Access Control using Group Policy (Windows)
Group Policy is a decentralized method to customize computer and user settings. True or False?
False
Security filters allow you to query a target environment and apply security settings only in certain situations. True or False?
False
The Group Policy Inventory tool can immediately deploy and apply Group Policy Objects (GPOs). True or False?
False
Windows applies multiple Group Policy Objects (GPOs) in any order that works for the situation. True or False?
False
You can create Active Directory Group Policy Objects (GPOs) on a local workstation. True or False?
False
A Group Policy Object (GPO) is a named object that contains a collection of Group Policy settings. True or False?
True
A best practice is to use meaningful names for Group Policy Objects (GPOs) to make maintenance and administration easier. True or False?
True
Active Directory Group Policy Objects (GPOs) are created using the Group Policy Management Console (GPMC). True or False?
True
All local Group Policy settings apply to a single computer. True or False?
True
An Active Directory container can be a site, a domain, or an organizational unit. True or False?
True
Defining Group Policy Objects (GPOs) in Active Directory gives you the ability to centralize security rules and control how Windows applies each rule. True or False?
True
Group Policy settings can be edited using the Registry Editor. True or False?
True
Once you design and deploy Group Policy Objects (GPOs) to support your security policy, it is important to validate your Group Policy to ensure that you have defined the right GPOs. True or False?
True
The Group Policy Editor tool enables you to view and edit Group Policy settings. True or False?
True
The Group Policy Objects (GPOs) you define and use should conform to your security policy. True or False?
True
The Resultant Set of Policy (RSOP) tool shows the specific settings that will result from applying GPOs to a specific user logged on to a specific computer. True or False?
True
Windows Group Policy provides a set of rules that govern the way Windows operates. True or False?
True
Windows Management Instrumentation (WMI) is the infrastructure Windows uses to maintain and exchange management and operations data. True or False?
True
Windows stores many Group Policy settings in the Registry. True or False?
True
You can define organizational units (OUs) to logically group computers into functional groups, such as "Accounting" and "Manufacturing." True or False?
True
For Group Policy settings stored in the Windows Registry, which of the following should be used to modify the Group Policy Object (GPO) data? a. Always use the Registry Editor. b. Always use the Local Group Policy Editor. c. Use the Local Group Policy Editor Registry Editor. Use the Registry Editor only as a last resort. d. Use the Registry Editor. Use the Local Group Policy editor only as a last resort.
c. Use the Local Group Policy Editor Registry Editor. Use the Registry Editor only as a last resort.
When you first open the Local Group Policy Editor, you see Computer Configuration and which of the following? a. Administrator Configuration b. Security Configuration c. User Configuration d. Windows Configuration
c. User Configuration
Windows applies Group Policy Objects (GPOs) to all computers and users in an organizational unit (OU) container by default. Which tool can be used to change that behavior? a. Local Group Policy Editor b. Active Directory Group Policy Editor c. Registry Editor d. Security filters
d. Security filters
Yasmin, a Windows administrator, has a new Group Policy to apply to laptops in her organization. By default, Windows checks for new or updated Group Policy Objects (GPOs) at a random interval between 90 to 120 minutes. Using Windows Server 2012, she will use Remote Group Policy Update. Given Yasmin's actions, when will the online laptops receive the GPO? a. All laptops will apply the GPO when they restart. b. Online laptops will apply the GPO within 10 minutes. c. Online laptops will apply the GPO between 60 to 90 minutes. d. The GPO applies only to laptops currently offline, when they restart.
not a
Of the following, which can be defined in Active Directory? a. Local Group Policy settings only b. Group Policies only c. Both Local Group Policy settings and Group Policies d. Neither Local Group Policy settings nor Group Policies
not b
Which of the following is true about defining and linking the number of GPOs to satisfy an organization's security policy? a. Define and link the minimum number of GPOs to satisfy the security policy. b. Define and link the maximum number of GPOs to satisfy the security policy. c. Define and link an average number of GPOs to satisfy the security policy. d. The number of linked GPOs in the organization is irrelevant.
a. Define and link the minimum number of GPOs to satisfy the security policy.
