Deck 4: Designing and Implementing Group Policy
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
Play
Full screen (f)
Deck 4: Designing and Implementing Group Policy
1
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.
A) CN
B) OU
C) DC
D) DN
A) CN
B) OU
C) DC
D) DN
A
2
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.
A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
D
3
Universal group membership information is only contained in the ____.
A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
A
4
Group Policy is normally applied every ____ minutes.
A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
When global groups are added to other global groups it is commonly called ____.
A) cascading
B) nesting
C) aggregating
D) concatenating
A) cascading
B) nesting
C) aggregating
D) concatenating
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ setting is useful to control the membership of any group in Active Directory.
A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
In group policy settings, ____ are used to manage many of the interfaces, such as Control Panel, Network, Printers, System, and other Windows components.
A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The only technical reasons to design OUs are ____.
A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
You must be a member of the Domain Admins group to create a PSO.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The GPO order of precedence is ____.
A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
On proxy servers, ____ is used to conserve bandwidth usage.
A) caching
C) nesting
B) parsing
D) forward lookup
A) caching
C) nesting
B) parsing
D) forward lookup
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.
A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
OUs are difficult to modify.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.
A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.
A) Template
C) Reference
B) Starter
D) Instantiated
A) Template
C) Reference
B) Starter
D) Instantiated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.
A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In group policy settings, ____ allow you to set and configure different settings on users' computers.
A) preferences
C) standards
B) options
D) configurations
A) preferences
C) standards
B) options
D) configurations
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
GPOs can be linked to either the Users container or the Computers container.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Because users see OUs, the OUs must follow a structure understood by the users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss two ways that the GPO can be filtered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
You can only block inheritance at the ____ level.
A) OU
C) site
B) container
D) forest
A) OU
C) site
B) container
D) forest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
List and describe the three default policies of IPSec.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss what printer location policies can be used for.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The real strength of universal groups is realized with ____________________ domains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Normally, only the ____ group is in the Security Filtering area.
A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.
A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ allows the inspection of systems to look for specific conditions on a computer, and is widely used with scripting.
A) IPMI
C) SNMP
B) WMI
D) HTTP
A) IPMI
C) SNMP
B) WMI
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.
A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The _________________________ design is a simple OU design based on the structure of the organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What is the most common use of WMI filters?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Discuss how OUs should be named.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the two commands that can be used to redirect computer accounts and user accounts?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The acceptable values for the PSO "mustHave" attribute msDS-msDS-LockoutThreshold are ____.
A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Discuss reasons to use OUs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Among the most risky devices in an organization are ____________________ flash drives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the geography structure for OUs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Actual GPOs are commonly named based on their ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the Kerberos policy within Group Policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how to create fine-grained policies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck