Fill This Form To Receive Instant Help
Homework answers / question archive / Test Bank, Lesson 20 Configuring Group Policy Settings Multiple Choice 1) Which of the following operating systems can have its security settings managed by using security templates? Select all that apply
Test Bank, Lesson 20 Configuring Group Policy Settings
Multiple Choice
1) Which of the following operating systems can have its security settings managed by using security templates? Select all that apply.
a. Windows XP
b. Windows Vista
c. Windows 7
d. Windows 8
2. Which two of the following methods can you use to deploy security templates?
a. using Active Directory GPOs
b. using the Security Configuration and Analysis snap-in
c. copying a text file to each managed computer’s admin$ share
d. using a logon script
3. What is an ADMX file?
a. an ADM file translator
b. the ADM format for newer operating systems
c. a template buffer
d. the protocol that deploys ADM files across networks
4. What is the Central Store?
a. an App Store from which you can deploy GPOs
b. a public share that allows users to place GPO requests into a queue
c. a repository for Administrative Templates
d. an online App Store for Administrative Templates
5. Which of the following are legitimate Administrative Template Property Filters? Select all that apply.
a. Keyword Filters
b. Requirements Filters
c. Security Filters
d. Operating System Filters
6. What is the name of the software component used for installation, maintenance, and removal of software on Windows?
a. Control Panel
b. Add/Remove Programs applet
c. Windows Installer
d. Application Installer
7. What is the filename extension for the files in which installation information is stored?
a. .txt
b. .xml
c. .ini
d. .msi
8. What are MST files used for?
a. They deploy customized software installation files
b. They are template files for software packages
c. They are custom patch files
d. They specialize in software installation test files
9. Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it?
a. Convert it to a ZIP file
b. Convert it to an MSI file
c. Convert it to an MSP file
d. Convert it to an MST file
10. The Security template allows you to configure which of the following settings? Select all that apply.
a. System Services
b. Registry Entries
c. Registry Permissions
d. File System Permissions
11. Where is the default location for ADMX files?
a. C:\Windows\SYSVOL\ADMX
b. C:\Windows\System32\XML\ADMX
c. C:\Windows\Inf
d. C:\Windows\PolicyDefinitions
12. Identify all possible states of an Administrative Template.
a. Not Configured
b. Enabled
c. Disabled
d. Deployed
13. What language are ADMX files based on?
a. HTML
b. XML
c. SGML
d. Java
14. Unlike ADM files, ADMX files are not stored where?
a. in the Central Store
b. on the domain controller
c. in the SYSVOL folder
d. in individual GPOs
15. Where is the Central Store located?
a. in the SYSVOL directory
b. Microsoft Online
c. TechNet
d. on a domain controller public share
Short Answer
16. What steps do you need to complete to deploy software with group policies?
17. If you use the Assign software to a user option, how does the new software install to the user’s computer?
18. If you select the Assign software to a computer option, when does the software install on the computer?
19. What are the four Administrative Template Property Filters?
20. What utility do you use to convert ADM templates to the new ADMX format?
21. What is a security template?
Best Answer
22. An application cannot be published to a _______________.
a. GPO
b. user
c. group
d. computer
23. When configuring Group Policy to deploy applications, the applications must be mapped to where?
a. UNC path
b. drive letter
c. shared folder
d. full install path
24. What happens when an application deployed via group policies becomes damaged or corrupted?
a. The installer notifies the administrator of the faulty application.
b. The installer will detect and reinstall or repair the application.
c. The user must request a reinstall of the application.
d. The user must initiate a repair of the application.
25. If you, as administrator, change an installed application, how do you update your users?
a. by redeploying the application via the GPO
b. by instructing the users to reinstall the application
c. by creating a GPO to remove the old application and installing the new one
d. by distributing the updates on next logon
Build List
26. Order the following general steps required to use scripts.
a. Execute the script manually to make sure that it runs and performs as planned.
b. Create the script.
c. Copy the script to c:\Windows\Sysvol\Sysvol\Domain Name\Scripts on a domain controller.
d. Configure a GPO to execute the script during startup, shutdown, logon, or logoff.
27. Order the following steps required to configure the desktop background with group policies.
a. Double-click Desktop Wallpaper. The Desktop Wallpaper dialog box opens.
b. In the Wallpaper Name text box, type the path and name of an image file.
c. Navigate to User Configuration\Policies\Administrative Templates\Desktop\Desktop.
d. Enable the GPO.
e. Open the Group Policy Management Editor for the GPO you want to configure.
28. Order the following steps required to compare settings with a security template.
a. Select Add/Remove Snap-In.
b. Select Security Configuration and Analysis and click Add.
c. Select Analyze Now.
d. Enter mmc at the prompt.
e. Right-click Security Configuration and Analysis and click Open Database.
f. Check the settings for compliance.
g. Open a command prompt with Administrator privileges.
29. Order the following steps required to add a custom ADM administrative template.
a. Select either Computer Configuration\Policies\Administrative Templates or User Configuration\Policies\Administrative Templates.
b. Navigate to the custom Administrative Templates and click Open.
c. Right-click Administrative Templates and Add/Remove Templates.
d. Open the Group Policy Management Editor.
Repeated Answer
30. Which node contains only one node, Software installation, which allows you to install and maintain software within your organization?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
31. Which node contains settings that are applied when the user logs on?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
32. Which node contains settings that are applied to the computer regardless of who logs on to the computer?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
33. Which node allows you to configure settings such as Name Resolution Policy, Security Settings, and Policy-Based QoS nodes?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration