Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Test Bank, Lesson 19 Configuring Group Policy Processing Multiple Choice 1) Which feature affects all users in the domain, including domain controllers? a

Test Bank, Lesson 19 Configuring Group Policy Processing Multiple Choice 1) Which feature affects all users in the domain, including domain controllers? a

Business

Test Bank, Lesson 19 Configuring Group Policy Processing

Multiple Choice

1) Which feature affects all users in the domain, including domain controllers?

a. Global Group Policy

b. Default Domain Policy

c. Default Group Policy

d. Default Global Domain Policy

 

2. In which order are Group Policy objects (GPOs) processed?

a. Local group policy, Site, Domain, User

b. OU, Domain, Site, Local group policy

c. Local security policy, Site, Domain, OU

d. Local group policy, Site, Domain, OU

 

 

3. What is the default timeout value for GPOs to process on system startup?

a. 60 seconds

b. 120 seconds

c. 300 seconds

d. 600 seconds

 

4. GPOs are processed on computer startup and after logon. Why is the user never aware of the processing?

a. Processing is hidden from the user.

b. The user is too busy to be aware of the processing.

c. The processing occurs when the system is not being used.

d. The user is aware of only startup delays.

5. What is the first step in the GPO processing order?

a. The user initiates interactive logon.

b. The computer obtains a list of GPOs from the domain controller.

c. The computer establishes a secure link to the domain controller.

d. The GPOs are applied to the computer and to the user.

 

 

6. The downward flow of group policies is known as what feature of GPOs?

a. cumulative processing

b. inherent processing

c. inheritance

d. control

 

7. If a site, domain, or OU has multiple GPOs, how are the group policies processed?

a. by precedence

b. by importance

c. by administrative control

d. by GPO controller policy

 

 

8. Which two filters can you use to control who or what receives a group policy?

a. policy filter

b. security group filter

c. domain filter

d. WMI filter

 

 

9. For users to receive GPO settings, they must have which two permissions to the GPO?

a. Allow Read

b. Allow Write

c. Allow Modify

d. Allow Apply

 

 

10. By default, which GPO permissions are all authenticated users given?

a. Apply Group

b. Allow Group

c. Apply Global

d. Allow Global

 

 

11. At what point are WMI filters evaluated?

a. when the filter is created

b. when the policy is applied

c. when the filter is applied

d. when the policy is processed

 

 

12. To use WMI filters, you must have one domain controller running which version of Windows Server or higher?

a. NT 4.0

b. 2000

c. 2003

d. There is no such requirement to use WMI filters.

 

13. How many WMI filters can be configured for a GPO?

a. one

b. two

c. four

d. eight

 

14. What kind of group policies should you enable for student computers?

a. generic

b. loopback

c. extensive

d. compliant

 

 

15. What is the primary purpose of running the Group Policy Results Wizard? Check all that apply.

a. to guarantee that GPOs are enforced in full

b. to analyze the cumulative effect of GPOs

c. for GPO troubleshooting

d. to ensure that you have administrative rights to the client computer

16. You are administrator of a corporation with clients running Windows 8 or Windows 8.1. Your domain controllers are running Windows Server 2012 R2. You have made a change to a GPO and you want the GPO settings to be applied immediately. What can you do?

a. At the domain controller, execute the Gpupdate /force command.

b. Copy the GPO to all domain controllers using Active Directory Sites and Services.

c. On the domain controller, execute the Windows PowerShell Invoke-GPUpdate cmdlet.

d. Enable the Group Policy Caching feature using a GPO.

 

17. Which of the following Windows 8.1 and Windows Server 2012 R2 features can speed up the performance of processing synchronous policy settings?

a. GPO Turbo Mode

b. GPO Enhanced Mode

c. Group Policy Update

d. Group Policy Caching

 

 

Short Answer

 

18. Group policy settings affect computers and users. When do the group policies go into effect for each?

 

19. What is the purpose of Group Policy loopback processing?

 

20. What four conditions must exist for you to be able to run the Group Policy Results Wizard?

 

21. What is the command-line command to see the Group Policy Results from user Bob on computer DESK01?

 

22. What happens to the GPOs for computers that are disconnected from the network?

 

23. Explain the difference between Replace mode GPO and Merge mode GPO.

 

Best Answer

 

24. Which utility do you use to set up loopback policies?

a. Server Manager

b. Active Directory Users and Groups

c. Group Policy Management Editor

d. PowerShell

 

25. How are client-side extensions applied?

a. as part of group policies

b. as startup and logon scripts

c. to the local computer or currently logged-on user

d. as part of another policy

 

26. What is the best method of dealing with slow-link processing?

a. increasing the link bandwidth above 500 kbps

b. changing the slow-link policy processing behavior

c. disabling GPO processing for slow-link systems

d. placing a read-only domain controller at the slow-link site

 

27. Where would using Replace mode GPOs be appropriate?

a. in a classroom

b. in a developer environment

c. in a group of system administrator users

d. in a graphic design department

 

Build List

 

28. Order the following steps required to configure a security group filter.

a. Open the Group Policy Management console.

b. Add the Administrators group.

c. Select the Delegation tab and then select Advanced.

d. Select Administrators and then select Deny for the Apply Group Policy option.

e. Select the GPO to be modified.

 

29. Order the following steps required to assign a WMI filter to a GPO.

a. Right-click WMI filters and then click New.

b. Assign the WMI filter to a GPO via the Scope drop-down list.

c. Add a WMI query.

d. Enter the query information.

e. Enter a Name and Description for the new WMI filter.

f. Open the Group Policy Management console.

30. Order the following steps required to run the Group Policy Results wizard.

a. Select the user under the Group Policy Results node.

b. Right-click Group Policy Results and select Group Policy Results Wizard.

c. View the info on the Details tab.

d. Open the Group Policy Management console.

e. Select a user on the User Selection page.

f. Select Another Computer and enter the name of a computer.

 

 

31. Order the steps to run the Group Policy Modeling Wizard.

a. Place the user into an OU.

b. Select Slow network connection or Loopback processing on the Advanced Simulations page.

c. Select any WMI filters.

d. Add or remove security groups to the computer.

e. Place the computer into an OU.

f. Add or remove security groups to/from the user.

g. Right-click Group Policy Modeling and then select Group Policy Modeling Wizard.

h. Open the Group Policy Management console.

 

Repeated Answer

 

32. What feature uses a security access list (ACL) to determine who can modify or read a policy and who or what a GPO is applied to?

a. Windows Management Instrumentation (WMI)

b. WMI filtering

c. security group filtering

d. inheritance

 

33. What component extends the Windows Driver Model to provide an interface to the operating system to provide information and notification on hardware, software, operating systems, and services?

a. Windows Management Instrumentation (WMI)

b. WMI filtering

c. security group filtering

d. inheritance

 

 

34. How do group policy settings flow down into the lower containers and objects?

a. Windows Management Instrumentation (WMI)

b. WMI filtering

c. security group filtering

d. inheritance

 

35. What feature configures a GPO to be applied to certain users or computers based on specific hardware, software, operating systems, and services?

a. Windows Management Instrumentation (WMI)

b. WMI filtering

c. security group filtering

d. inheritance

 

Option 1

Low Cost Option
Download this past answer in few clicks

8.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE