Where can all ADMX and ADML files be found on a Windows Server 2008 or Vista and later computer?

A) ​%systemroot%/PolicyFiles
B) ​%systemdrive%/​PolicyDefinitions
C) ​​%systemroot%/PolicyDefinitions
D) ​​%system%/PolicyFiles
Question
When utilizing roaming profiles,what should be done to minimize logon/logoff delays and reduce bandwidth used by uploading / downloading profile data?
Question
In the New Connection Security Rule Wizard,what option can be used to set up a rule that requires authentication between two computers,between IP subnets,or between a specific computer and a group of computers in a subnet?​

A) ​Isolation
B) ​Authentication exemption
C) Server-to-server​
D) ​Tunnel
Question
By default,how many previous logons are cached locally to a computer?​

A) ​3
B) ​5
C) ​7
D) ​10
Enter the appropriate word(s)to complete the statement.
Question
The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.​
Question
What does a blue exclamation point next to a domain mean within the GPMC utility?
Question
What is the difference between a managed policy setting and an unmanaged policy setting?
Question
​What tool within Windows Server 2012/R2 must be used in order to change the default auditing settings?

A) ​auditpol.exe
B) ​secaudit.exe
C) secpol.exe
D) ​auditpolicies.exe
Question
How are Group Policy Objects linked to Active Directory?
Question
How can an administrator force the use of a specific version of an application using a GPO?
Question
When creating a custom Applocker rule,how does the file hash option work?
Question
In the New Connection Security Rule Wizard,which connection security rule restricts connections based on authentication criteria,such as domain membership or health status?

A) ​Authentication exemption
B) ​Isolation
C) ​Server-to-server
D) ​Health check
Question
When applying GPOs in order,what policies take precedence?
Question
If a GPO's link status is "disabled",what affect does this have on the GPO?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Configuring Group Policies
1
GPOs linked to a site object can facilitate IP address based policy settings.​
True
2
​What Active Directory replication method makes use of remote differential compression (RDC)?

A) ​File Replication Service (FRS)
B) ​Distributed File System Replication (DFSR)
C) ​Active Directory Replication Services (ADRS)
D) ​Advanced System Replication (ASR)
B
3
Settings in the Administrative Templates section of the User Configuration node affect what area of the registry?​

A) ​HKEY_LOCAL_MACHINE
B) ​HKEY_CURRENT_USER
C) ​HKEY_MACHINE_USERS
D) ​HKEY_LOCAL_USER
B
4
​How can an administrator remove all audit policy subcategories so that auditing is controlled only by Group Policy?

A) ​auditpol /remove
B) ​auditpol /delete
C) ​auditpol /clear
D) ​auditpol /clean
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
Selecting the "Allow the connection if it is secure" option when creating a Windows firewall rule relies on what encryption protocol by default?

A) ​AES
B) ​IPSec
C) ​MD5
D) ​SHA-1
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
If a domain consists of DCs that are running verions of Windows Server earlier than Windows Server 2008,what replication method is used?

A) ​Downlevel Server Replication (DSR)
B) ​Distributed File System Replication (DFSR)
C) ​File Replication Service (FRS)
D) ​NT Replication Service (NTRS)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
The folders containing Group Policy Templates (GPTs)can be found under what folder on a domain controller?

A) ​%systemroot%/SYSVOL/domain/Policies
B) ​​%systemroot%/SYSVOL/sysvol/​domain​/Policies
C) ​​%systemroot%/SYSVOL/Policies
D) ​​%systemroot%/​domain​/Policies
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
What folder is selected by default for scanning when using the Automatically Generate Rules option ​in creating AppLocker policies?

A) ​C:/Users/​user​/ProgramData
B) ​C:/System32
C) ​C:/Program Files
D) ​C:/Users/​user​/Program Files
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
​Each Group Policy Object is assigned a globally unique identifier (GUID)of what length?

