Exam 11: Securing Windows Server 2019

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is a starter GPO, and how is it created?

Free
(Essay)
4.9/5
(39)
Correct Answer:
Verified

A starter GPO is a template GPO that contains Administrative Templates settings that are automatically applied to the new GPO. To create a starter GPO, one can right-click the Starter GPOs folder under Group Policy Management, click New, and specify a GPO name. Following this, one must edit the GPO to include the desired settings to be included in the GPO template. If a starter GPO is edited, Administrative Templates is the only folder available under the Computer Configuration and User Configuration sections. The settings in all other GPO folders cannot be configured in a starter GPO. REJ: Please explore the section " Configuring Group Policy " for more information.

What is Group Policy, and why is it used?

Free
(Essay)
4.9/5
(38)
Correct Answer:
Verified

Group Policy is a powerful administrative feature in Active Directory. Group Policy can be used to automatically configure software; Windows features; and security, program, and user interface settings on computers in an Active Directory domain based on the location of a user or computer account in the Active Directory database. To configure Group Policy, one must create Group Policy Objects (GPOs) that have the appropriate settings. A single GPO can be applied to thousands of users and computers in an organization to reduce the time and effort that it takes to administer a large domain. REJ: Please explore the section "Configuring Group Policy" for more information.

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.

Free
(True/False)
4.8/5
(43)
Correct Answer:
Verified

False

Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users.

(Multiple Choice)
5.0/5
(37)

What are the situations in which a GPO does not apply to a user or computer account?

(Essay)
5.0/5
(34)

Which of the following is true of Group Policy Objects (GPOs)?

(Multiple Choice)
4.9/5
(37)

Aster has created new firewall rules in Windows Defender. One of the new rules appears to cause an error. Aster thinks that the rule itself is the issue. Describe the steps she should follow to eliminate the rule as the cause of issue.

(Essay)
4.8/5
(42)

Chynna wants to create two different firewall rules that are applicable depending on whether a computer is connected to a corporate domain or a home network. Which of the following panes in the New Inbound Rule Wizard should Chynna select to specify the conditions that should be met before the rules can be applied?

(Multiple Choice)
4.7/5
(37)

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?

(Multiple Choice)
4.8/5
(37)

Which of the following settings in Windows defender should be enabled to prevent malware and network attacks from accessing high-security processes in systems that support core isolation?

(Multiple Choice)
4.7/5
(35)

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks?

(Multiple Choice)
4.9/5
(33)

List the sequence of events that takes place to ensure that data is encrypted during the transfer w hen someone accesses a website.

(Essay)
4.7/5
(34)

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?

(Multiple Choice)
4.8/5
(28)

To prevent man-in-the-middle attacks, Janet, a network administrator, configures a GPO such that all the traffic sent toward a specific database server is encrypted using IPSec. While most of her colleagues are able to successfully connect to the database via the IPSec authentication process, the connection is not successful for some computers. What do you see to be the problem here?

(Multiple Choice)
4.7/5
(37)

A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key.

(True/False)
4.8/5
(37)

WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does.

(True/False)
4.7/5
(47)

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?

(Multiple Choice)
4.8/5
(33)

When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition.

(True/False)
4.7/5
(40)

The new system administrator of XYZ company realizes that whenever updates are available for Windows, WSUS redirects computers to the Microsoft Update servers on the Internet to obtain updates instead of storing the update information on the WID. Which of the following is a likely reason for this issue?

(Multiple Choice)
4.8/5
(30)

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information?

(Multiple Choice)
4.7/5
(50)
Showing 1 - 20 of 37
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)