Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Test Bank, Lesson 20 Configuring Group Policy Settings Multiple Choice 1) Which of the following operating systems can have its security settings managed by using security templates? Select all that apply

Test Bank, Lesson 20 Configuring Group Policy Settings Multiple Choice 1) Which of the following operating systems can have its security settings managed by using security templates? Select all that apply

Business

Test Bank, Lesson 20 Configuring Group Policy Settings

Multiple Choice

1) Which of the following operating systems can have its security settings managed by using security templates? Select all that apply.

a. Windows XP

b. Windows Vista

c. Windows 7

d. Windows 8

 

 

2. Which two of the following methods can you use to deploy security templates?

a. using Active Directory GPOs

b. using the Security Configuration and Analysis snap-in

c. copying a text file to each managed computer’s admin$ share

d. using a logon script

3. What is an ADMX file?

a. an ADM file translator

b. the ADM format for newer operating systems

c. a template buffer

d. the protocol that deploys ADM files across networks

 

 

4. What is the Central Store?

a. an App Store from which you can deploy GPOs

b. a public share that allows users to place GPO requests into a queue

c. a repository for Administrative Templates

d. an online App Store for Administrative Templates

 

5. Which of the following are legitimate Administrative Template Property Filters? Select all that apply.

a. Keyword Filters

b. Requirements Filters

c. Security Filters

d. Operating System Filters

 

6. What is the name of the software component used for installation, maintenance, and removal of software on Windows?

a. Control Panel

b. Add/Remove Programs applet

c. Windows Installer

d. Application Installer

 

 

7. What is the filename extension for the files in which installation information is stored?

a. .txt

b. .xml

c. .ini

d. .msi

 

8. What are MST files used for?

a. They deploy customized software installation files

b. They are template files for software packages

c. They are custom patch files

d. They specialize in software installation test files

 

9. Windows Installer cannot install .exe files. To distribute a software package that installs with an .exe file, what must you do to it?

a. Convert it to a ZIP file

b. Convert it to an MSI file

c. Convert it to an MSP file

d. Convert it to an MST file

 

10. The Security template allows you to configure which of the following settings? Select all that apply.

a. System Services

b. Registry Entries

c. Registry Permissions

d. File System Permissions

 

 

11. Where is the default location for ADMX files?

a. C:\Windows\SYSVOL\ADMX

b. C:\Windows\System32\XML\ADMX

c. C:\Windows\Inf

d. C:\Windows\PolicyDefinitions

 

12. Identify all possible states of an Administrative Template.

a. Not Configured

b. Enabled

c. Disabled

d. Deployed

 

 

13. What language are ADMX files based on?

a. HTML

b. XML

c. SGML

d. Java

 

 

14. Unlike ADM files, ADMX files are not stored where?

a. in the Central Store

b. on the domain controller

c. in the SYSVOL folder

d. in individual GPOs

 

 

15. Where is the Central Store located?

a. in the SYSVOL directory

b. Microsoft Online

c. TechNet

d. on a domain controller public share

 

Short Answer

 

16. What steps do you need to complete to deploy software with group policies?

 

17. If you use the Assign software to a user option, how does the new software install to the user’s computer?

 

 

18. If you select the Assign software to a computer option, when does the software install on the computer?

 

19. What are the four Administrative Template Property Filters?

 

20. What utility do you use to convert ADM templates to the new ADMX format?

 

 

21. What is a security template?

 

Best Answer

 

22. An application cannot be published to a _______________.

a. GPO

b. user

c. group

d. computer

 

 

23. When configuring Group Policy to deploy applications, the applications must be mapped to where?

a. UNC path

b. drive letter

c. shared folder

d. full install path

 

 

24. What happens when an application deployed via group policies becomes damaged or corrupted?

a. The installer notifies the administrator of the faulty application.

b. The installer will detect and reinstall or repair the application.

c. The user must request a reinstall of the application.

d. The user must initiate a repair of the application.

 

25. If you, as administrator, change an installed application, how do you update your users?

a. by redeploying the application via the GPO

b. by instructing the users to reinstall the application

c. by creating a GPO to remove the old application and installing the new one

d. by distributing the updates on next logon

 

 

Build List

 

26. Order the following general steps required to use scripts.

a. Execute the script manually to make sure that it runs and performs as planned.

b. Create the script.

c. Copy the script to c:\Windows\Sysvol\Sysvol\Domain Name\Scripts on a domain controller.

d. Configure a GPO to execute the script during startup, shutdown, logon, or logoff.

27. Order the following steps required to configure the desktop background with group policies.

a. Double-click Desktop Wallpaper. The Desktop Wallpaper dialog box opens.

b. In the Wallpaper Name text box, type the path and name of an image file.

c. Navigate to User Configuration\Policies\Administrative Templates\Desktop\Desktop.

d. Enable the GPO.

e. Open the Group Policy Management Editor for the GPO you want to configure.

 

28. Order the following steps required to compare settings with a security template.

a. Select Add/Remove Snap-In.

b. Select Security Configuration and Analysis and click Add.

c. Select Analyze Now.

d. Enter mmc at the prompt.

e. Right-click Security Configuration and Analysis and click Open Database.

f. Check the settings for compliance.

g. Open a command prompt with Administrator privileges.

 

29. Order the following steps required to add a custom ADM administrative template.

a. Select either Computer Configuration\Policies\Administrative Templates or User Configuration\Policies\Administrative Templates.

b. Navigate to the custom Administrative Templates and click Open.

c. Right-click Administrative Templates and Add/Remove Templates.

d. Open the Group Policy Management Editor.

 

Repeated Answer

 

30. Which node contains only one node, Software installation, which allows you to install and maintain software within your organization?

a. Software Settings

b. Windows Settings

c. Computer Configuration

d. User Configuration

 

 

31. Which node contains settings that are applied when the user logs on?

a. Software Settings

b. Windows Settings

c. Computer Configuration

d. User Configuration

 

32. Which node contains settings that are applied to the computer regardless of who logs on to the computer?

a. Software Settings

b. Windows Settings

c. Computer Configuration

d. User Configuration

 

 

33. Which node allows you to configure settings such as Name Resolution Policy, Security Settings, and Policy-Based QoS nodes?

a. Software Settings

b. Windows Settings

c. Computer Configuration

d. User Configuration

Option 1

Low Cost Option
Download this past answer in few clicks

8.87 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE