ITC Chapter 4 Quiz
An administrator can run a PowerShell command on a remote server using which additional element?
-ComputerName
You are assigning rights and permissions to resources in a single-domain environment. Which of the following processes should you use?
Add accounts to global groups; add global groups to domain local groups
When using PowerShell, what cmdlet can be utilized to retrieve a list of services?
Get-Service
When an administrator needs to install or uninstall roles and features to and from an offline VHD file, what PowerShell option can be used?
-VHD
What file extension is used for Windows install images that can be deployed with Windows Deployment Server?
.wim
When you install Azure AD Connect, a best practice is to use a specific entity for the purpose of syncing with Azure AD Connect. What type of entity should you specify?
A Global Administrator account
Which of the following statements are true in describing the differences between a published application and an assigned application software installation method for users?
A published application is not installed automatically on startup A published application can be installed from the Control Panel
A company, which does not currently use cloud services, only wants to use Microsoft 365 and cloud storage. Which of the following should they install and why?
AAD to manage authentication
Allegra configures a GPO in the Computer Configuration node to prevent access to the Windows services manager. Another technician configures a GPO in the User Configuration node granting access. If a user tries to access the services manager what will happen?
Access will be denied because the Computer Configuration policies take precedence
Taranis is asked to test a backup and restore application before it is deployed in a production environment. He will test it using a large virtual Windows infrastructure used for testing. The primary area of concern is the ability to back up the 20 DCs in the test network. What is the best way to limit the access granted to Taranis.
Add the technician to the default Backup Operators group in the Builtin folder
Company A recently merged with company B, so they still maintain separate AD forest structures. They are small companies but want to start using Azure AD for access to an Azure resource that needs to be shared between the two. What tool will allow them to do this?
Azure AD Connect Cloud Sync
Paco works at a large corporation. As he navigates the GPMC, he notices one of the domain objects has an exclamation point in a blue circle. What does this mean?
Blocking inheritance has been enabled so site-level policies will be ignored
You are performing an offline domain join of a few computers that will be connected to the network. You use the command syntax shown below. Which of the following statements are true? Select two. Command1: djoin /provision /domain DomainName /machine ComputerName /savefile filename.txt Command2: djoin /requestODJ /loadfile filename.txt /windowspath %systemroot% /localos
Command1 is used to create the computer account in the domain Command2 is executed on the computer that is joining the domain
The software engineering (SWE) team at a company needs access to some of the resources the software quality assurance (SQA) team uses to test the software. The SQA team created a SWE distribution group to communicate with the SWE team and vice-versa. What is the most likely way in which access to SQA's resources will be granted to the SWE team?
Convert the SWE distribution group to a security group
Which of the following statements are true when characterizing the similarities or differences between FRS and DFSR?
DFSR compresses and transfers only the data blocks that have been changed DFSR is more reliable and better at handling unexpected service shutdowns FRS runs on Servers earlier than 2008, DFSR runs on Server 2008 or later
Which of the following technologies are required to be available on a network to support WDS? (Choose all that apply.)
DNS Server DHCP Server PXE-compatible NICs
Jon, an IT administrator, creates an OU. He then creates a group and adds junior technicians with the ability to create, delete, and manage user accounts in the OU. Which of the following best describes what Jon has done?
Delegated control
Identify some of the features and/or settings available with the Azure AD Connect Health tool.
Disable automatic updates of the AAD Connect Health agent Check synchronization errors
Chabela performs a variety of tasks using group policy preferences. If permission is granted, identify actions users can potentially perform or changes they can make once Chabela is done. Select all that apply.
Enable and disable devices on a computer Configure Internet settings Configure custom Registry settings Create and modify local users and groups
You create a GPO and link it to a parent OU. A junior technician creates a child O and then links a GPO to it that nullifies some of the policies you created on the parent. What could you have done to prevent this situation?
