Implementing and Supporting Servers 2012/R2 Test 2 (chapter 5-8)

Ace your homework & exams now with Quizwiz!

Which group policy is applied first from the following?

Local

Which of the following is used by Windows clients to access shared files and printers?

SMB (Server Message Block)

What are the two primary group types used for administering Windows Active Directory (AD)?

Security Groups & Distribution Groups

What two ways are there to secure files in Windows?

Shared Permissions & NTFS Permissions

There are two types of objects that can be assigned permissions to access the file system?

False (There are 3; Users, groups, or computers)

Which of the following tools is primarily used for creating, managing, and editing GPOs?

GPMC (Group Policy Management Console)

What does GPT stand for?

Group Policy Template

Objects in an OU with the Block Inheritance option set are affected by a domain-linked GPO with the Enforced option set. True or False?

True

When a policy setting in Computer Configuration and User Configuration in the same GPO conflict, the Computer Configuration policy setting takes precedence. True or False?

True

A user needs to create files and make changes to file contents. Aside from the Read permission, what other permission should the user be granted without allowing more access than is necessary? a. Write b. Full control c. Modify d. Create

A. Write

You're the administrator of a file server. Tom, who is on vacation, had created a file that Mary needs access to, but neither her account nor the Administrator account has permission to access the file. What is the best way to allow Mary to access the file?

As Administrator, take ownership of the file, grant Mary the permission she needs, and then give ownership back to Tom.

Which of the following is not associated with an Active Directory tree? a. A group of domains b. A container object that can be linked to a GPO c. A common naming structure d. Parent and child domains

B. A container object that can be linked to a GPO

Which of the following is not a standard NTFS permission? a. Read & execute b. Change c. Write d. List folder contents

B. Change

Which of the following is considered a security principal? (Choose all that apply.) a. Contacts b. Computer accounts c. User accounts d. Distribution groups

B. Computer accounts C. User accounts

Which MMC is added after Active Directory installation? (Choose all that apply.) a. Active Directory Domains and Trusts b. Active Directory Groups and Sites c. ADSI Edit d. Active Directory Restoration Utility

A. Active Directory Domains and Trusts C. ADSI Edit

Which of the following is a built-in user account? (Choose all that apply.) a. Administrator b. Operator c. Anonymous d. Guest

A. Administrator D. Guest

Which of the following can be used to create shares? (Choose all that apply.) a. Advanced sharing b. Disk Management c. Simple file sharing d. File and Storage Services

A. Advanced sharing C. Simple file sharing D. File and Storage Services

You want to configure an inbound firewall rule that allows a connection only if the computer trying to make the connection is authenticated. What option should you select? a. Allow the connection if it is secure b. Block unauthenticated connections c. Isolation mode d. Allow Domain connections

A. Allow the connection if it is secure

Which of the following is associated with an Active Directory forest? (Choose all that apply.) a. Can contain trees with different naming structures b. Allows independent domain administration c. Contains domains with different schemas d. Represents the broadest element in Active Directory

A. Can contain trees with different naming structures B. Allows independent domain administration D. Represents the broadest element in Active Directory

You're having replication problems with your GPOs and suspect that the version numbers have somehow gotten out of sync between the GPT and the GPC. What can you do to verify the version numbers on a GPO? a. Check the versionNumber attribute of the GPC and open the GPT.INI file. b. Check the versionNumber attribute of the GPT and open the GPC.INI file. c. Right-click the GPO in the Group Policy Management console, click Properties, and view the version in the General tab. d. Right-click the GPO in the Group Policy Management Editor, click Properties, and view the version in the General tab.

A. Check the versionNumber attribute of the GPC and open the GPT.INI file.

Which of the following is considered a leaf object? (Choose all that apply.) a. Computer account b. Organizational unit c. Domain controller d. Shared folder

A. Computer account D. Shared folder

Which of the following is a default folder object? a. Computers b. Domain Controllers c. Groups d. Sites

A. Computers

Which of the following is a file-sharing protocol supported by Windows Server 2012/R2 File and Storage Services role? (Choose all that apply.) a. SMB b. FTP c. TFTP d. NFS

A. SMB D. NFS

Which of the following is the responsibility of a domain controller? (Choose all that apply.) a. Storing a copy of the domain data b. Providing data search and retrieval functions c. Servicing multiple domains d. Providing authentication services

A. Storing a copy of the domain data B. Providing data search and retrieval functions D. Providing authentication services

In which of the following ways can a user become a file's owner? (Choose all that apply.) a. Take ownership of the file. b. Create the file. c. Belong to the File Owner special identity. d. Be assigned as the owner by an administrator.

A. Take ownership of the file B. Create the file D. Be assigned as the owner by an administrator

Which of the following is true about user accounts in a Windows Server 2012/R2 domain? (Choose all that apply.) a. The name can be from 1 to 20 characters. b. The name is case sensitive. c. The name can't be duplicated in the domain. d. Using default settings, PASSWORD123 is a valid password.

A. The name can be from 1 to 20 characters. C. The name can't be duplicated in the domain.

Which of the following account options can't be set together? (Choose all that apply.) a. User must change password at next logon. b. Store password using reversible encryption. c. Password never expires. d. Account is disabled.

A. User must change password at next logon. C. Password never expires.

Which SMB share option should you enable if you don't want users to see files they don't have at least Read permission to? a. Offline files b. Hidden shares c. BranchCache d. Access-based enumeration

D. Acces-based enumeration

Which of the following is an inbound and outbound rule type you can create with Windows Firewall with Advanced Security? (Choose all that apply.) a. Program b. Port c. Server d. Isolation

A. Program B. Port

You're a consultant for a small company that uses eight Windows 8.1 computers in a workgroup configuration. The owner asked you to set restrictive policies on users to prevent them from making Control Panel, desktop, and other changes. The owner wants to be exempt from these policies but shouldn't be a member of the local Administrators group. What should you do? a. Configure the Local Computer Policy object, and then configure a user-specific GPO for the owner. b. Configure the Local Computer Policy object, and use GPO filtering to exempt the owner from this policy. c. Install Windows Server 2012 R2 and configure Active Directory. Add the Windows 8.1 computers to the domain, configure a GPO for the domain, and use filtering to exempt the owner. d. Configure the Local Computer Policy object, and then configure a logon script for the owner that changes the restrictive settings.

A. Configure the Local Computer Policy object, and then configure a user-specific GPO for the owner.

You want to make changes to policy settings that affect File Explorer. The settings are in the Administrative Templates folder of the User Configuration node. You want the settings to affect all users in the domain. Which of the following is the best way to accomplish this? a. Create a GPO, configure the policy, and link the GPO to the Domain object. b. Create a GPO, configure the policy, and link the GPO to the Users OU. c. Configure the policy in the Default Domain Controllers Policy GPO. d. Configure the policy in the Default Domain Policy GPO and set a security filter for the Domain Users group.

A. Create a GPO, configure the policy, and link the GPO to the Domain object.

An expensive color laserjet printer is shared by a group of managers and some other employees. The managers complain that they often have to wait for their print jobs until other employees' large jobs have finished. Usually, the managers' print jobs are small and needed immediately, but other employees rarely need their print jobs in a hurry. What can you do to help solve this problem without buying additional equipment? a. Create two printers and assign them different priorities and permissions. b. Create another printer and configure a printer pool. c. Buy another printer and configure permissions so that only managers can access it. d. Make the printer available only during the hour's managers are working.

A. Create two printers and assign them different priorities and permissions.

You need to prevent members of a group from accessing a subfolder of a folder the group does have access to. What's the best way to do this? (Choose two answers. Each correct answer represents part of the solution.) a. Disable permission inheritance on the subfolder, and convert existing permissions. b. Add each member of the group to the subfolder's DACL, and assign a Deny permission to each member. c. Create a new group, and add members of the existing group to this new group. Add the new group to the subfolder's DACL with a Deny permission. d. Remove the group from the subfolder's DACL.

A. Disable permission inheritance on the subfolder, and convert existing permissions. D. Remove the group from the subfolder's DACL.

You have installed a shared printer with the default permissions and want users to be able to manage their own documents in the print queue. What do you need to do? a. Do nothing. b. Assign the Everyone special identity the Manage documents permission. c. Assign the Everyone special identity the Manage printers permission. d. Add Domain Users to the Printer Operators group.

A. Do nothing

An account named SrAdmin created an OU named QandA under the Operations OU. Which of the following is true by default? a. Domain Admins is the owner of the QandA OU. b. SrAdmin is the owner of the QandA OU and all objects created inside it. c. SrAdmin has all standard permissions except Full control for the QandA OU. d. The Everyone group has Read permission to the QandA OU.

