70-742 Lesson 9 Questions and Key Terms (2012 Questions as well)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A security template is a collection of configuration settings stored as a text file with an ______ extension

.inf

Besides performing installation, ____ files can be used in self-healing for damaged applications and to remove an application cleanly.

.msi files Besides performing installation, .msi files can be used in self-healing for damaged applications and to remove an application cleanly.

Which file name extension patches files for Microsoft Software Installation (MSI) files?

.msp

You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the package to be installed unless a user needs it. How should you configure the software installation policy?

Publish the package under the User Configuration node. (Publish software to a user: A program shortcut will be available in the Control Panel's Programs applet, or you can configure the application to be installed when a file that is associated with the application is opened.)

Publish software to a user:

A program shortcut will be available in the Control Panel's Programs applet, or you can configure the application to be installed when a file that is associated with the application is opened.

Regarding Group Policy in Windows Server 2008 and Windows Vista, Microsoft used the token-based administrative template (ADM) files. What did Microsoft replace ADM files with in Windows Server 2012?

ADMX files (XML-based file format)

Which type of software installation should be performed to add an icon to the user's Control Panel?

Publish software to a user.

You're concerned that some domain controllers and workstations don't meet security requirements. What should you do to verify security settings on a computer against a list of known settings? compare security settings

Run Security Configuration and Analysis on the computer to compare its security settings against a security database. Security Configuration and Analysis snap-in

You want to deploy a logon script by using Group Policy. You have several sites connected via a WAN with a DC at each site. You want to make sure the script is always available when users log on from any computer at any location. What should you do?

Save the script in the SYSVOL share.

Use the ______________ MMC snap in to apply templates and to compare settings in a template apply security templates compare security template settings

Security Configuration and Analysis snap-in Use the Security Configuration and Analysis MMC snap in to apply templates and to compare settings in a security template.

Security template .inf files can be worked with using Group Policy Objects, the secedit.exe command line tool, the Security Configuration and Analysis console, the ______________ or the Security Compliance Manager (separate download).

Security Templates snap-in

Use the _______________ MMC snap in to edit and create security templates. edit and create security templates

Security Templates snap-in Use the Security Templates MMC snap in to edit and create security templates.

startup scripts, and shutdown scripts

These are configured using the GPOs ComputerConfiguration/Policies/WindowsSettings/Scripts (Startup/Shutdown) Group Policy Management Editor

logon scripts, and logoff scripts

These are configured using the GPOs UserConfiguration/Policies/WindowsSettings/Scripts (Logon/Logoff) Group Policy Management Editor

Assign software to a computer:

The application is installed the next time the computer starts.

Microsoft Software Installation (MSI) file

The installation information for software is stored in a msi file in a database installation file that has an .msi file name extension.

You have configured a policy setting in the User Configuration node of a domain GPO and linked the GPO to OU-X. Later, you discover you linked it to the wrong OU, so you unlink it from OU-X and link it to OU-Y, which is correct. A few days later, you find that users in OU-X still have the policy setting applied to their accounts. What's the most likely cause of the problem?

The policy setting is unmanaged.

Assign software to a user:

The software is available on the user's Start menu when the user logs on. However, the installation does not occur unless the user clicks the application icon on the Start menu or a file that is associated with the application.

Computer Configuration (node)

This node contains settings that are applied to the computer regardless of who logs on to the computer. By default, computer settings are applied when the computer is started.

You can deploy security templates using the following: To manage security templates:

You can deploy security templates using the following: Active Directory Group Policy Objects Security Configuration and Analysis snap-in To manage security templates: Security Templates snap-in

Group Policy Objects (GPOs)

are a collection of thousands of various user and computer-specific settings that can be centrally managed by an administrator in an Active Directory environment.

ADMX files (XML-based file format)

are based on Extensible Markup Language (XML). ADMX files can be stored in a single location called the Central Store in the SYSVOL directory. Unlike ADM files, ADMX files are not stored in individual GPOs. The Group Policy Management Editor automatically reads and displays settings from the local ADMX file store. Administrative Templates for Windows Server 2016 are ADMX files. To make those settings available to a GPO, you need to add the Administrative Templates file to the Central Store.

