IST 257 Module 11
[a] __________ [b]__________ contains several subfolders that can configure different windows components like the control panel and desktop settings
Administrative, Templates
What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?
Connection Security Rules
________________ GPOs mean you remove the authenticated users and add the users and groups that you wish the GPO settings to apply.
Default Domain Policy GPO
Which term refers to the process whereby a user or computer obtains a certificate from a CA?
Enrollment
Only schema version 1 certificate templates can be configured for auto-enrollment. True or False?
FALSE
There are no GPOs created in an Active Directory domain by default. True or False?
FALSE
You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless. True or False?
FALSE
To use [a] __________ [b]__________ you configure GPOs that have the appropriate settings
Group, Policy
To configure GPOs in Active Directory you can use [a] __________ [b]__________ [c] __________ in the tools menu of server manaager
Group, Policy, Management
To edit the local GPO you can add the Group Policy Object editor to the _______________(use abbreviation)
MMC
Which of the following is not included in a certificate?
Private Key
The password policy container is in the [a] __________ [b]__________ subfolder in the computer configuration folder.
Security, Settings
The first CA deployed is known as the ________________ CA
root
EFS uses both [a] __________ and [b] __________________ encription
symmetric, asymmetric
The CA public/private key pair expires every ____________ years. (provide number) by default
5
Software that is ___________________ under software settings is automatically installed
Assigned
Which section of a GPO contains the most security-related settings for the Windows operating system?
Computer Configuration, Windows Settings
You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?
Publish the software in the User Configuration
In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?
RADIUS server
Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.
Read, Enroll, Autoenroll
If a GPO link is configured with the _______________ setting, the GPO settings will be applied to the containers that have Block Policy Inheritance configured
Enforced
There is also a Local Computer GPO
TRUE
Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.
Updates can be manually or automatically approved for distribution on a WSUS server., Group Policy is used to direct domain computers to a WSUS server for updates., Wa. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization's Internet connection., A WSUS server can be configured to remove updates from computers that have installed them.
Group Policy settings apply to which of the following objects?
Users, Computers
To ensure that the computer and user configuration settings are applied, you can run _____________ at the command prompt window
gpupdate /force
HTTPS uses a [a] __________ key and a [b]__________ key
public, symmetric
Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?
8531
[a] __________ [b]__________ lists certificates that have a future expiration date but should not be used.
Revoked, Certificates
You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked?
Site, Domain, OU
Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain) . True or False?
TRUE
Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA. True or False?
TRUE
Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default. True or False?
TRUE
To prevent a Man-In-The-Middle attack, use public keys endorsed by a certificate authority
TRUE
To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. True or False?
TRUE
You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. True or False?
TRUE
A GPO is a [a] __________ [b]__________ [c] ________________(type in the meaning of the letters in the abbreviation)
Group, Policy, Object
You can configure [a] __________ [b]__________ to prevent user and group accounts in an OU from apply GPO settings
Block, Inheritance
Which of the following are/ can be included in a certificate(all that apply)
Public Key, Digital Signature, CRL location, the location of the Cas public key, certificate name, a serial number
Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?
Controlled folder access
A GPO can be linked to a- pick all that apply
Site, Domain, OU