IST 257 Module 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings

Administrative, Templates

What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?

Connection Security Rules

________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.

Default Domain Policy GPO

Which term refers to the process whereby a user or computer obtains a certificate from a CA?

Enrollment

Only schema version 1 certificate templates can be configured for auto-enrollment. True or False?

FALSE

There are no GPOs created in an Active Directory domain by default. True or False?

FALSE

You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless. True or False?

FALSE

To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings

Group, Policy

To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manaager

Group, Policy, Management

To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)

MMC

Which of the following is not included in a certificate?

Private Key

The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.

Security, Settings

The first CA deployed is known as the ________________ CA

root

EFS uses both [a] __________ and [b] __________________ encription

symmetric, asymmetric

The CA public/private key pair expires every ____________ years. (provide number) by default

5

Software that is ___________________ under software settings is automatically installed

Assigned

Which section of a GPO contains the most security-related settings for the Windows operating system?

Computer Configuration, Windows Settings

You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?

Publish the software in the User Configuration

In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?

RADIUS server

Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.

Read, Enroll, Autoenroll

If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured

Enforced

There is also a Local Computer GPO

TRUE

Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.

Updates can be manually or automatically approved for distribution on a WSUS server., Group Policy is used to direct domain computers to a WSUS server for updates., Wa. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection., A WSUS server can be configured to remove updates from computers that have installed them.

Group Policy settings apply to which of the following objects?

Users, Computers

To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window

gpupdate /force

HTTPS uses a [a] __________ key and a [b]__________ key

public, symmetric

Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?

8531

[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.

Revoked, Certificates

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked?

Site, Domain, OU

Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain) . True or False?

TRUE

Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA. True or False?

TRUE

Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default. True or False?

TRUE

To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority

TRUE

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. True or False?

TRUE

You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. True or False?

TRUE

A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)

Group, Policy, Object

You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings

Block, Inheritance

Which of the following are/ can be included in a certificate(all that apply)

Public Key, Digital Signature, CRL location, the location of the Cas public key, certificate name, a serial number

Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?

Controlled folder access

A GPO can be linked to a- pick all that apply

Site, Domain, OU


Ensembles d'études connexes

Analytical thinking for effective outcomes (Module 1)

View Set

ENVS203: Environmental Ethics, Justice, and World Views

View Set

Lab 8.1:Chapter 08 Subnets in Cisco Packet Tracker

View Set

Environmental Science-- Chapter 3 Test

View Set

Slope and Slope Intercept Form, Graphing Linear Equations, Point-Slope and Slope-Intercept, Slope, Linear Equations Word Problems, Graphing Linear Equation Word Problems

View Set