MSI patch files

are files used to apply service packs and hotfixes to installed software

MSI transform files

are files used to deploy customized MSI files.

ADML files

descriptions of the ADMX file settings seperate from the ADMX file and are stored in language specific ADML files.

ADM files

have been used to define the settings that an administrator can configure through Group Policy.

.mst file

is a settings file used by the Microsoft Windows Installer (msiexec.exe), a component of the Windows operating system that enables software installations. It contains software configuration options and allows custom parameters to be used for the installation.

Windows Installer

is a software component used for the installation, maintenance, and removal of software on Windows. (installation, maintenance, and removal of software)

The Microsoft Windows Script Hosts (WSH)

is the component that provides scripting capabilities to Windows.

perform software installation with group policies

perform a software installation of an MSI file using group policies

Group policies are often used to make a computer more secure. By using ______ templates, you can implement security settings quickly and efficiently, you can copy and apply security settings from one computer to another, and you can check the security settings based on a ______ template.

security Group policies are often used to make a computer more secure. By using security templates, you can implement security settings quickly and efficiently, you can copy and apply security settings from one computer to another, and you can check the security settings based on a security template.

Which type of files is installed using Software Installation via group policies?

.msi

Which type of software supports self-healing?

.msi

You are an administrator for the Contoso Corporation. Your domain is primarily based in the United States. Your company acquires an office in France and you need to ensure that the group policies that you have established support the French language. Which of the following actions should be performed?

Copy the ADML files to the FR folder in the Central Store.

You have created a custom administrative template. You want this template to be available to all DCs so that policies can be configured with it from any DC. Where should you save it?

In the central store

Script

Is a list of commands that can be executed within a single file, which can perform repetitive tasks. You can use group policies to execute logon/logoff scripts and startup/shutdown scripts. Some of the uses include cleaning up desktops when users log off and shut down computers, deleting the contents of temporary directories, mapping drives and printers, and setting environment variables. Configure a GPO to execute a script during startup, shutdown, logon, or logoff.

What Group Policy Preference option would you select if you want to configure a default home page for Internet Explorer options? a. Set Default. b. Allow user to modify. c. Apply once and do not reapply. d. Use item-level targeting.

c. Apply once and do not reapply.

User Configuration (node)

A node that contains settings that are applied when the user logs on. [Group policy settings are refreshed every 90 minutes with a random delay of 30 minutes.]

How often do group policies get refreshed on client PCs?

Every 90 to 120 minutes

By default, all policy settings are displayed. To narrow down the displayed list of settings, you can use:

Administrative Templates Property Filters.

Which of the following is best described as policy definition files saved in XML format?

Administrative templates

Which type of folder redirection should be used to redirect the user's home directory to a location based on the group that the user is a member of?

Advanced

Where is the Central Store located?

C:\Windows\SYSVOL\domain\Policies\PolicyDefinitions in the SYSVOL directory

Which of the following is a subfolder in the User Configuration node but not the Computer Configuration node of a GPO?

Desktop

You want all users to have the company home page and two other Web sites loaded in tabs when they start Internet Explorer, but you want them to be able to change their home pages if they like. What should you do?

Configure an Internet Options preference, and change the defaults in the Common tab.

You want to centrally back up the files users store in the Documents folder in their user profiles, but you don't want users to have to change the way they access their files. What's the best way to go about this?

Configure folder redirection in the User Configuration node of a GPO.

You want to set a group policy preference that affects only computers with a CPU speed of at least 4.0 GHz. What's the best way to do this?

Configure item-level targeting

Which of the following is a method for creating a GPO?

Create it while linking it to a container, Use the Group Policy Objects folder in the Group Policy Management console.

You have configured a group policy preference that creates a VPN connection for all computers in the GPO's scope. One user says the connection was there yesterday, but it's no longer showing in his Network Connections window. You suspect he might have deleted the connection accidentally. What can you do to make sure the VPN connection is re-created even if a user deletes it?

