Deck 4: Designing and Implementing Group Policy

Full screen (f)
exit full mode
Question
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.

A) CN
B) OU
C) DC
D) DN
Use Space or
up arrow
down arrow
to flip the card.
Question
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.

A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
Question
Universal group membership information is only contained in the ____.

A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
Question
Group Policy is normally applied every ____ minutes.

A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
Question
When global groups are added to other global groups it is commonly called ____.

A) cascading
B) nesting
C) aggregating
D) concatenating
Question
The ____ setting is useful to control the membership of any group in Active Directory.

A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
Question
In group policy settings, ____ are used to manage many of the interfaces, such as Control Panel, Network, Printers, System, and other Windows components.

A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
Question
The only technical reasons to design OUs are ____.

A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
Question
You must be a member of the Domain Admins group to create a PSO.
Question
The GPO order of precedence is ____.

A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
Question
On proxy servers, ____ is used to conserve bandwidth usage.

A) caching
C) nesting
B) parsing
D) forward lookup
Question
The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.

A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
Question
OUs are difficult to modify.
Question
Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.

A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
Question
____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template
C) Reference
B) Starter
D) Instantiated
Question
A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.

A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
Question
In group policy settings, ____ allow you to set and configure different settings on users' computers.

A) preferences
C) standards
B) options
D) configurations
Question
GPOs can be linked to either the Users container or the Computers container.
Question
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
Question
Because users see OUs, the OUs must follow a structure understood by the users.
Question
Discuss two ways that the GPO can be filtered.
Question
You can only block inheritance at the ____ level.

A) OU
C) site
B) container
D) forest
Question
List and describe the three default policies of IPSec.
Question
Discuss what printer location policies can be used for.
Question
The real strength of universal groups is realized with ____________________ domains.
Question
Normally, only the ____ group is in the Security Filtering area.

A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
Question
Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.

A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
Question
____ allows the inspection of systems to look for specific conditions on a computer, and is widely used with scripting.

A) IPMI
C) SNMP
B) WMI
D) HTTP
Question
The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Question
The _________________________ design is a simple OU design based on the structure of the organization.
Question
What is the most common use of WMI filters?
Question
Discuss how OUs should be named.
Question
What are the two commands that can be used to redirect computer accounts and user accounts?
Question
The acceptable values for the PSO "mustHave" attribute msDS-msDS-LockoutThreshold are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Question
Discuss reasons to use OUs.
Question
Among the most risky devices in an organization are ____________________ flash drives.
Question
Describe the geography structure for OUs.
Question
Actual GPOs are commonly named based on their ____________________.
Question
The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
Question
Describe the Kerberos policy within Group Policy.
Question
Explain how to create fine-grained policies.
Question
Match between columns
Used in a multiple-domain environment
universal groups
Used in a multiple-domain environment
global groups
Used in a multiple-domain environment
domain local groups
Used in a multiple-domain environment
Software settings
Used in a multiple-domain environment
Windows settings
Used in a multiple-domain environment
IPSec
Used in a multiple-domain environment
loopback processing
Used in a multiple-domain environment
fine-grained account policies
Used in a multiple-domain environment
password policy
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
universal groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
global groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
domain local groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Software settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Windows settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
IPSec
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
loopback processing
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
fine-grained account policies
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
password policy
Used to organize users in the same domain
universal groups
Used to organize users in the same domain
global groups
Used to organize users in the same domain
domain local groups
Used to organize users in the same domain
Software settings
Used to organize users in the same domain
Windows settings
Used to organize users in the same domain
IPSec
Used to organize users in the same domain
loopback processing
Used to organize users in the same domain
fine-grained account policies
Used to organize users in the same domain
password policy
Allows the GPO settings for a computer to override the settings applied to a user
universal groups
Allows the GPO settings for a computer to override the settings applied to a user
global groups
Allows the GPO settings for a computer to override the settings applied to a user
domain local groups
Allows the GPO settings for a computer to override the settings applied to a user
Software settings
Allows the GPO settings for a computer to override the settings applied to a user
Windows settings
Allows the GPO settings for a computer to override the settings applied to a user
IPSec
Allows the GPO settings for a computer to override the settings applied to a user
loopback processing
Allows the GPO settings for a computer to override the settings applied to a user
fine-grained account policies
Allows the GPO settings for a computer to override the settings applied to a user
password policy
Can be used to assign permissions to resources within the domain
universal groups
Can be used to assign permissions to resources within the domain
global groups
Can be used to assign permissions to resources within the domain
domain local groups
Can be used to assign permissions to resources within the domain
Software settings
Can be used to assign permissions to resources within the domain
Windows settings
Can be used to assign permissions to resources within the domain
IPSec
Can be used to assign permissions to resources within the domain
loopback processing
Can be used to assign permissions to resources within the domain
fine-grained account policies
Can be used to assign permissions to resources within the domain
password policy
Allow an organization to have more than one account policy within a single domain
universal groups
Allow an organization to have more than one account policy within a single domain
global groups
Allow an organization to have more than one account policy within a single domain
domain local groups
Allow an organization to have more than one account policy within a single domain
Software settings
Allow an organization to have more than one account policy within a single domain
Windows settings
Allow an organization to have more than one account policy within a single domain
IPSec
Allow an organization to have more than one account policy within a single domain
loopback processing
Allow an organization to have more than one account policy within a single domain
fine-grained account policies
Allow an organization to have more than one account policy within a single domain
password policy
Can be used to automate the deployment of applications within the network
universal groups
Can be used to automate the deployment of applications within the network
global groups
Can be used to automate the deployment of applications within the network
domain local groups
Can be used to automate the deployment of applications within the network
Software settings
Can be used to automate the deployment of applications within the network
Windows settings
Can be used to automate the deployment of applications within the network
IPSec
Can be used to automate the deployment of applications within the network
loopback processing
Can be used to automate the deployment of applications within the network
fine-grained account policies
Can be used to automate the deployment of applications within the network
password policy
Includes items such as minimum age and minimum password length
universal groups
Includes items such as minimum age and minimum password length
global groups
Includes items such as minimum age and minimum password length
domain local groups
Includes items such as minimum age and minimum password length
Software settings
Includes items such as minimum age and minimum password length
Windows settings
Includes items such as minimum age and minimum password length
IPSec
Includes items such as minimum age and minimum password length
loopback processing
Includes items such as minimum age and minimum password length
fine-grained account policies
Includes items such as minimum age and minimum password length
password policy
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
universal groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
global groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
domain local groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Software settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Windows settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
IPSec
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
loopback processing
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
fine-grained account policies
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
password policy
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Designing and Implementing Group Policy
1
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.

A) CN
B) OU
C) DC
D) DN
A
2
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.

A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
D
3
Universal group membership information is only contained in the ____.

A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
A
4
Group Policy is normally applied every ____ minutes.

A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
When global groups are added to other global groups it is commonly called ____.

A) cascading
B) nesting
C) aggregating
D) concatenating
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
The ____ setting is useful to control the membership of any group in Active Directory.

A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
In group policy settings, ____ are used to manage many of the interfaces, such as Control Panel, Network, Printers, System, and other Windows components.

A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The only technical reasons to design OUs are ____.

A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
You must be a member of the Domain Admins group to create a PSO.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The GPO order of precedence is ____.

A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
On proxy servers, ____ is used to conserve bandwidth usage.

A) caching
C) nesting
B) parsing
D) forward lookup
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.

A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
OUs are difficult to modify.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.

A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template
C) Reference
B) Starter
D) Instantiated
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.

A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In group policy settings, ____ allow you to set and configure different settings on users' computers.

A) preferences
C) standards
B) options
D) configurations
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
GPOs can be linked to either the Users container or the Computers container.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
Because users see OUs, the OUs must follow a structure understood by the users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Discuss two ways that the GPO can be filtered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
You can only block inheritance at the ____ level.

A) OU
C) site
B) container
D) forest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
List and describe the three default policies of IPSec.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Discuss what printer location policies can be used for.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
The real strength of universal groups is realized with ____________________ domains.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
Normally, only the ____ group is in the Security Filtering area.

A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.

A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
____ allows the inspection of systems to look for specific conditions on a computer, and is widely used with scripting.

A) IPMI
C) SNMP
B) WMI
D) HTTP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The _________________________ design is a simple OU design based on the structure of the organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
What is the most common use of WMI filters?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Discuss how OUs should be named.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
What are the two commands that can be used to redirect computer accounts and user accounts?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
The acceptable values for the PSO "mustHave" attribute msDS-msDS-LockoutThreshold are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
Discuss reasons to use OUs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
Among the most risky devices in an organization are ____________________ flash drives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the geography structure for OUs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Actual GPOs are commonly named based on their ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Describe the Kerberos policy within Group Policy.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Explain how to create fine-grained policies.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Used in a multiple-domain environment
universal groups
Used in a multiple-domain environment
global groups
Used in a multiple-domain environment
domain local groups
Used in a multiple-domain environment
Software settings
Used in a multiple-domain environment
Windows settings
Used in a multiple-domain environment
IPSec
Used in a multiple-domain environment
loopback processing
Used in a multiple-domain environment
fine-grained account policies
Used in a multiple-domain environment
password policy
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
universal groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
global groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
domain local groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Software settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Windows settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
IPSec
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
loopback processing
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
fine-grained account policies
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
password policy
Used to organize users in the same domain
universal groups
Used to organize users in the same domain
global groups
Used to organize users in the same domain
domain local groups
Used to organize users in the same domain
Software settings
Used to organize users in the same domain
Windows settings
Used to organize users in the same domain
IPSec
Used to organize users in the same domain
loopback processing
Used to organize users in the same domain
fine-grained account policies
Used to organize users in the same domain
password policy
Allows the GPO settings for a computer to override the settings applied to a user
universal groups
Allows the GPO settings for a computer to override the settings applied to a user
global groups
Allows the GPO settings for a computer to override the settings applied to a user
domain local groups
Allows the GPO settings for a computer to override the settings applied to a user
Software settings
Allows the GPO settings for a computer to override the settings applied to a user
Windows settings
Allows the GPO settings for a computer to override the settings applied to a user
IPSec
Allows the GPO settings for a computer to override the settings applied to a user
loopback processing
Allows the GPO settings for a computer to override the settings applied to a user
fine-grained account policies
Allows the GPO settings for a computer to override the settings applied to a user
password policy
Can be used to assign permissions to resources within the domain
universal groups
Can be used to assign permissions to resources within the domain
global groups
Can be used to assign permissions to resources within the domain
domain local groups
Can be used to assign permissions to resources within the domain
Software settings
Can be used to assign permissions to resources within the domain
Windows settings
Can be used to assign permissions to resources within the domain
IPSec
Can be used to assign permissions to resources within the domain
loopback processing
Can be used to assign permissions to resources within the domain
fine-grained account policies
Can be used to assign permissions to resources within the domain
password policy
Allow an organization to have more than one account policy within a single domain
universal groups
Allow an organization to have more than one account policy within a single domain
global groups
Allow an organization to have more than one account policy within a single domain
domain local groups
Allow an organization to have more than one account policy within a single domain
Software settings
Allow an organization to have more than one account policy within a single domain
Windows settings
Allow an organization to have more than one account policy within a single domain
IPSec
Allow an organization to have more than one account policy within a single domain
loopback processing
Allow an organization to have more than one account policy within a single domain
fine-grained account policies
Allow an organization to have more than one account policy within a single domain
password policy
Can be used to automate the deployment of applications within the network
universal groups
Can be used to automate the deployment of applications within the network
global groups
Can be used to automate the deployment of applications within the network
domain local groups
Can be used to automate the deployment of applications within the network
Software settings
Can be used to automate the deployment of applications within the network
Windows settings
Can be used to automate the deployment of applications within the network
IPSec
Can be used to automate the deployment of applications within the network
loopback processing
Can be used to automate the deployment of applications within the network
fine-grained account policies
Can be used to automate the deployment of applications within the network
password policy
Includes items such as minimum age and minimum password length
universal groups
Includes items such as minimum age and minimum password length
global groups
Includes items such as minimum age and minimum password length
domain local groups
Includes items such as minimum age and minimum password length
Software settings
Includes items such as minimum age and minimum password length
Windows settings
Includes items such as minimum age and minimum password length
IPSec
Includes items such as minimum age and minimum password length
loopback processing
Includes items such as minimum age and minimum password length
fine-grained account policies
Includes items such as minimum age and minimum password length
password policy
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
universal groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
global groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
domain local groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Software settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Windows settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
IPSec
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
loopback processing
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
fine-grained account policies
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
password policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.