IST 257 Module 11

Ace your homework & exams now with Quizwiz!

Which of the following are/ can be included in a certificate?

1. Public Key, 2. Digital Signature 3. CRL location, the location of the Cas public key 4. certificate name, a serial number

Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy?

1. Read 2. Enroll 3. Autoenroll

Which of the following statements regarding the functionality of WSUS are true?

1. Updates can be manually or automatically approved for distribution on a WSUS server. 2. Group Policy is used to direct domain computers to a WSUS server for updates. 3. Wa. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection. 4. A WSUS server can be configured to remove updates from computers that have installed them.

The CA public/private key pair expires every ____________ years. (provide number) by default.

5

Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?

8531

[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings

Administrative, Templates

Software that is ___________________ under software settings is automatically installed.

Assigned

You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings

Block, Inheritance

Which section of a GPO contains the most security-related settings for the Windows operating system?

Computer Configuration, Windows Settings

What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?

Connection Security Rules

Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?

Controlled folder access

________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.

Default Domain Policy GPO

If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured.

Enforced

Which term refers to the process whereby a user or computer obtains a certificate from a CA?

Enrollment

To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings.

Group, Policy

To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manaager

Group, Policy, Management

A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)

Group, Policy, Object

To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)

MMC

Which of the following is not included in a certificate?

Private Key

You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?

Publish the software in the User Configuration

In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?

RADIUS server

[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.

Revoked, Certificates

The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.

Security, Settings

A GPO can be linked to a- pick all that apply

Site, Domain, OU

You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked?

Site, Domain, OU

Group Policy settings apply to which of the following objects?

Users, Computers

Only schema version 1 certificate templates can be configured for auto-enrollment.

false

There are no GPOs created in an Active Directory domain by default.

false

You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless.

false

To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window.

gpupdate /force

HTTPS uses a [a] __________ key and a [b]__________ key.

public, symmetric

The first CA deployed is known as the ________________ CA.

root

EFS uses both [a] __________ and [b] __________________ encryption.

symmetric, asymmetric

Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain).

true

Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA.

true

Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default.

true

There is also a Local Computer GPO.

true

To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority.

true

To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization.

true

You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings.

true


Related study sets

Clinical Chapter 23: Oxygen Therapy

View Set

Week 03 - C++ Operators: Relational, Logical, and Ternary

View Set

AP English Language + Composition - MCQ

View Set

Chapter 21: Carbohydrate Metabolism Quiz

View Set

AP CSP Unit 3: Decisions and Algorithms

View Set