NEST258 WEEK 4 - CONFIGURING GROUP POLICIES

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

When a group or user group policy setting is in the scope of a GPO it is manage by a GPO. What type of scope is changed to its original configuration outside the GPO? a. managed policy setting b. unmanaged policy setting c. log on locally d. none of these

b

Where is a GPT stored? a. In a folder named the same as the GPO in Active Directory b. In a folder named the same as the GUID of the GPO in the SYSVOL share c. In a folder named the same as the GPO in the SYSVOL share d. In a folder named the same as the GUID of the GPO in Active Directory

b

Which of the following is best described as policy definition files saved in XML format? a. Security templates b. Administrative templates c. Group Policy objects d. Group Policy templates

b

You have installed an application that can be configured with Group Policy. The application came with a custom ADM file that must be replicated to all DCs. What should you do first? a. Open the file with an XML editor and save it b. Open the file with ADMX Migrator c. Copy the file to %windir%\PolicyDefinitions d. Change the extension to .inf

b

You want all users to have the company home page and two other Web sites loaded in tabs when they start Internet Explorer, but you want them to be able to change their home pages if they like. What should you do? a. Configure an IE policy, and set it to unmanaged b. Configure an Internet Options preference, and change the defaults in the Common tab c. Configure an IE policy and enable the Allow user changes option d. Configure an Internet Options preference, and accept the default options in the Common tab

b

You want to deploy a logon script by using Group Policy. You have several sites connected via a WAN with a DC at each site. You want to make sure the script is always available when users log on from any computer at any location. What should you do? a. Send the script via email to all users and have them save it locally b. Save the script in the SYSVOL share c. Create a share on the fastest DC in the network and save the script there d. Copy the script to cloud storage

b

You want to deploy a software package that's available to all users in the domain if they want to use it, but you don't want the package to be installed unless a user needs it. How should you configure the software installation policy? a. Assign the package under the User Configuration node b. Publish the package under the User Configuration node c. Assign the package under the Computer Configuration node d. Publish the package under the Computer Configuration node

b

Which of the following are methods for creating a GPO? (Choose all that apply.) a. Use Active Directory Users and Computers b.Link it to a container c. Use the Group Policy Objects folder of the Group Policy Management console d. Use an XML editor

b, c

The ADMX central store holds policy definition files used for updating changes between domain controllers. What is the file extension of these files? a. .csadm b. .csxml c. .xml d. .admx

d

What is the intent of using a migration table? a. Copy attributes of one object to another object b. Edit the domain schema c. Copy schema from one domain to another domain d. Copy or import GPO into a domain

d

Which group members will have complete control of the GPO that is created by themselves ? a. Group Policy Owners b. Group Policy Managers c. Domain Admins d. Group Policy Creator Owners

d

Which of the following is a subfolder in the User Configuration node but not the Computer Configuration node of a GPO? a. Network b. System c. Windows Components d. Desktop

d

You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO? a. Check the versionNumber attribute of the GPT and open the GPC.ini file b. Right-click the GPO in the Group Policy Management console, click Properties, and view the version in the General tab c. Right-click the GPO in the Group Policy Management Editor, click Properties, and view the version in the General tab d. Check the versionNumber attribute of the GPC and open the GPT.ini file

d

Group Policy Container (GPC) contains which of the following attributes? a. name of the GPO b. file path to GPT c. version d. status e. all of the above

e

All your domain controllers are running Windows Server 2016. You're noticing problems with GPT replication. What should you do? a. Verify that DFSR is operating correctly b. Verify that FRS is operating correctly c. Verify that Active Directory replication is working correctly d. Check the GPOReplication flag for the GPT in the Attribute Editor

a

You are configuring common GPO properties for folders. You want to specify that only portable computers that are docked have a preference applied. Which choice will accomplish this? a. item-level targeting b. stop processing items in this extension if an error occurs c. run in logged-on user's security context (user policy option) d. apply once and do not reapply

a

You have been working with ADMX files to modify existing Administrative Templates and create new templates. You work on different domain controllers, depending on your location. Despite a concerted effort, your ADMX files are getting out of sync. How can you solve this problem? a. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store b. Create an ADMX store in Active Directory, and move all your ADMX files to Active Directory c. Share the %systemroot%\PolicyDefinitions folder on all your domain controllers, and set up Task Scheduler to copy ADMX files automatically from one system to all other systems d. Remove group policy management tools from all but one domain controller so that policies can be managed from only one computer

a

You have configured a group policy preference that creates a VPN connection for all computers in the GPO's scope. One user says the connection was there yesterday, but it's no longer showing in his Network Connections window. You suspect he might have deleted the connection accidentally. What can you do to make sure that the VPN connection is re-created even if a user deletes it? a. Disable the Apply once and do not reapply option b. Configure item-level targeting c. Configure the Read-only option d. Disable the Remove this item when it is no longer valid option

a

You have configured a policy setting in the User Configuration node of a domain GPO and linked the GPO to OU-X. Later, you discover that you linked it to the wrong OU, so you unlink it from OU-X and link it to OU-Y, which is correct. A few days later, you find that users in OU-X still have the policy setting applied to their accounts. What's the most likely cause of the problem? a. The policy setting is unmanaged. b. Users in OU-X have an item-level target filter configured. c. Group policy settings haven't been refreshed. d. The GPO is disabled.

a

You need to find a policy related to an application that was installed several years ago. You know that the policy is persistent when the computer that it's applied to falls out of scope, but you can't remember its name. You remember a word or two that might be in the policy name or comments. What can you do to find this policy quickly? a. In the Group Policy Management Editor, configure a filter; set Managed to No, and enable Keyword Filters. b. In the Group Policy Management console, configure a search script; set Managed to Yes, and enable Requirements Filters. c. In the Group Policy Management Editor, configure a policy screen; set Persistent to Yes, and enable Title and Comments. d. In the Group Policy Management console, create a policy search term; set Persistent to Any, and enable Full Text search.

a

You want to centrally back up the files that users store in the Documents folder in their user profiles, but you don't want users to have to change the way they access their files. What's the best way to go about this? a. Configure folder redirection in the User Configuration node of a GPO b. Configure a backup policy in the Computer Configuration node of a GPO c. Deploy a script that copies files from the Documents folder to a share on a server d. Deploy a Mapped Drive preference, and tell users to save their files to the mapped drive

a

Identify the correct statements for a starter GPO (Choose all that apply) a. provide the ability to combine a collection of administrative template policy in a single object b. specific to a single domain in which they are created c. can be imported and exported d. only applied to a single object in an OU e. created based on existing GPOs in the domain

a, c, e

Which of the following are local GPOs on a Windows 10 computer? (Choose all that apply.) a. Local Administrators b. Local Default User c. Local Default Domain d. Local Non-Administrators

a, d

The ADMX central store holds policy definition files used for updating changes between domain controllers. What is the format of these files? a. .adm b. .admx c. .xml d. .xlsx

c

You have created a custom administrative template. You want this template to be available to all DCs so that policies can be configured with it from any DC. Where should you save it? a. In ADUC b. In the root of the C drive c. In the central store d. In %systemroot%\PolicyDefinitions

c

You want to migrate a GPO from a parent domain to the child domain. Which command should you use? a. import GPO b. copy GPO c. import settings d. copy-gpo

c

You want to set a group policy preference that affects only computers with a CPU speed of at least 4.0 GHz. What's the best way to do this? a. Create a WMI filter with the Group Policy Management Editor b. Move all computers meeting the criteria to a separate OU c. Configure item-level targeting d. Configure the group policy client on each computer with this type of CPU

c

You're concerned that some domain controllers and workstations don't meet security requirements. What should you do to verify security settings on a computer against a list of known settings? a. Run secpol.msc on the computer and use Group Policy Modeling b. Open the Group Policy Management console on the computer, click the Security node, and run Group Policy Results c. Run Security Configuration and Analysis on the computer to compare its security settings against a security database d. Use secedit /configure on the computer and read the report that's generated

c

Which of the following are true about GPOs? (Choose all that apply.) a. Local GPOs override domain GPOs. b. Domain GPOs are stored on member servers. c. Domain GPOs can be linked to Active Directory sites. d. The <CTX>gpedit.msc </CTX> tool can be used to edit local GPOs.

c, d

Which types of files can an administrator download from a GPO central store? (choose all that apply) a. txt b. csv c. adml d. admx e. xml

c,d


Set pelajaran terkait

Web Development - Unit 1-4 for midterm

View Set

Lab Practical 4: Survey of Protists

View Set

A&P II; Exam 2 - 18 (Heart) , 19 (Cardiovascular System), & 20 (Lymphatic)

View Set

Accounting 311 Chapter 4 formulas

View Set