Enabled GPO enforcement on the GPO linked to the parent OU
True or False: The Role-based or feature-based installation is used to distribute components of the Remote Desktop Services role across different servers for use in a virtual desktop infrastructure.
False
True or False: You can use PowerShell to add and remove server roles from a Server Core server, but not a Desktop Experience server.
False
Due to the large number of policies available in the Administrative Templates section of a GPO you decide to use a filter to help you find the specific policy you want to access. How can you get to the filter?
GPME, Select desired GPO, Policies, Computer Configuration, Administrative Templates
Hans recently sold his small networking services company and started working for a large corporation. He is asked to modify one of the GPOs but notices it is taking longer that he expected for the changes to propagate to a particular DC. What file can he check to see if the update has been processed?
GPT.ini
You are responsible for assigning permissions to a variety of AD objects. To what types of AD objects can you assign permissions? Select three
Groups Users Computers
You reset the computer account of a system that is unable to sign in to the domain, but the problem continues. Which of the following should be included in your efforts to fix the problem?
Have the computer leave then rejoin the domain
In a site-linked GPO, what does GPO processing use to determine where a user is signing in from to apply the proper policy?
IP Address
Which of the following represent recommended or best practices relative to group policies?
If managing Computers and Users objects with group policies, move them to an OU Set account policies and a few critical security policies at the domain level
Victor is creating a startup called myscript.ps1 that will be deployed using a GPO. Where should he place the script, such that it would offer the greatest advantage?
In the GUID folder of the GPO
The company Tamika works for is growing and no longer wants employees to log in to the Azure resources with log in credentials that differ from the one they use to access local resources. How can the company meet this objective?
Install Azure AD Connect
Neymar configured Azure AD DS and needs to create a few GPOs. Which of the following steps, will help him achieve his goal?
Install the Group Policy Management tools Create a Windows Server VM in Azure
Neymar configured Azure AD DS and needs to create a few GPOs. Which of the following steps, will help him achieve his goal? Select two.
Install the Group Policy Management tools Create a Windows Server VM in Azure
Which of the following is necessary for the successful creation of an MSA?
Install the MSA on the target computer that already has Active Directory installed
What PowerShell cmdlet can be used by an administrator to install a specific server role?
Install-WindowsFeature
Jodi runs gpedit.msc to configure a GPO on a computer in the domain. What will be the scope of the GPO?
Local
You need to apply group policy settings on some laptops that must be enforced only when they are connected to the company's network. What type of policy setting should you create?
Managed policy setting
You install Azure AD Connect with SSPR enabled. But when Javelin resets her password in Azure AD, the new password is not valid when trying to log in to access on-premises domain resources. What is the problem, or how can the discrepancy be rectified?
Password writeback was not enabled
What type of environment can be built into a NIC that allows a computer to boot from an image stored on a network server?
Preboot Execution Environment
What Desired State Configuration mode is being utilized when servers can obtain their configurations from a central server by using standard web protocols?
Pull mode
What Desired State Configuration mode is being used when a server configuration is manually sent to one or more target servers by an administrator?
Push mode
You create a GPO related to the Computer Configuration node and link it to a test OU. After verifying the change was applied, you proceed to make additional changes to the GPO. However, the test computer you are using does not reflect the additional changes. What should you do?
Reboot the computer
Which firewall rule group must be enabled to allow for the remote use of the Task Scheduler snap-in?
Remote Scheduled Tasks Management
Which of the following are true statements regarding security groups and distribution groups?
Security groups can contain the same objects as distribution groups Distribution groups can include people outside your organization Security groups can be used as distribution groups by some applications
Which of the following operations are considered to be crucial tasks that should be performed before installing server roles and features? (Choose all that apply.)
Security updates are current Administrator has a strong password Static IP addresses have been configured
Your company wants to transition to the cloud. No one in your company has ever implemented cloud services so you are asked to prepare an Azure AD DS implementation plan. As you experiment with AADDS, one of the options is to select one of two forest types for synchronization. What is the difference between selecting user forest and resource forest?
Selecting user forest synchronizes objects in AAD and user accounts in on-premises AD Selecting resource forest only synchronizes users and group created in Azure AD
Which of the following represent valid categories of default groups in a Windows Domain? Select three.
Special Identity Users Builtin
You need to create a few GPOs for technicians to use as a baseline setting for new GPOs they are about to configure. What type of GPO should you create?
Starter GPO
Julieta wants to check the status of a certain GPO. She checks the Status flag of the GPO using the Active Directory Users and Computers tool and notices the value is 3. What does it mean?
The GPO is disabled
Identify the statements that best describe the differences between the Administrator and Guest accounts on a computer where only one domain exists.
The Guest account is disabled by default; it must be enabled by an administrator The domain Administrator account is a member of the Enterprise Admins group
You configure Azure AD DS and a group policy using a VM. However, when you test it, the policy is not applied. What could be the problem?
The VM being used is in a different virtual network
When you log into your office computer, a shared folder is automatically available. However, when you log into a lab computer the shared folder is not automatically available. What is the most likely reason for this behavior?
The computer is not a member of the domain
Havila right-clicks a computer object in Active Directory Users and Computers and clicks Reset Account. What are the possibilities that could have induced her to take this action?
The password between the computer and the computer account in Active Directory are out of sync There was a power outage about two months ago and everyone neglected to turn on the computer
Identify the elements that GPTs and GPCs have in common. Select two.
They are both assigned a globally unique ID They both have a Machine and User subfolder
Which of the following statements are true regarding the Administrative Templates in the Computer Configuration and the User Configuration nodes?
They both contain a Network subfolder They both contain a System subfolder They both contain a Control Panel subfolder
Charles removes the Authenticated Users group from a GPO. Why would he do that?
To prevent the GPO from being applied to specific users and/or computers
True or False: Prestaging enables you to do a basic unattended installation.
True
True or False: To view a list of Desired State Configuration resources, you can use the Get-DscResources PowerShell cmdlet.
True
True or False: When using Windows Deployment Services, you do not need to have the installation media ready and sit at the server console as Windows performs the task of OS installation.
True
You are creating a group policy preference. One of the options for the Folders entry is Update. What does this option do? Select two.
Updates the properties of the folder If the folder does not exist, it is created
Joseph creates a security group containing accounts and contacts. However, when Jane, a new hire who is listed as a contact in the security group, tries to sign in, permission is denied but other members of the group are able to sign in. How can the problem be rectified?
Use Active Directory to create an account for Jane
When would a company use an Azure AD security group vs. a Microsoft 365 group?
Use an AAD security group to assign access to a variety of resources Use a Microsoft 365 group when you want to send emails to a group of people
Linus, the domain administrator, uses a dedicated account to sign into a Linux computer on the network. Where in Active Directory can this capability be configured?
User Account Properties > Member Of > Set Primary Group
There are four local GPOs configured on a non-domain computer. The Local Computer Policy prevents access to the firewall settings. The Administrators policy allows access. The Non-Administrators GPO prevents access. The user-specific GPO for jdoe, who is not an administrator, allows access. Which policy will be applied to jdoe?
User-specific Policy
You add a new computer to the domain. Which of the following local groups in the computer will be modified automatically? Select two.
Users Administrators
You are using an Administrative Template to configure an aspect of the Event Viewer. In which folder will you make the changes?
Windows Components
What minimal operating system has only the services needed to access the network, work with files, copy disk images, and jump-start a Windows installation?
Windows Preinstallation Environment
The Windows Server 2016 remote management features are enabled via what Windows component?
Windows Remote Management (WinRM)
What type of image can be used to boot a client computer, usually from a CD/DVD or flash device, that can not use PXE?
discover
How can an administrator mount an image to install a hot-fix containing an updated security patch?
dism
What command will allow you to update an image with patches, drivers, hotfixes, and service packs without having to re-create the entire image?
dism.exeb mount.exe