A. Domain Admins is the owner of the QandA OU.

Which of the following is a directory partition? (Choose all that apply.) a. Domain directory partition b. Group policy partition c. Schema directory partition d. Configuration partition

A. Domain directory partition C. Schema directory partition D. Configuration partition

Which direct group scope conversion is allowed? a. Domain local to universal, provided no domain local group is already a member b. Global to domain local, without restriction c. Domain local to global, provided no domain local group is already a member d. Universal to global, without restriction

A. Domain local to universal, provided no domain local group is already a member

Which of the following is a feature of Active Directory? (Choose all that apply.) a. Fine-grained access controls b. Can be distributed among many servers c. Can be installed on only one server per domain d. Has a fixed schema

A. Fine-grained access controls B. Can be distributed among many servers

Which of the following is a valid group scope? (Choose all that apply.) a. Global b. Domain local c. Forest d. Domain global

A. Global B. Domain local

Which type of connection security rule should you configure if you want to prevent computers in your domain from connecting to computers outside the domain? a. Isolation b. Authentication exemption c. Server-to-server d. Tunnel

A. Isolation

Which of the following is a user account category? (Choose all that apply.) a. Local b. Global c. Domain d. Universal

A. Local C. Domain

Which of the following is a local GPO on a Windows 8.1 computer? (Choose all that apply.) a. Local Administrators b. Local Default User c. Local Default Domain d. Local Non-Administrators

A. Local Administrators D. Local Non-Administrators

Which of the following specifies what types of actions a user can perform on a computer or network? a. Attributes b. Rights c. Permissions d. Classes

B. Rights

Which administrative share does Active Directory use for replication? a. NETLOGON b. SYSVOL c. Admin$ d. IPC$

B. SYSVOL

All domains in the same forest have which of the following in common? (Choose all that apply.) a. Domain name b. Schema c. Domain administrator d. Global catalog

B. Schema D. Global catalog

Which of the following best describes a directory service? a. Similar to a list of information in a text file b. Similar to a database program but with the capability to manage objects c. A program for managing the user interface on a server d. A program for managing folders, files, and permissions on a distributed server

B. Similar to a database program but with the capability to manage objects

You want to have a library of GPOs that specify baseline settings for different policy categories, and you can use this library to create new GPOs with baseline settings already configured. What's the best way to accomplish this? a. Create a number of GPOs in the Group Policy Objects folder and export the settings. b. Create Starter GPOs for each policy category you want to configure. c. Configure the GPOs in the Group Policy Modeling folder. d. Create GPOs in offline mode and save them to the central store.

B. Create Starter GPOs for each policy category you want to configure.

You're concerned that some domain controllers and workstations don't meet security requirements. What should you do to verify security settings on a computer against a list of known settings? a. Create a security template and run Group Policy Modeling. b. Create a security database from a template and run secedit.exe. c. Load the Security Templates snap-in and use the Group Policy Results feature. d. Export the Security Settings node on the computer and run Security Configuration and Analysis.

B. Create a security database from a template and run secedit.exe.

You have been working with ADMX files to modify existing Administrative Templates and create new templates. You work on different domain controllers, depending on your location. Despite a concerted effort, your ADMX files are getting out of sync. How can you solve this problem? a. Remove group policy management tools from all but one domain controller so that policies can be managed from only one computer. b. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store. c. Create an ADMX store in Active Directory, and move all your ADMX files to Active Directory. d. Share the %systemroot%\PolicyDefinitions folder on all your domain controllers, and set up Task Scheduler to copy ADMX files automatically from one system to all other systems.

B. Create an ADMX store in the SYSVOL share, and copy the ADMX files to the ADMX store.

Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain security settings that should apply to all computers from both domains when they're located at the site. What's the best way to ensure that the correct security settings are applied to the computers at each site? a. Create three OUs in each domain, one for each site. In both domains, place the computer accounts in the OU corresponding to the site where the computer is located. Apply a GPO with the appropriate security settings to each OU in both domains. b. Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO. c. Create three GPOs, one for each site. Apply the GPOs to the domain object in both domains. Create three groups, one for each site, and place the computer accounts in the appropriate groups. Use GPO filtering to make sure the policy configured for each site affects only the corresponding group of computers. d. On each computer in each site, configure the local GPO in GPOE with the appropriate security settings. In the Group Policy Object Editor, right-click the Computer Configuration node and click Block Inheritance.

B. Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding site, and enforce the GPO.

The Tsmith user account has been granted the Read share permission. Tsmith is a member of the Sales group, which has been granted the Change share permission. In the shared folder's Security tab, Sales has been granted Full control, and the Users group has been granted Read permission. Which of the following can Tsmith do in the share when accessing it from the network? (Choose all that apply.) a. Change permissions on all files. b. Delete all files. c. Take ownership of all files. d. Create files.

B. Delete all files. D. Create files.

To which of the following can a GPO be linked? (Choose all that apply.) a. Trees b. Domains c. Folders d. Sites

B. Domains D. Sites

Which of the following can be a member of a universal group? (Choose all that apply.) a. User accounts from the local domain only b. Global groups from any domain in the forest c. Other universal groups d. Domain local groups from the local domain only

B. Global groups from any domain in the forest C. Other universal groups

You have hired a new junior administrator and created an account for her with the logon name JrAdmin. You want her to be able to reset user accounts and modify group memberships for users in the Operations department whose accounts are in the Operations OU. You want to do this with the least effort and without giving JrAdmin broader capabilities. What should you do? a. In Active Directory Administrative Center, right-click the Operations OU, click Properties, and click Managed By. b. In Active Directory Users and Computers, right-click the Operations OU and click Delegate Control. c. Open the Operations Security tab and add JrAdmin to the DACL. d. Add JrAdmin to the Password Managers domain local group.

B. In Active Directory Users and Computers, right-click the Operations OU and click Delegate Control.

The protocol for accessing Active Directory objects and services is based on which of the following standards? a. DNS b. LDAP c. DHCP d. ICMP

B. LDAP

Which type of account is not found in Active Directory? a. Domain user account b. Local user account c. Built-in user account d. Computer account

B. Local user account

Which of the following is true about organizational units? (Choose all that apply.) a. OUs can be added to an object's DACL. b. OUs can be nested. c. A group policy can be linked to an OU. d. Only members of Domain Administrators can work with OUs.

B. OUs can be nested. C. A group policy can be linked to an OU.

Over the past several months, Tom, who has access to sensitive company information, has logged on to computers in other departments and left them without logging off. You have discussed the matter with him, but the problem continues to occur. You're concerned that someone could access these sensitive resources easily. What's the best way to solve this problem? a. Ensure that all computers Tom is logging on to have screen savers set to lock the computer after 15 minutes of inactivity. b. Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties. c. Move Tom's account and computer to another domain, thereby making it impossible for him to log on to computers that are members of different domains. d. Disable local logon for Tom's account on all computers except Tom's.

B. Specify which computers Tom can log on to in the domain by using the Log On To option in his account's properties.

None of the computers in an OU seem to be getting computer policies from the GPO linked to the OU, but users in the OU are getting user policies from this GPO. Which of the following is a possible reason that computer policies in the GPO aren't affecting the computers? (Choose all that apply.) a. The GPO link is disabled. b. The Computer Configuration settings are disabled. c. The computer accounts have Deny Read permission. d. The OU has the Block Inheritance option set.

B. The Computer Configuration settings are disabled. C. The computer accounts have Deny Read permission.

What command can you put in a batch file to allow users to access the Public share on the ServPub1 server, using the drive letter P? a. net share P: \\ServPub1\Public b. net use P: \\ServPub1\Public c. share \\ServPub1\Public P: d. share P: \\ServPub1\Public

B. net use P: \\ServPub1\Public

By default, when are policies set in the User Configuration node applied? a. Every 5 minutes b. Immediately c. At user logon d. At computer restart

C. At user logon

A domain user logging on to the domain becomes a member of which special identity group? a. Creator Owner b. System c. Authenticated Users d. Anonymous Logon

C. Authenticated Users

You need to create a share containing confidential information that only a select group of people should know about. You don't want this share to appear in users' network browse lists. What can you do that involves the least administrative effort and disruption? a. Disable network discovery on all computers. b. Disable network discovery on the computers of users who you don't want to see the share. c. Put a $ character at the end of the share name. d. Put a @ character at the beginning of the share name.

C. Put a $ character at the end of the share name.

Which of the following is not true about disk quotas? a. Users can be prevented from saving files on a volume. b. An event can be generated when a user exceeds the quota limit. c. Quotas can be overridden for groups. d. Quotas can be set without denying disk space to users.

