ITN 200- Exam 3 - Review
What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019? 256-bit encryption 257-bit encryption 1024-bit encryption 2048-bit encryption
2048-bit encryption
Which of the following performance counters can be used to identify jabbering hardware? Pages/sec % Interrrupt Time Committed Bytes Bytes Total/sec
% Interrrupt Time
Which of the following actions can be performed to solve a performance problem? (Choose all that apply.) Stop and disable unnecessary services Move applications to other systems Add additional hardware Upgrade hardware devices with bus mastering versions
All
Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled? Read Write Enroll Autoenroll
Autoenroll
Margret is a support technician working at Mercorp Inc. She tells the interns that the easiest way to stop a rogue process from causing performance issues is to right click the process in Task Manager and click End Task. An intern asks her what he should do if the specific process restarts even after selecting End Task. What can Margret tell the intern if the process issue is caused by a third-party application and it has no solution yet?
Check with the program vendor for an update
Which of the following must you configure to ensure that a particular group of remote access servers grants Remote Desktop access only to members of the Accounting group? RemoteAccess RemoteApp Collection Connection Broker
Collection
What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec? Firewall profiles Connection security rules IPSec rules Security Associations
Connection security rules
What section of a remote access policy contains characteristics that must be met for remote access, such as Session Timeout? Conditions Criteria Constraints Settings
Constraints
Which of the following Windows Defender features can be used to limit the files, folders, and processes that ransomware can modify? Core isolation Memory integrity Controlled folder access Secure boot
Controlled folder access
What can you create in Event Viewer to display specific types of events from one or more event logs? Event filter Custom view Data collector set Event alert
Custom view
Which of the following IIS configuration features is used to specify the default webpage or Web app file that a client views? Directory Browsing Handler Mappings Request Filtering Default Document
Default Document
Which of the following steps is not a common troubleshooting procedure? Test possible solutions Isolate the problem Delegate responsibility Collect information
Delegate responsibility
What key should be pressed as soon as the computer boots to enter Safe Mode? Ctrl+Alt+Del F8 Ctrl+Shift+Del Esc
F8
After a container is running, you cannot configure its contents until the container is stopped. True or False?
False
Block storage is a cheaper alternative to object storage on public cloud providers. True or False?
False
Committed memory refers to the memory that is used by the Windows kernel and device drivers. True or False?
False
DirectAccess supports Windows 7 and later remote access clients by default. True or False?
False
Only schema version 1 certificate templates can be configured for auto-enrollment. True or False?
False
Organizations that allow Remote Desktop sessions from remote access clients that are not licensed by the organization should choose a Per Device licensing mode when configuring Remote Desktop Services. True or False?
False
Performance baselines are typically created only after installing a new Windows Server 2019 system. True or False?
False
Reliability Monitor displays a system stability index value for each day based on the values of specific performance counters. True or False?
False
Split tunneling is used to ensure that all network traffic generated by a remote access client passes through a VPN to a remote access server. True or False?
False
The Linux Containers on the Windows (LCOW) feature of Windows Server 2019 allows you to run Linux containers only if Docker EE was obtained using the DockerMsftProvider Windows PowerShell module. True or False?
False
The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS. True or False?
False
The Remote Desktop Licensing role service cannot be installed on the same computer as the Remote Desktop Session Host service. True or False?
False
The Windows Subsystem for Linux (WSL) allows you to execute Web apps in a virtual machine on Windows Server 2019. True or False?
False
The docker command is also called the Docker daemon. True or False?
False
There are five event levels available in an event log: Information, Warning, Error, Audit Success and Audit Failure. True or False?
False
There are no GPOs created in an Active Directory domain by default. True or False?
False
You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless. True or False?
False
Which of the following components represents a specific hardware device or software component that can be monitored? Performance object Performance alert Performance counter Instance
Instance
Which of the following options on the Advanced Boot Options menu can be used to start a system that failed to boot previously due to incorrect settings in the Windows Registry, or a recently added device driver? Safe Mode Debugging Module Disable Driver Signature Enforcement Last Known Good Configuration (advanced)
Last Known Good Configuration (advanced)
Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode. If Michaela selects the Per User licensing mode, which of the following statements is true?
Michaela's organization allows users to connect remotely using their personal computers.
Module 10
Module 10
Module 11
Module 11
Module 12
Module 12
Module 9
Module 9
On which part of the maintenance cycle do server administrators spend the most time? Monitoring Proactive maintenance Reactive maintenance Documentation
Monitoring
Kelsan Informatics has its client computers connected to a router through which the clients can access the organization's servers in the DMZ. The DMZ is connected to a NAT router that is connected to the Internet. In addition to providing access to the Internet, the NAT router also offers additional capabilities, such as traffic throttling, intrusion prevention, and malware filtering. What is the term for this type of NAT router?
Next Generation Firewall
You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.) OU Group Site Domain
OU & Site & Domain
Which of the following is not considered a remote access technology? DirectAccess L2TP PPPoE Remote Desktop
PPPoE
Which of the following cloud delivery models uses containers exclusively to run Web apps? SaaS PaaS IaaS XaaS
PaaS
Which two tools are commonly used to create performance baselines? (Choose two answers.) Performance Monitor Task Manager Data Collector Sets Event Viewer
Performance Monitor & Data Collector Sets
Which of the following can be included in a data collector set? (Choose all that apply.) Performance counter Dump files Event trace provider Windows Registry key
Performance counter Event trace provider Windows Registry key
Which of the following is not included in a certificate? Public key Private key Digital signature CRL location
Private key
Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization? Right-click the process and click Create dump file Right-click the process and click Search online Right-click the process and click Analyze wait chain Right-click the process and click UAC virtualization
Right-click the process and click Create dump file
Which of the following can be easily identified on the Processes tab of Task Manager? (Choose all that apply.) Rogue processes The number of bytes a process is sending to and from the network The files that a process is using Memory leaks
Rogue processes & Memory leaks
You have created a data collector set called SERVERX Data Collector set. As a system administrator, you want to restrict other users from accessing the results of the data set. Which of the following options under the properties dialog box will you use? General Directory Schedule Security
Security
Martha is configuring the Network Policy and Access Services server role to configure a Windows Server 2019 system as a RADIUS server so that it can be used with the 802.1X Wireless. After this, she is facing some issues activating the server in Active Directory. She thinks that there were issues with the installation. Which of the following event logs should Martha check to examine events specific to the installation? Security Application Setup System
Setup
Joshua works as a systems administrator. A computer running Windows 2019 Server crashes. However, he is not able to find the root cause of the problem. If the root cause of the problem is processor overload, which of the following should Joshua investigate to troubleshoot the issue? The Security event log The Hardware Events event log The Application event log The System event log
The Hardware Events event log
Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?
The Profile pane
The programs running on the client systems in your organization are not able to access a service on the server. The problem is not with the server because the network services are running and you are able interact with the network service on your local machine. What do you see as other possible issues with the server access? The client programs are not using the non-standard port number used by the network service. The network service might have failed to start when the client systems were requesting the service. The network service is not responding to the requests from a local machine. There were other client systems that were accessing the network service.
The client programs are not using the non-standard port number used by the network service.
Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users. Their operating system is Windows XP. They have the Block Inheritance setting at the OU level. The template did not have the Enforced setting. Their operating system is Windows 2000.
Their operating system is Windows 2000.
A baseline is a set of performance information for a system during normal times of operation. True or False?
True
DirectAccess uses HTTPS to authenticate remote access users, and IPSec to create an encrypted tunnel for network traffic between the remote access client and server. True or False?
True
Each server role and feature that is added to a Windows Server 2019 system also adds additional performance objects and counters. True or False?
True
Many organizations store system documentation in help desk ticketing software. True or False?
True
Nano Server containers must be run as a Hyper-V container on Windows Server 2019. True or False?
True
Resource Monitor allows you to identify the storage devices and files that a single process is accessing. True or False?
True
Searching an event description or event ID online can generate a list of possible causes and associated solutions for a problem. True or False?
True
While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?
WID connectivity
Which of the following commands can be used to start the Apache Web server in a Linux container or WSL Linux distribution on a Windows Server 2019 system? httpstart apachectl start apt-get start apache apt-get start http
apachectl start
Which of the following Linux distributions are supported for use with WSL? (Choose all that apply.) Fedora Ubuntu OpenSUSE Leap Debian GNU/Linux
All
In a continuous deployment scenario, which software creates a container or virtual machine on a cloud server to test the functionality of a new Web app version? Orchestration Code repository Workflow Build automation
Build automation
David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?
By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts
Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers? By using a WMI filter By using the Security Filtering option By setting Group Policy preferences By modifying Software Settings under Group Policy
By using a WMI filter
What features does RADIUS provide for remote access connections? Centralized logging Remote access policies Centralized authentication Centralized encryption
Centralized logging & Remote access policies & Centralized authentication
Which section of a GPO contains the most security-related settings for the Windows operating system? User Configuration, Windows Settings Computer Configuration, Windows Settings User Configuration, Administrative Templates Computer Configuration, Administrative Templates
Computer Configuration, Windows Settings
You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO? Publish the software in the User Configuration Assign the software in the User Configuration Publish the software in the Computer Configuration Assign the software in the Computer Configuration
Publish the software in the User Configuration
In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA? WAP Wireless client RADIUS server Domain controller
RADIUS server
Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.) Read Write Enroll Autoenroll
Read & Enroll & Autoenroll
Which of the following Remote Desktop Services role services uses HTTPS to provide encryption for all RDP packets? Remote Desktop Connection Broker Remote Desktop Gateway Remote Desktop Session Host Remote Desktop Virtualization Host
Remote Desktop Gateway
You are tasked with deploying a private cloud in your organization that needs to host both Windows and Linux Web apps using a SaaS delivery model on a single Windows Server 2019 system. What technology should you configure on the Windows Server 2019 system? WSL LCOW Hyper-V Docker EE
WSL
An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory. What RAS capability will allow the organization's applications to be accessible to users outside of the organization? Virtual Private Networks Web Application Proxy DirectAccess RemoteApp
Web Application Proxy
You are troubleshooting a hard disk error in a Windows Server 2019 system. You are not able to identify the root cause of the problem. A colleague suggests that you look at the system event log for more information. Is your colleague right about the system log? Why?
Yes. Events related to hardware issues are usually recorded in the system event log.
Which of the following commands can be used to display containers that are no longer running?
docker ps -a
What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet? Port forwarding Demand-dial interface Reverse proxy DirectAccess
Demand-dial interface
An organization separates its client computers from its servers in a DMZ. The client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router. In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? Next Generation Firewall Demarcation point Remote access server Point-to-Point Protocol over Ethernet (PPPoE)
Demarcation point
After experiencing several issues with an Active Directory domain controller, you have decided to perform a restore operation on the Active Directory. Which of the following options on the Advanced Boot Options menu should be used to perform the restoration? Safe Mode with Networking. Directory Services Repair Mode. Repair Your Computer. Active Directory Emergency Maintenance Mode.
Directory Services Repair Mode
You download multiple container images from Docker Hub and create containers using the docker run command. After a few days, you notice that the list of containers that you have run is quite large. Which of the following commands can you use to shorten this list?
Docker container prune
Which of the following VPN authentication methods is considered the most secure? EAP CHAP MS-CHAPv2 PAP
EAP
Which of the following network topologies should you choose if your DirectAccess remote access server is connected directly to the demarc, as well as to the DMZ? Edge Connection Broker Behind an edge device (with two network adapters) Behind an edge device (with a single network adapter)
Edge
To which of the following groups should you assign NTFS/ReFS permissions for Web app content in order to provide anonymous user access? IUSRS .NET_USRS IIS_IUSRS WWWUSRS
IIS_IUSRS
Which of the following VPN protocols uses IPSec to encrypt network traffic? (Choose all that apply) IKEv2 PPTP SSTP L2TP
IKEv2 & L2TP
You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service. On the next configuration screen, which of the following services should you select? LAN routing Demand-dial connections NAT Dial-up access
LAN routing
Ahmed, a network administrator, is looking at the events added to a Windows Server 2019 system log in the Event Viewer. He notices three events being highlighted with a yellow exclamation mark. The events were related to a remote access attempt. If Ahmed were to treat this as a warning sign, what kind of issues should he anticipate?