A) ​16 bits
B) ​32 bits
C) ​64 bits
D) ​128 bits
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
Under the Computer Configuration of a GPO,what folder within the "Windows Settings" folder contains policies that can be used to manage network bandwidth use?​

A) ​Name Resolution Policy
B) ​Scripts (Startup/Shutdown)
C) ​Security Settings
D) ​Policy-based QoS
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
In what order are Group Policy Objects applied?​

A) ​Local policies,site-linked GPOs,domain-linked GPOs,OU-linked GPOs
B) ​Site-linked GPOs,domain-linked GPOs,OU-linked GPOs,local policies
C) ​Domain-linked GPOs,OU-linked GPOs,local policies,site-linked GPOs
D) ​Site-linked GPOs,local policies,domain-linked GPOs,OU-linked GPOs
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
Remote computers attempting to connect to the local computer are examples of what type of connection?

A) ​Inbound connections
B) ​Outbound connections
C) ​Concurrent connections
D) ​Firewalled connections
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
What are the two different types of GPO filtering?​

A) ​Security filtering and permissions filtering
B) ​SACL filtering and DACL filtering
C) ​Security filtering and WMI filtering
D) ​SACL filtering and security filtering
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
Using a "Deny Read" permission on a GPO enables the creation of an exception to normal GPO processing.​
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
After running the Security Configuration and Analysis snap-in with a template,what does an "X" in a red circle on a template policy indicate?​

A) The policy can't be found
B) The policy is unavailable
C) The template policy and current computer policy do not match
D) ​The local computer is vulnerable to an attack or known issue addressed by the policy
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not one of the four different ways an application can be designated as an exception to a ​Software Restriction Policy?

A) Hash​
B) ​Certificate
C) ​Developer
D) ​Network zone
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
​When creating a new rule type in the New Inbound (or Outbound)rule Wizard,what rule type can be used for built-in Windows services?

A) ​Program
B) ​Port
C) ​Predefined
D) Service-based
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
​A Group Policy Container (GPC)stores GPO properties and status information,but no actual policy settings.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
The Microsoft best practice recommendation is to modify the two default GPOs in a domain for making password policy changes.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
Local GPOs can affect all computers within a local domain.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
The _____________ policies determine what happens on a computer when a user attempts to perform an action that requires elevation.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
What happens when two conflicting GPOs have the Enforced option set?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
The __________ command can be used to perform many of the same functions as the Security Configuration and Analysis snap-in,and can be used in conjunction with batch files and scripts to automate work with security templates.​
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Security templates make use of the _________ file extension.​
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
If the Windows Firewall is enabled,how are rules applied when multiple network connections are available?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
​Where can all ADMX and ADML files be found on a Windows Server 2008 or Vista and later computer?

A) ​%systemroot%/PolicyFiles
B) ​%systemdrive%/​PolicyDefinitions
C) ​​%systemroot%/PolicyDefinitions
D) ​​%system%/PolicyFiles
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
When utilizing roaming profiles,what should be done to minimize logon/logoff delays and reduce bandwidth used by uploading / downloading profile data?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
In the New Connection Security Rule Wizard,what option can be used to set up a rule that requires authentication between two computers,between IP subnets,or between a specific computer and a group of computers in a subnet?​

A) ​Isolation
B) ​Authentication exemption
C) Server-to-server​
D) ​Tunnel
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
By default,how many previous logons are cached locally to a computer?​

A) ​3
B) ​5
C) ​7
D) ​10
Enter the appropriate word(s)to complete the statement.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
The settings in the Administrative Templates under the Computer Configuration node affect the _______________________ area of a computer's registry.​
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
What does a blue exclamation point next to a domain mean within the GPMC utility?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
What is the difference between a managed policy setting and an unmanaged policy setting?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
​What tool within Windows Server 2012/R2 must be used in order to change the default auditing settings?

A) ​auditpol.exe
B) ​secaudit.exe
C) secpol.exe
D) ​auditpolicies.exe
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
How are Group Policy Objects linked to Active Directory?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
How can an administrator force the use of a specific version of an application using a GPO?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
When creating a custom Applocker rule,how does the file hash option work?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
In the New Connection Security Rule Wizard,which connection security rule restricts connections based on authentication criteria,such as domain membership or health status?

A) ​Authentication exemption
B) ​Isolation
C) ​Server-to-server
D) ​Health check
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
When applying GPOs in order,what policies take precedence?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
If a GPO's link status is "disabled",what affect does this have on the GPO?
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.