Disable the "Apply once and do not reapply" option.

Which of the following is true about GPOs?

Domain GPOs can be linked to Active Directory sites, The gpedit.msc tool can be used to edit local GPOs.

Settings in the Computer Configuration node of a GPO affect the HKEY_CURRENT_CONFIG Registry key. True or False?

False

Which option should be used to repoint the Documents folder to the user's home folder?

Folder Redirection

Folder Redirection

Folder redirection allows you to redirect the content of a certain folder to a network location or to another location on the user's local computer. A feature that redirects profile folders from the local computer to a network location. Folder Redirection is found under \User Configuration\Policies\Windows Settings. \User Configuration\Policies\Windows Settings\Folder Redirection Group Policy Management Editor

Group Policy settings are refreshed every __ minutes with a random delay of 30 minutes.

Group Policy settings are refreshed every 90 minutes with a random delay of 30 minutes. (giving a random range between 90 minutes and 120 minutes) On domain controllers , group policies get refreshed every 5 minutes.

An application needs to be installed on 250 computers. The application should modify the registry on each target computer. The vendor provides a file with an .adm extension. In which of the following ways can the registry setting be deployed?

Import the .adm file into a GPO and edit the GPO to modify the registry setting. Link the GPO to the OU of the computers that need the application.

You are an administrator for the Contoso Corporation. In Active Directory, there's a WebServer OU that contains 10 web servers. You have been testing security settings for a server (called WebServer01) running IIS. Which of the following methods would be used to deploy the new security settings to the other web servers? What to do to deploy the new security settings to the other web servers? Webserver OU contains 10 Web servers

Import the settings in the security.inf file template into a GPO and link the GPO to the WebServer OU.

You are an administrator for the Contoso Corporation. In Active Directory, there's a WebServer OU that contains 10 web servers. You have been testing security settings for a server (called WebServer01) running IIS. Which of the following methods would be used to deploy the new security settings to the other web servers? (deploy the new security settings to the other webservers)

Import the settings in the security.inf file template into a GPO and link the GPO to the WebServer OU.

You need to find a policy related to an application that was installed a couple years ago. You know that the policy is persistent when the computer it's applied to falls out of scope, but you can't remember its name. You remember a word or two that might be in the policy name or comments. What can you do to find this policy quickly? you need to find a policy and theres thousands? of policies how to find?

In the Group Policy Management Editor, configure a filter; set Managed to No, and enable Keyword Filters.

Most of the time, why do laptop users use folder redirection?

Offline folder access

Which of the following actions determines whether a logon script is replicated to all domain controllers?

Open the SYSVOL directory

How do you determine whether a login script is replicated to all domain controllers?

Open the SYSVOL folder.

You have installed an application that can be configured with Group Policy. The application came with a custom ADM file that must be replicated to all DCs. What should you do first?

Open the file with ADMX Migrator.

Starting with Windows Server 2008, the Computer Configuration and User Configuration nodes are divided into _______ and ______ nodes.

Policies and Preferences

Which of the following is used to display only the Administrative Templates that are being used?

Property filters

central store

Single location in the SYSVOL directory containing Administrative Templates with the .admx extension. ADMX files, which are registry-based policy settings provide an XML-based structure for defining the display of the Administrative Template policy settings in the Group Policy Object Editor. The ADMX files replace ADM files, which used a different markup language.

Computer Configuration>Policies>??? User Configuration>Policies>??? Which three nodes come after Policies for both?

Software Settings Windows Settings Administrative Templates

You create GPOs in the Group Policy Management console and change them in the Group Policy Management Editor. True or False?

True


Kaugnay na mga set ng pag-aaral

ANTH 202 - Most Missed Exam Questions

View Set

Neurocognitive Disorders (Exam 2)

View Set

German Good/Bad Portion-- Remember

View Set

UNIT 3 Glucose Regulation Exemplar: Cushing's

View Set

PY 307 Physiological Psych Test 4

View Set

Ch. 2 Tabular and Graphical Methods

View Set