CIS 189 Chapter 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

4. You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO? a. Check the versionNumber attribute of the GPC and open the<CTX> GPT.ini file<CTX/>.\ b. Check the versionNumber attribute of the GPT and open the <CTX>GPC.ini</CTX> file c. Right-click the GPO in the Group Policy Management console, click Properties, and view the version in the General tab d. Right-click the GPO in the Group Policy Management Editor, click Properties, and view the version in the General tab

a. Check the versionNumber attribute of the GPC and open the<CTX> GPT.ini file<CTX/>.\

18. You want to set a group policy preference that affects only computers with a CPU speed of at least 4.0 GHz. What's the best way to do this? a. Configure item-level targeting. b. Move all computers meeting the criteria to a separate OU. c. Configure the group policy client on each computer with this type of CPU. d. Create a WMI filter with the Group Policy Management Editor.

a. Configure item-level targeting.

1. Which of the following are local GPOs on a Windows 10 computer? (Choose all that apply.) a. Local Administrators b. Local Default User c. Local Default Domain d. Local Non-Administrators

a. Local Administrators d. Local Non-Administrators

17. You're concerned that some domain controllers and workstations don't meet security requirements. What should you do to verify security settings on a computer against a list of known settings? a. Run Security Configuration and Analysis on the computer to compare its security settings against a security database. b. Open the Group Policy Management console on the computer, click the Security node, and run Group Policy Results. c. Run <CTX>secpol.msc</CTX> on the computer and use Group Policy Modeling. d. Use <CTX>secedit /configure</CTX> on the computer and read the report that's generated.

a. Run Security Configuration and Analysis on the computer to compare its security settings against a security database.

10. You want to centrally back up the files that users store in the Documents folder in their user profiles, but you don't want users to have to change the way they access their files. What's the best way to go about this? a. Deploy a script that copies files from the Documents folder to a share on a server b. Configure folder redirection in the User Configuration node of a GPO c. Deploy a Mapped Drive preference, and tell users to save their files to the mapped drive d. Configure a backup policy in the Computer Configuration node of a GPO

b. Configure folder redirection in the User Configuration node of a GPO

8. You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the package to be installed unless a user needs it. How should you configure the software installation policy? a. Publish the package under the Computer Configuration node b. Assign the package under the Computer Configuration node c. Publish the package under the User Configuration node d. Assign the package under the User Configuration node

c. Publish the package under the User Configuration node

9. You want to deploy a logon script by using Group Policy. You have several sites connected via a WAN with a DC at each site. You want to make sure the script is always available when users log on from any computer at any location. What should you do? a. Create a share on the fastest DC in the network and save the script there b. Send the script via email to all users and have them save it locally c. Save the script in the SYSVOL share d. Copy the script to cloud storage

c. Save the script in the SYSVOL share

7. All your domain controllers are running Windows Server 2016. You're noticing problems with GPT replication. What should you do? a. Verify that Active Directory replication is working correctly b. Verify that FRS is operating correctly c. Verify that DFSR is operating correctly d. Check the GPOReplication flag for the GPT in the Attribute Editor

c. Verify that DFSR is operating correctly

20. You want all users to have the company home page and two other Web sites loaded in tabs when they start Internet Explorer, but you want them to be able to change their home pages if they like. What should you do? a. Configure an IE policy, and set it to unmanaged. b. Configure an Internet Options preference, and accept the default options in the Common tab. c. Configure an IE policy and enable the Allow user changes option. d. Configure an Internet Options preference, and change the defaults in the Common tab.

d. Configure an Internet Options preference, and change the defaults in the Common tab.

12. Which of the following is a subfolder in the User Configuration node but not the Computer Configuration node of a GPO? a. Network b. Windows Components c. System d. Desktop

d. Desktop

19. You have configured a group policy preference that creates a VPN connection for all computers in the GPO's scope. One user says the connection was there yesterday, but it's no longer showing in his Network Connections window. You suspect he might have deleted the connection accidentally. What can you do to make sure that the VPN connection is re-created even if a user deletes it? a. Disable the Remove this item when it is no longer valid option. b. Configure the Read-only option. c. Configure item-level targeting. d. Disable the Apply once and do not reapply option.

d. Disable the Apply once and do not reapply option.

11. Which of the following is best described as policy definition files saved in XML format? a. Administrative templates b. Security templates c. Group Policy objects d. Group Policy templates

a. Administrative templates

13. You have been working with ADMX files to modify existing Administrative Templates and create new templates. You work on different domain controllers, depending on your location. Despite a concerted effort, your ADMX files are getting out of sync. How can you solve this problem? a. Remove group policy management tools from all but one domain controller so that policies can be managed from only one computer b. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store c. Create an ADMX store in Active Directory, and move all your ADMX files to Active Directory d. Share the %systemroot%\PolicyDefinitions folder on all your domain controllers, and set up Task Scheduler to copy ADMX files automatically from one system to all other systems

b. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store

14. You need to find a policy related to an application that was installed a couple years ago. You know that the policy is persistent when the computer that it's applied to falls out of scope, but you can't remember its name. You remember a word or two that might be in the policy name or comments. What can you do to find this policy quickly? a. In the Group Policy Management console, create a policy search term; set Persistent to Any, and enable Full Text search. b. In the Group Policy Management Editor, configure a filter; set Managed to No, and enable Keyword Filters. c. In the Group Policy Management console, configure a search script; set Managed to Yes, and enable Requirements Filters. d. In the Group Policy Management Editor, configure a policy screen; set Persistent to Yes, and enable Title and Comments.

b. In the Group Policy Management Editor, configure a filter; set Managed to No, and enable Keyword Filters.

15. You have created a custom administrative template. You want this template to be available to all DCs so that policies can be configured with it from any DC. Where should you save it? a. In %systemroot%\PolicyDefinitions b. In the central store c. In the root of the C drive d. In ADUC

b. In the central store

5. Which of the following are methods for creating a GPO? (Choose all that apply.) a. Use Active Directory Users and Computers b. Link it to a container c. Use the Group Policy Objects folder of the Group Policy Management console d. Use an XML editor

b. Link it to a container c. Use the Group Policy Objects folder of the Group Policy Management console

6. You have configured a policy setting in the User Configuration node of a domain GPO and linked the GPO to OU-X. Later, you discover that you linked it to the wrong OU, so you unlink it from OU-X and link it to OU-Y, which is correct. A few days later, you find that users in OU-X still have the policy setting applied to their accounts. What's the most likely cause of the problem? a. Group policy settings haven't been refreshed. b. The policy setting is unmanaged. c. Users in OU-X have an item-level target filter configured. d. The GPO is disabled.

b. The policy setting is unmanaged.

2. Which of the following are true about GPOs? (Choose all that apply.) a. Local GPOs override domain GPOs. b. Domain GPOs are stored on member servers. c. Domain GPOs can be linked to Active Directory sites. d. The <CTX>gpedit.msc </CTX> tool can be used to edit local GPOs.

c. Domain GPOs can be linked to Active Directory sites. d. The <CTX>gpedit.msc </CTX> tool can be used to edit local GPOs.

3. Where is a GPT stored? a. In a folder named the same as the GPO in the SYSVOL share b. In a folder named the same as the GUID of the GPO in Active Directory c. In a folder named the same as the GUID of the GPO in the SYSVOL share d. In a folder named the same as the GPO in Active Directory

c. In a folder named the same as the GUID of the GPO in the SYSVOL share

16. You have installed an application that can be configured with Group Policy. The application came with a custom ADM file that must be replicated to all DCs. What should you do first? a. Copy the file to %windir%\PolicyDefinitions. b. Open the file with an XML editor and save it. c. Open the file with ADMX Migrator. d. Change the extension to <CTX>.inf</CTX>.

c. Open the file with ADMX Migrator.


Ensembles d'études connexes

Chapter 48: Assessment and Management of Patients with Obesity

View Set

Final - Database Concepts, Module 8 Quiz - Database Concepts, Module 7 Quiz - Database Concepts, Database Concepts - Module 6 Quiz, computer, SQL Chapter 2, Database Concepts - Module 6 Quiz

View Set

Chapter 13 Review Med Term (75 questions)

View Set

Exam 2: High Risk Intrapartum NCLEX Questions

View Set

Troubleshooting Common Computer Problems

View Set