Exam 7: Configuring Group Policy

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the default setting for "Minimum password age" under Password Policies?

(Short Answer)
4.9/5
(41)

What is the default location of ADMX files?

(Multiple Choice)
4.8/5
(32)

Because the GPC and GPT use different replication methods,they can become out of sync

(True/False)
4.8/5
(34)

MATCHING -XML format text files that define policies in the Administrative Templates folder in a GPO

(Multiple Choice)
4.9/5
(39)

If a software package is assigned to a group of targeted computers via the Computer Configuration node,what happens?

(Multiple Choice)
4.9/5
(28)

What is the default setting for the "Store Passwords using reversible encryption" option?

(Short Answer)
4.8/5
(30)

What could you use to make user policy settings be based on the GPO within whose scope the computer object falls?

(Multiple Choice)
4.9/5
(28)

MATCHING -A Group Policy Object that's stored on local computers and can be edited by the Group Policy Object Editor snap-in

(Multiple Choice)
4.7/5
(35)

MATCHING -A GPO component that's stored as a set of files in the Sysvol share

(Multiple Choice)
4.7/5
(30)

A published application is installed automatically.

(True/False)
4.8/5
(30)

Starter GPOs can be shared with other administrators by placing them into what type of file?

(Short Answer)
4.9/5
(41)

What command can be used to perform tasks similar to those in Group Policy Results Wizard and the Resultant Set of Policy snap-in?

(Multiple Choice)
4.8/5
(35)

What is a major drawback to enabling the auditing of object access?

(Multiple Choice)
4.8/5
(31)

How can you ensure that a GPO's settings are applied to all child objects,even if a GPO with conflicting settings is linked to a container at a deeper level?

(Multiple Choice)
4.9/5
(40)

One of the answers below is not a valid scripting language supported by Scripts (Startup/Shutdown)subnode.Select the invalid answer.

(Multiple Choice)
4.9/5
(37)

You can customize MSI file installations by using a transform file,which uses the ____________________ extension.

(Short Answer)
4.9/5
(37)

When configuring Software Restriction policies,you can create exceptions to the default rule.One of the four ways of identifying an application as an exception to the default rule is by use of a ____________________,which is a digital fingerprint of the application file,based on the files attributes.

(Short Answer)
4.9/5
(34)

What Security Settings subnode allows you to control IPSec policies on target computers?

(Short Answer)
4.8/5
(36)

MATCHING -A method to alter the normal scope of a GPO and exclude certain objects from being affected by its settings

(Multiple Choice)
4.9/5
(24)

This command line tool performs many of the same functions as the Security Configuration and Analysis snap-in.

(Short Answer)
4.9/5
(30)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)