139 Quiz Questions #2 Flashcards

1
Q

T/F - Computer policy settings are applied whenever a user logs in or out of a computer.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F - User policy settings are applied whenever a user logs in or out of a computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which user account does a linked Computer Policy apply to on a domain computer?

A

All Domain users logging onto the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two Active Directory objects do group policies get applied to?

A

Computers

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once a GPO is created, it is usually linked to:

A

an OU containing a group of users or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F - the order in which multiple group policies are applied to a container does not matter as the cumulative affect of the policies will apply.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Windows Server tool is used to mange group policy settings?

A

GPMC (Group Policy Management Controller)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three major policy headings that can be configured are:

A

Software Settings

Windows Settings

Administrative Templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F - User rights and user permissions represent the same accessibility within a domain environment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the default setting for most of the group policy settings?

A

Not Configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a single-label name DNS entry?

A

maintain compatibility with older OS that use flat namespaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When configuring the only DNS service within a domain you need to create at least a:

A

Primary Forward Lookup Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name for the zone used for single-name records?

A

GlobalName Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F - You must configure the DNS role on the Active Directory Domain Controller.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three command line tools commonly used to troubleshoot DNS issues are:

A

PING

NSLOOKUP

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If there are no forwarders set in the DNS configuration, the next step in resolving DNS queries is:

A

Use Root Hints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F - A ‘Non-authoritative answer’ to a DNS query means the response is not reliable and should be ignored.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the main difference between Shared permissions and NTFS permissions?

A

NTFS permissions are applied to files and folders and Shared permissions are applied to folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F - An Allow permission will take precedence over a corresponding Deny permission.

20
Q

Which three of the following are configurable NTFS permisssions?

A

Read

Write

Modify

21
Q

hich standard NTFS permission allows a user to take ownership of a file or folder?

A

Full Control

22
Q

What two types of disk quotas can be set on a partition?

23
Q

Disk quotas can either allow or prevent a user from exceeding a maximum disk storage that has been set.

24
Q

Which of the following are configurable Shared Permissions for a shared folder?

A

Read

Read/Write

25
Moving a shared file from an NTFS partition to a FAT32 memory stick will:
remove the permissions that were set before moving the file.
26
What is the purpose of adding a '$' after a network sharename?
It hides the share name from browsing.
27
T/F - Permissions that are set on a parent folder are inherited by subfolders by default.
TRUE
28
What term is used to describe a WSUS computer that connects directly to Microsoft for updates?
Upstream WSUS Server
29
Drive encryption is a common technique used to hold a computer hostage using a Ransomware malware attack.
TRUE
30
Which of the following are updates that a WSUS server can provide to client computers?
Critical Updates MS Office Updates Service Packs
31
A malware exploit that disguises itself as legitimate software is often called a:
Trojan Horse
32
Which two media types does the Windows Server Backup feature support?
Network Share Local Hard Drive
33
T/F - Backup methods that allow for the entire system to be recovered include Full Server and Bare Metal Recovery options.
FALSE
34
Which two of the following are advantages of using a WSUS server?
Conserve WAN bandwidth. Consistency of updated computers.
35
Which of the following Windows Server monitoring tools is commonly used with data collector sets to log resource use?
Performance Monitor
36
A malware exploit that self-replicates and uses the network to spread is called a:
WORM
37
Three Common components that cause bottlenecks within a computer system that should be monitored include:
Memory usage CPU usage Hard Disk usage
38
DHCP can provide which of the following three network settings to a client machine:
Default Gateway Subnet Mask DNS Server Address
39
How many scopes are supported for each subnet?
ONE
40
What is required to create a DHCP reservation?
The client computer's MAC address.
41
When would it be necessary to create an exclusion?
When a client computer has a reservation configured.
42
A DHCP server can be located on a different subnet.
True
43
If a DHCP Server shows that DHCP DISCOVERS are increasing, but that DHCP OFFERS are static then the possible fault is:
the server is out of addresses.
44
A red down arrow icon next to a DHCP server indicates:
that the DHCP server is connected to the network, but not authorized.
45
Filtering with DHCP will allow or deny computers from getting IP addresses based on MAC address information.
True