Module 11 Review Quiz Flashcards
Group Policy settings apply to which of the following objects? (Choose all that apply.)
a. Users
b. Computers
c. Groups
d. OUs
a. Users
b. Computers
There are no GPOs created in an Active Directory domain by default.
a. True
b. False
b. False
You have created a new Group Policy Object (GPO). To which of the following objects can this GPO be linked? (Choose all that apply.)
a. OU
b. Group
c. Site
d. Domain
a. OU
c. Site
d. Domain
Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7, Windows Server 2008, and later computers by default.
a. True
b. False
a. True
You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?
a. Publish the software in the User Configuration
b. Assign the software in the User Configuration
c. Publish the software in the Computer Configuration
d. Assign the software in the Computer Configuration
a. Publish the software in the User Configuration
Which section of a GPO contains the most security-related settings for the Windows operating system?
a. User Configuration, Windows Settings
b. Computer Configuration, Windows Settings
c. User Configuration, Administrative Templates
d. Computer Configuration, Administrative Templates
b. Computer Configuration, Windows Settings
You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings.
a. True
b. False
a. True
Which of the following is not included in a certificate?
a. Public key b. Private key c. Digital signature d. CRL location
b. Private key
Which term refers to the process whereby a user or computer obtains a certificate from a CA?
a. PKI b. enrollment c. revocation d. hashing
b. enrollment
Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA.
a. True
b. False
a. True
Which certificate template permissions must you grant to a user or computer before they are auto-enrolled for a certificate using Group Policy? (Choose all that apply.)
a. Read
b. Write
c. Enroll
d. Autoenroll
a. Read
c. Enroll
d. Autoenroll
Only schema version 1 certificate templates can be configured for auto-enrollment.
a. True
b. False
b. False
In an 802.1X Wireless configuration, which component generates the encryption keys used for WPA?
a. WAP b. Wireless client c. RADIUS server d. Domain controller
c. RADIUS server
You must enroll each WAP for a certificate based on the RAS and IAS Server certificate template before they can be configured for 802.1X Wireless.
a. True
b. False
b. False
Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)
a. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization’s Internet connection.
b. Group Policy is used to direct domain computers to a WSUS server for updates.
c. Updates can be manually or automatically approved for distribution on a WSUS server.
d. A WSUS server can be configured to remove updates from computers that have installed them.
a. WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organization’s Internet connection.
b. Group Policy is used to direct domain computers to a WSUS server for updates.
c. Updates can be manually or automatically approved for distribution on a WSUS server.
d. A WSUS server can be configured to remove updates from computers that have installed them.
To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization.
a. True
b. False
a. True
Which of the following port numbers is used to obtain updates from a WSUS server using HTTPS?
a. 80 b. 443 c. 8530 d. 8531
d. 8531
Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public, private, domain).
a. True
b. False
a. True
Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?
a. Core isolation b. Memory integrity c. Controlled folder access d. Secure boot
c. Controlled folder access
What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?
a. Firewall profiles b. Connection security rules c. IPSec rules d. Security Associations
b. Connection security rules