Module 04: Configuring Group Policies

Module 04: Configuring Group Policies

University

36 Qs

quiz-placeholder

Similar activities

Political Science and Political Theory

Political Science and Political Theory

University

32 Qs

Microeconomics Chapter 14-16

Microeconomics Chapter 14-16

University

32 Qs

BAC 4- Good Governance and Social Responsibility

BAC 4- Good Governance and Social Responsibility

University

40 Qs

Ökonomische Bildung II - 2020 FINAL WRITTEN TEST

Ökonomische Bildung II - 2020 FINAL WRITTEN TEST

University

40 Qs

Canadian Knowledge Quiz

Canadian Knowledge Quiz

6th Grade - University

41 Qs

Quiz on Spelling and Vocabulary for PTE

Quiz on Spelling and Vocabulary for PTE

10th Grade - University

35 Qs

Mid-term prep- Texas Government

Mid-term prep- Texas Government

University

37 Qs

CFAS - Conceptual Framework

CFAS - Conceptual Framework

University

35 Qs

Module 04: Configuring Group Policies

Module 04: Configuring Group Policies

Assessment

Quiz

Other

University

Hard

Created by

Nate undefined

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Charles removes the Authenticated Users group from a GPO. Why would he do that?

To enable Windows Management Instrumentation filtering on specific users

To prevent the GPO from being applied to specific users and/or computers

To ensure the default settings applied due to security filtering are inherited

To temporarily prevent user access to domain resources during DC backup

2.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Identify the elements that GPTs and GPCs have in common. Select two.

One serves as a backup for the other

They are replicated using the same method

They are both stored in Active Directory

They are both assigned a globally unique ID

They both have a Machine and User subfolder

3.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Which of the following represent recommended or best practices relative to group policies? Select two.

Set account policies and a few critical security policies at the domain level

Define group policy settings at the domain level and define exceptions at the OU level

If managing Computers and Users objects with group policies, move them to an OU

Define group policy settings at the site level and define exceptions at the domain level

AD folders, such as Computers and Users, should have a GPO linked to them

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

You are using an Administrative Template to configure an aspect of the Event Viewer. In which folder will you make the changes?

System

Windows Components

Server

Operating System Components

Events

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

When Bernadette, a professor, signs on to her office computer she sees the IP address in the lower right hand side of the desktop. However, when she signs on to a computer in the computer lab using the same credentials, she sees a different background and the IP address is not displayed. What is the most likely reason why the policy applied in her office is different from the one in the computer lab?

Loopback policy processing is enabled in the lab computer

Loopback policy processing is enabled in her office computer

Her office computer and lab computers are in different domains

Her office computer and lab computers have different policies

6.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

You want to shield a few objects in an OU from the GPO linked to it. How can you accomplish this? Select three.

Use Security Filtering in the GPMC to add objects to shield

Modify the group policy in the AD System\Policies folder

Remove the Authenticated Users group from the GPO

Use Windows Management Instrumentation filtering

Directly edit the GPO's discretionary access control list

7.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Lorenzo wants to configure a group policy preference on a limited set of systems that are running a specific version of the Windows operating system. How can he best implement the policy only on those systems?

Create an ADM file

Use a preference exception

Use a logon script

Use item-level targeting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?