There are a wide variety of resources available for best practices use when designing and implementing Group Policy across a domain. Of the following, which resource helps identify Group Policy configuration errors or dependency issues that may prevent settings from functioning as expected? a. Group Policy Best Practices Analyzer b. Group Policy Settings Reference c. Local Group Policy Editor d. AD Group Policy Editor
a. Group Policy Best Practices Analyzer
Microsoft provides two main tools to be used when auditing Group Policy. Which of the following tools must be downloaded because it is not included in Windows by default? a. Group Policy Inventory tool b. Local Group Policy Editor c. The Resultant Set of Policy tool d. Registry Editor
a. Group Policy Inventory tool
Albert is the Windows security team lead responsible for Group Policy conformance with the company's security policy. What value does Microsoft's Group Policy Settings Reference provide Albert to perform his responsibility? a. Identify Group Policy Object (GPO) settings that already exist in the default Windows templates b. Create new Group Policy Objects (GPOs) for each of the remaining goals in the security policy c. Identify security policy elements that do not exist in default Windows templates d. Compare existing Group Policy Objects (GPOs) with the security policy
a. Identify Group Policy Object (GPO) settings that already exist in the default Windows templates
Which of the following entities is most directly responsible to ensure the security of an organization's assets? a. Management b. IT personnel c. Security personnel d. Microsoft
a. Management
Which of the following is a Windows Server feature that forces Group Policy updates on all selected computers? a. Remote Group Policy Update b. Windows Group Policy Update c. Local Group Policy Update d. Active Directory Group Policy Update
a. Remote Group Policy Update
Where does Windows store Active Directory Group Policy Objects (GPOs)? a. On the domain controller in the Local GPO folder b. On the domain controller in the Policies folder c. On the domain controller in the Active Directory folder d. On the domain controller in the Domain GPO folder
b. On the domain controller in the Policies folder
An organization's Group Policy definition should satisfy which of the following? a. Arbitrary controls b. Security policy c. Domain environment d. Local network
b. Security policy
Which of the following is true? a. Group Policy Settings take effect only when you reboot the computer. b. Group Policy Settings take effect only when you log off and then log back on to the computer. c. Group Policy Settings apply many settings to the current session. d. Group Policy Settings and boot and logon scripts perform identical functions in exactly the same manner.
c. Group Policy Settings apply many settings to the current session.
Active Directory Group Policy Objects (GPOs) are created on a domain controller using the Group Policy Management Console (GPMC). Of the following, from where can you access the GPMC? a. On any Windows Server 2012 or later b. Only on Windows Server 2019 c. Only on the domain controller d. On all Windows Servers except domain controllers
c. Only on the domain controller
Charlize is ready to deploy a fairly significant Group Policy Object (GPO). She is hesitant however, because of the organization's complicated environment and significance of the GPO. Charlize is aware of three tools: Group Policy Inventory (gpinventory), Resultant Set of Policy (RSOP), and Group Policy Management Console (GPMC). What can Charlize run to view the actual effect of the GPO before deploying the change? a. RSOP run in logging mode b. Security filter in GPMC c. RSOP run in planning mode d. Results menu in gpinventory
c. RSOP run in planning mode
For a Group Policy Object (GPO) to become active, it must be linked to at least one computer, domain, or which of the following? a. Registry b. Local account c. Distribution server d. Organizational unit (OU)
d. Organizational unit (OU)
Windows applies multiple Group Policy Objects (GPOs) in a specific order, lower to higher. Of the following, which is the highest GPO in the order? a. Local GPOs b. Site GPOs defined in Active Directory c. Domain GPOs d. Organizational unit GPOs
d. Organizational unit GPOs
Maria, a Windows administrator, has a new Group Policy to apply to computers in her organization. Using Windows Server 2012, she will use Group Policy Object (GPO) caching. Given Maria's decision, what group of computers will last apply the GPO? a. Computers online, after approximately 90 to 120 minutes b. Computers online, after approximately 10 minutes c. Computers offline, at start time d. Computers offline, at a regular interval after start time
not c
Brian is troubleshooting a Group Policy Object (GPO) that seems to defy the order in which they apply. In Active Directory, Brian has defined different GPOs regarding minimum password length. The organizational unit (OU) GPO dictates the minimum length as 8 characters. However, at his particular facility, the site GPO has the minimum as 10 characters. On his personal workstation, he has set a local override GPO to set minimum password length at 6 characters. Brian believes his password length should require only 6 characters. What is the actual minimum password length of Brian's password? a. 10 characters b. 8 characters c. 6 characters d. Depends if the domain GPO is configured
not d