C. Quotas can be overridden for groups.

You have created a GPO named RestrictU and linked it to the Operations OU (containing 30 users) with link order 3. RestrictU sets several policies in the User Configuration node. After a few days, you realize the Operations OU has three users who should be exempt from the restrictions in this GPO. You need to make sure these three users are exempt from RestrictU's settings, but all other policy settings are still in effect for them. What's the best way to proceed? a. Move the three users to a new OU. Create a GPO with settings appropriate for the three users, and link it to the new OU. b. Create an OU under Operations, and move the three users to this new OU. Create a GPO, and link it to this new OU. Configure the new OU to block inheritance of the RestrictU GPO. c. Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO. d. Set the Enforced option on RestrictU with an Enforce filter that excludes the three user accounts.

C. Create a global group and add the three users as members. Configure GPO security filtering so that the global group is denied access to the GPO.

Which of the following is not part of Active Directory's logical structure? a. Tree b. Forest c. DC d. OU

C. DC

Jane has left the company. Her user account is a member of several groups and has permissions and rights to a number of forest-wide resources. Jane's replacement will arrive in a couple of weeks and needs access to the same resources. What's the best course of action? a. Find all groups Jane is a member of and make a note of them. Delete Jane's user account and create a new account for the new employee. Add the new account to all the groups Jane was a member of. b. Copy Jane's user account and give the copy another name. c. Disable Jane's account. When the new employee arrives, rename Jane's account, assign it a new password, and enable it again. d. Export Jane's account and then import it when the new employee arrives. Rename the account and assign it a new password.

C. Disable Jane's account. When the new employee arrives, rename Jane's account, assign it a new password, and enable it again.

Which of the following is the core logical structure container in Active Directory? a. Forest b. OU c. Domain d. Site

C. Domain

Which of the following is true about the Users domain local group? a. It's in the Users folder. b. It can be converted to a global group. c. Domain Users is a member. d. Its members can log on locally to a domain controller.

C. Domain Users is a member.

Which is responsible for management of adding, removing, and renaming domains in a forest? a. Schema master b. Infrastructure master c. Domain naming master d. RID master

C. Domain naming master

You have been getting quite a few calls with requests to restore files from a backup because the file was accidentally deleted from a share or because the user needed a previous version of a file that was overwritten. Restoring the files has become a burden, and sometimes you need to repeat the process several times until you find the version the user needs. What can you do to give users a way to access the files they need and reduce your administrative burden? a. Adjust permissions on the shares so that users can't delete files except their own. Tell users to back up their own files to local backup media. b. Enable shadow copies for each share. c. Enable shadow copies on the volumes where the shares are hosted. d. Give each user a backup program and an external hard drive.

C. Enable shadow copies on the volumes where the shares are hosted.

Which of the following is associated with installing the first domain controller in a forest? a. RODC b. Child domain c. Global catalog d. DHCP

C. Global catalog

Another administrator has been changing permissions on the Operations OU by adding some groups and users to the DACL. You're concerned that the JrAdmin account has been given more access to the OU than it should have. You need to see all permissions the JrAdmin account has to the Operations OU. What should you do? a. In Active Directory Users and Computers, right-click the JrAdmin account, click Properties, and view her group memberships. b. In Active Directory Administrative Center, run the Permissions Wizard and select JrAdmin as the target. c. In Active Directory Users and Computers, enable Advanced Features, open the Operations OU's Properties dialog box, and navigate to the Effective Access tab. d. In Active Directory Administrative Center, openJrAdmin's account properties and click the Manager Of tab.

C. In Active Directory Users and Computers, enable Advanced Features, open the Operations OU's Properties dialog box, and navigate to the Effective Access tab.

Where is a GPT stored? a. In a folder named the same as the GPO in the SYSVOL share b. In a folder named the same as the GUID of the GPO in Active Directory c. In a folder named the same as the GUID of the GPO in the SYSVOL share d. In a folder named the same as the GPO in Active Directory

C. In a folder named the same as the GUID of the GPO in the SYSVOL share

You have created a GPO that defines settings only in the Local Policies node. You want the settings to apply to all computers in the domain and take precedence over any other GPOs. Which of the following is the best approach? a. Link the new GPO to the domain, and unlink the Default Domain Policy. Right-click the domain object and click Enforced. b. Link the new GPO to each OU containing computer accounts, and make sure it has link order 1. c. Link the new GPO to the domain, and then right-click the new GPO and click Enforced. d. Link the new GPO to the domain, make sure it has the highest link order, and then right-click the domain object and click Block Inheritance.

C. Link the new GPO to the domain, and then right-click the new GPO and click Enforced.

A user is having trouble logging on to the domain from a computer that has been out of service for several months, and nobody else can seem to log on from the computer. What should you try first to solve the problem? a. Reinstall Windows on the workstation and create a new computer account in the domain. b. Rename the computer and create a new computer account with the new name. c. Reset the computer account, remove the computer from the domain, and rejoin it to the domain. d. Disable the computer account, remove the computer from the domain, and rejoin it to the domain.

C. Reset the computer account, remove the computer from the domain, and rejoin it to the domain.

Which of the following defines the types of information stored in an Active Directory object? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

C. Schema attributes

You have noticed inappropriate use of computers for gaming and Internet downloads by some employees who come in after hours and on weekends. These employees don't have valid work assignments during these times. You have been asked to devise a solution for these employees that doesn't affect other employees or these employees' computers during working hours. What's the best solution? a. Install personal firewall software on their computers in an attempt to block the gaming and Internet traffic. b. Request that the Maintenance Department change the locks on their office doors so that they can enter only during prescribed hours. c. Set the Logon Hours options for their user accounts. d. Before you leave each evening and before the weekend, disable these employees' accounts and reenable them the next working day.

C. Set the Logon Hours options for their user accounts.

Which of the following is a component of Active Directory's physical structure? a. Organizational units b. Domains c. Sites d. Folders

C. Sites

You have an Active Directory forest of two trees and eight domains. You haven't changed any operations master domain controllers. On which domain controller is the schema master? a. All domain controllers b. The last domain controller installed c. The first domain controller in the forest root domain d. The first domain controller in each tree

C. The first domain controller in the forest root domain

What happens if a security group that's an ACE in a shared folder is converted to a distribution group? a. A security group can't be converted to a distribution group if it has already been assigned permissions. b. The group is removed from the DACL automatically. c. The group remains in the DACL, but the ACE has no effect on members' access to the resource. d. The group remains in the DACL, and permissions assigned to the group affect access to the resource as though it were still a security group.

C. The group remains in the DACL, but the ACE has no effect on members' access to the resource.

You want to configure an encrypted and authenticated connection between two gateway computers. What rule type should you configure in the New Connection Security Rule Wizard? a. Isolation b. Server-to-server c. Tunnel d. Authentication exemption

C. Tunnel

All your domain controllers are running Windows Server 2012 R2. You're noticing problems with GPT replication. What should you check? a. Verify that Active Directory replication is working correctly. b. Verify that FRS is operating correctly. c. Verify that DFSR is operating correctly. d. Check the GPOReplication flag for the GPT in the Attribute Editor.

C. Verify that DFSR is operating correctly.

What Group Policy feature should you use if you have a policy linked to an OU that contains computer accounts but want the policy to affect only computers running Windows 7? You don't know exactly which computer accounts represent the computers running Windows 7. a. Disabling inheritance b. Policy enforcement c. WMI filtering d. Security filtering

C. WMI filtering

Which commands can you use together to change attributes of several users at once? a. dsget and dsadd b. dsget and dsmod c. dsquery and dsmod d. dsquery and dsget

C. dsquery and dsmod

Which feature of Windows file sharing should you configure if you want users to be able to access their files securely from mobile devices without having to set up a VPN or configure the firewall? a. Client-side caching b. Offline files c. Access-based enumeration d. Work Folders

D. Work Folders

You want to create policies in a new GPO that affects only computers with Windows 7 installed. You don't want to reorganize your computer accounts to do this, and you want computers that are upgraded to Windows 8.1 to fall out of the GPO's scope automatically. What can you do? a. For each policy, use selective application to specify Windows 7 as the OS. b. Create a new OU, place all computer accounts representing computers with Windows 7 installed in this OU, and link the GPO to this OU. c. Create a group called W7Computers. Place all computer accounts representing computers with Windows 7 installed in this group, and use this group in a security filter on the GPO. Link the GPO to the domain. d. Configure a WMI filter on the GPO that specifies Windows 7 as the OS. Link the GPO to the domain.