The functionality of the system can be affected
You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the docker images command. What will be the result in this scenario? The list of Windows container images will be displayed The list of Linux container images will be displayed All container images on the system will be displayed None of the container images on the system will be
The list of Windows container images will be displayed.
Remote access servers can be configured as RADIUS clients. True or False?
True
Group Policy settings apply to which of the following objects? (Choose all that apply.) Users Computers Groups Ous
Users & Computers
Which term refers to the process whereby a user or computer obtains a certificate from a CA? PKI enrollment revocation hashing
enrollment
What command can you use to determine if a network service is listening on the correct port number? netstat -a tracert ping Test-NetConnection
netstat -a
Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router. Which of the following is Lashonda most likely to do? She will select the Demand-dial connections service. She will select the LAN routing service. She will install the Web Application Proxy role service. She will select the Dial-up access service.
She will select the Demand-dial connections service.
You have configured a remote access server in your DMZ for IKEv2 VPN access. Which ports on your NAT router must you configure for port forwarding to this remote access server? (Choose all that apply.)
TCP port 1701, UDP port 500 & UDP port 4500
Your organization launches a new web application for video editing. Multiple users can access the application at the same time and edit their videos online. What will you use to monitor the amount of memory being used by the application in real time? The Reliability Monitor Data Collector Sets Event Viewer The Performance Monitor
The Performance Monitor
The hard disk of a computer running the Windows Server 2019 operating system fails. A colleague tells you that the data on the hard disk can be regenerated as soon as it is replaced with a new one. Can you identify why this solution is feasible? The system need not be powered down to replace the hard disk. The operating system was backed up prior to the disk failure. The Windows system uses a RAID level 5 configuration. The corrupt hard disk contained the boot volume.
The Windows system uses a RAID level 5 configuration
You are using the Performance Monitor in Windows Server 2019 to collect information regarding the system's performance. What does the % Idle Time counter indicate? The percentage of time a storage device was not performing a read or write function The percentage of time the processor spends executing processes that do not require privileged access The percentage of free space on a volume The percentage of time the processor spends responding to interrupts
The percentage of time a storage device was not performing a read or write function
Websites on a Web server provide the front end for most Web apps. True or False?
True
You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. True or False?
True
Which command can you execute to create a container from the microsoft/iis container image that runs in the background and automatically maps port 80 in the container to a port above 32767 on the underlying operating system? docker run -d -P microsoft/iis docker run -d -p *:80 microsoft/iis docker exec -it -P microsoft/iis docker exec -it -p *:80 microsoft/iis
docker run -d -P microsoft/iis
Which docker command displays container images available on Docker Hub? docker images docker container images docker search docker pull
docker search
Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS? 80 443 8530 8531
8531
At minimum, which Remote Desktop Services role services must you install to provide session-based desktop deployment across multiple remote access servers? (Choose all that apply.) Remote Desktop Session Host Remote Desktop Connection Broker Remote Desktop Licensing Remote Desktop Virtualization Host
Remote Desktop Session Host & Remote Desktop Connection Broker & Remote Desktop Licensing
Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window: PS C:\> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force PS C:\> Install-Package -Name docker -ProviderName DockerMsftProvider. Identify the correct code that should replace XXXX.
Repository
As a server administrator, which of the following actions can you perform on a Remote Desktop connection to provide interactive user support for the user of the session? Send Message Disconnect Duplicate Shadow
Shadow
To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. True or False?
True
Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.) WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. Group Policy is used to direct domain computers to a WSUS server for updates. Updates can be manually or automatically approved for distribution on a WSUS server. A WSUS server can be configured to remove updates from computers that have installed them.
All
Andrade is a systems administrator. He goes through several event logs with thousands of events on a regular basis to troubleshoot system issues. What is the easiest way to limit the events to only those that are relevant to a specific problem?
He can use the Filter Current Log option in the Actions pane in Event Viewer.
To minimize cloud costs, a continuous deployment process is not used. Instead, Web app developers must add new versions of their Linux Web app to a container and test its functionality locally before running it on the public cloud provider. What could you configure on an existing Windows Server 2019 system to allow the Web app developers in your organization to test new versions of their containerized Linux Web app? (Choose all that apply.)
Hyper-V & Docker EE & LCOW
Your organization runs several applications that store information on a specific volume on a Windows 2019 Server system. Of late, the applications have become slow and fail to perform as they did earlier. The performance improves after the server administrator defragments the volume. Can you identify what the problem must have been?
The space for file cache was not sufficient.
Each Linux container run on Windows Server 2019 using LCOW is automatically run as a Hyper-V container that executes on a Linux kernel provided by the LinuxKit component of Docker EE. True or False?
True
Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain). True or False?
True
Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA. True or False?
True
Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default. True or False?
True
Your organization has a Windows Server 2019 system called SERVERX. It has come to your notice that several computers have tried to access a file in the server and failed in the attempt. You check the Security event log to check how many of such events attempts have been made in the past six months. The log has only stored information pertaining to the past few days. What can you do to ensure that the log stores more information?
Increase the size limit of the event log
Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess. If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? Remote Access Server Remote Clients Infrastructure Servers Application Servers
Remote Clients
What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? Remote Desktop Licensing Remote Desktop Virtualization Host Remote Desktop Web Access Remote Desktop Gateway
Remote Desktop Gateway
Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access server on his system. He is able to manipulate actions within the application on his system. If Hiro was able to launch Microsoft Outlook directly from his computer without accessing the desktop of the remote server, which of the following options is he using?
RemoteApp
Soha wants to build a Web app that analyzes financial details of users and provides them with investment advice. She will be running this app on a public cloud using IIS. If Soha wants to take advantage of applications pools to improve security of her Web app, which of the following should she do?
She should create the Web app using ASP.NET
What must you configure in IIS Manager to allow users to access a help desk ticketing system Web app using the URL https://www.sample.com/helpdesk? (Choose all that apply.) A help desk virtual directory Request filtering An HTTPS protocol binding The WebSocket protocol
A help desk virtual directory & An HTTPS protocol binding
Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating? A denial-of-service attack A man-in-the-middle attack A drive-by attack A malware attack
A man-in-the-middle attack
Lea's organization develops a cloud-based storage application. While running the application on the local server, she notices that a process run by the application consumes excess amounts of memory, which in turn leads to new performance issues. She gets the process ID from Task Manager to search for possible solutions online. However, she is not successful. What should Lea have done instead?
Create a dump file and share it with the development team so that they can fix the issue
You are troubleshooting a network latency issue in your organization. You identify a router as the root cause of the problem. The router was rejecting IP packets sent from computers requesting a service from a Windows Server 2019 system. What will you do to solve this issue? Reinstall Windows Server 2019. Reboot the router Disable the firewall. Reboot the computers sending the packets.
Reboot the router.
A computer is running multiple applications simultaneously. They all demand large amounts of processor time, which affects the processing speed of the system. Which of the following options will you use to identify and terminate the process that is consuming the highest processor time?
Select the Processes tab of Task Manager and click the CPU column
The workstations in your organization have been upgraded with the latest GPUs. To save costs, the company has procured a brand that is not widely known in the market. To install the drivers, the system administrator reboots the system using the Disable Early Launch Anti-Malware Driver option in the Advanced Boot Options menu. Why do you think this step was required to install the driver?
Windows Defender may have considered the driver to be suspicious.
Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured? Configure the Configure 802.1X wizard Activate the server in Active Directory Edit or remove existing RADIUS clients Choose the EAP authentication method
Activate the server in Active Directory
Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers. If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?
The remote access server was not rebooted after the recent changes.
Giselle, a systems administrator, creates a file redirection GPO, She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?
The settings can only be applied at the next login.
The user permission necessary for VPN remote access can be granted in the properties of a user account or remote access policy. True or False?
True