D. Configure a WMI filter on the GPO that specifies Windows 7 as the OS. Link the GPO to the domain.

Which container has a default GPO linked to it? a. Users b. Printers c. Computers d. Domain

D. Domain

When installing an additional DC in an existing domain, which of the following is an option for reducing replication traffic? a. New site b. Child domain c. GC server d. IFM

D. IFM

You want to see the permissions set on an OU, so you open Active Directory Users and Computers, right-click the OU, and click Properties. After clicking all the available tabs, you can't seem to find where permissions are set in the Properties dialog box. What should you do? a. Log on as a member of Enterprise Admins and try again. b. In the Properties dialog box, click the Advanced button. c. Right-click the OU and click Security. d. In Active Directory Users and Computers, click View, Advanced Features.

D. In Active Directory Users and Computers, click View, Advanced Features.

Which of the following represents the correct order in which GPOs are applied to an object that falls within the GPO's scope? a. Site, domain, OU, local GPOs b. Local GPOs, domain, site, OU c. Domain, site, OU, local GPOs d. Local GPOs, site, domain, OU

D. Local GPOs, site, domain, OU

In Active Directory, all your computer accounts are in the Computers folder, and all your user accounts are in the Users folder. You need to configure an AppController policy that affects users who log on to computers in the Engineering Department. Which of the following is the best way to accomplish this? a. Place the Engineering Department user accounts in a group. Create a new GPO, configure the AppController policy, and link the GPO to the group you created. b. Place the Engineering Department computer accounts in a group named Eng. Create a new GPO, configure the AppController policy, and link it to the domain object. Set a security filter for the Eng group. c. Move the Engineering Department user accounts to a new OU named Eng. Configure the AppController policy on the Default Domain Policy GPO. Set Block Inheritance on the Users folder. d. Move the Engineering Department computer accounts to a new OU named Eng. Create a new GPO, configure the AppController policy, and link the GPO to the Eng OU.

D. Move the Engineering Department computer accounts to a new OU named Eng. Create a new GPO, configure the AppController policy, and link the GPO to the Eng OU.

Which of the following is true about share and NTFS permissions? a. NTFS permissions are applied only to local file access. b. Share permissions take precedence over NTFS permissions. c. Share permissions are applied to network and local file access. d. NTFS permissions are applied to network access.

D. NTFS permissions are applied to network access.

You're seeing heavy use on one of your shared printers, and users often have to wait in line to get their print jobs. What printing feature can you use to best alleviate the problem? a. Printer prioritization b. Change availability hours c. Change spooling options d. Printer pooling

D. Printer pooling

Which of the following defines the types of objects in Active Directory? a. GPOs b. Attribute values c. Schema attributes d. Schema classes

D. Schema classes

Which of the following creates a file named disabled.txt containing a list of disabled Active Directory accounts? a. net accounts /show disabled b. ldifde -accounts -property=enabled -value=false c. Query-Account -Disable=True | disabled.txt d. Search-ADAccount -AccountDisabled > disabled.txt

D. Search-ADAccount -AccountDisabled > disabled.txt

Which of the following sets the profile for each network connection on your computer? a. The Network Connection policy under the Software Settings node b. The Windows Firewall with Advanced Security policy c. The Properties dialog box of each network interface d. The Network Location Awareness feature

D. The Network Location Awareness feature

The Users domain local group in the Builtin folder can be a member of the local Administrators group on a Windows client OS computer. True or False?

False

A folder can be shared only with a single name and single set of share permissions. True or False?

False

A user-specific local GPO takes precedence over a site-linked GPO. True or False?

False

Global groups can have domain local groups as members. True or False?

False

Only settings that are defined or configured by domain GPOs can be edited locally.

False

Sam*Snead is a valid user account name. True or False?

False


Related study sets

Chapter 3 quiz San Marcos A and P

View Set

Paleogeography and Biodiversity in the cenozoic

View Set

Pivot Tables & Charts - Excel 2016

View Set

Semester 2 Health Science Exam study guide

View Set

Multiplication Set 17 (6x5, 6x6, 6x7, 6x8)

View Set

Chapter 6: Introduction to consumer credit

View Set

Stats Exam 5, PSY 3801 Exam 5, PSY 3801: Final Exam, Terms, PSY 3801 Exam #3, PSY3801 EXAM 6, Psychology (Statistics)- Exam 1, Psychology 3801, PSY 3801 Stats Final, PSY 3801 Test 3, Research Methods Final

View Set

NUR 101 Unit Two Communication, Nurse-Patient Relationship, Legal Aspects

View Set

306 Ricci Chapter 13: Labor and Birth Process

View Set