Server Flashcards

1
Q

which of the following is used to boot a computer over the network?

A

PXE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

which of the following is used to load a minimum version of windows to troubleshoot an installation?

A

Windows PE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

which two roles are available in wds?

A

Deployment server

transport server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which of the following are necessary for deploying wds? (choose all that apply)

A

AD DS
DHCP
DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

the answer file is made as a ____ file

A

XML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

which of the following allows you to package drivers together and deploy them with images?

A

dynamic driver provisioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

which command allows you to modify an offline image?

A

dism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

which program is used to remove the computer name and sid from a computer?

A

system preparation utility (sysprep)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

which of the following is the filename extension for install images and boot images?

A

WIM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

which of the following is used to convert a master computer to an image file?

A

Windows Deployment Service Capture utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which term best describes multiple hot fixes, security updates, and critical updates which are packaged together and thoroughly tested together?

A

service pack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

to specify which computers get which updates, into which of the following categories should you divide the computers?

A

computer groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

which of the following is the default port used for synchronization?

A

8530

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which of the following wsus modes has upstream wsus servers share updates and the approval of updates with wsus downstream servers?

A

replica

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

which of the following is the process of downloading updates for a wsus server?

A

synchronization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

which term best describes when computers are automatically assigned to a computer group using group policies or by modifying the registry?

A

client side targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

which of the following is required in order to view reports in wsus?

A

microsoft report viewer 2008 redistributable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

which of the following is the default database used by wsus?

A

WID (wsus internal database)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

which of the following is the best strategy for getting all clients within an organization to use a wsus server?

A

use group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

if a client is not part of a domain, client-side targeting can be accomplished by doing which of the following?

A

by modifying the registry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

which of the following is the primary tool to add or remove server tools?

A

server manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

which of the following is used to view the windows logs?

A

event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

when you are troubke shooting a problem and decide to use the event viewer, which of the following should be used to help you focus on a reduced set of events?

A

filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

which of the following is used to modify a task after you add a basic task to an event viewer?

A

task scheduler

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

which of the following allows you to view events from multiple computers using the event viewer?

A

subscriptions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

which command is used to configure a collecting computer to receive an event subscription?

A

wecutil qc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

which program allows you to stop a running process?

A

task manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

which program is used to determine what process is using a file?

A

resoource monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

which of the following is used to group multiple performance counters so that they can be used over and over in performance monitor?

A

data collector sets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

which program allows you to determine what processes are using which network connections?

A

netstat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what are two types of dfs namespace?

A

domain based namespace

stand alone namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

how many target folders can you have for each namespace in windows server 2008 mode?

A

50,000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is an order list of servers and targets that a client computer receives from a domain controller or namespace server when a user accesses a namespace root or a dfs folder with targets?

A

referrals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what is the default topology used in dfs replication?

A

full mesh topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

which of the following is the compression algorithm used in dfs replication found with windows server 2012 r2?

A

remote differential compression (rdc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

which is the default size of a staging folder?

A

4gb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

which is the collection of servers that hold targets of a dfs folder?

A

replication group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

which of the following is a shared folder of shared folders?

A

dfs namespace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

which of the following replaced file replication services (frs)?

A

dfs replication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

what is the default quota size of the conflict and deleted folder?

A

660 mb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

which type of quota used with fsrm prevents users from saving files when the quota is exceeded?

A

hard quota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

which of the following is supported when you define quotas using fsrm? (choose all that apply)

A
  • place an event in the windows logs
  • send email
  • run a command or script
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

which of the following do you perform when you change a quota template? (choose all that apply)

A
  • apply template only to derived quotas that match the original template
  • apply template to all derived quotas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

which of the following is used to control the type of files that users can save to a file server?

A

fsrm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

which type of screening prevents users from saving the defined authorized files?

A

active screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

which tool is used to manage file servers, including configuring quotas and blocking certain files?

A

file server resource manager (fsrm)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

which type of quota used by fsrm will send notifications only when the quota is exceeded?

A

soft quota

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

which of the following enables users to use certain files but notifies an administrator via an email when the user saves those types files?

A

passive screening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

which of the following do you setup when you want to allow a file that is blocked with file screening?

A

screen exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

which of the following do you use to simplify the management of file screens?

A

file screen template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

which encryption technology should you use to protect individual files on a computer running windows server 2012 r2?

A

efs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

when using efs, the encryption key is stored in which of the following?

A

digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

what happens when you move an efs encrypted file to a fat32 volume?

A

it is decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

which encryption algorithm uses a single key to encrypt and decrypt data?

A

symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

how do you define the dra’s?

A

GPOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

how do you decrypt an efs encrypted file for a person who has left an organization?

A

use a DRA (data recovery agent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

if you dont have a tpm on your computer, what can you use to store the key to us bitlocker?

A

usb memory device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

which windows technology is used to encrypt a usb disk device?

A

bitlocker to go

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

which command do you use to encrypt a folder with efs?

A

use the cipher command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

how do you configure windows to automatically encrypt a users’ documents folder?

A

use group policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

where do you view the security events collected by auditing with group policies?

A

event viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

to audit who accessed a file, which of the following must you first enable?

A

object access auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

to audit who modified a group policy, which of the following should you change?

A

policy change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

in which audit group do you find the audit filtering platform connection and audit filtering platform packet drop?

A

object access auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

which of the following do you need to perform when you want to remove advanced auditing policies?

A

use basic audit policies with the enforce option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

which command should you use to show the current audit policies on a machine?

A

auditpol.exe /get /subcategory:*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

how many audit policy sub settings are found in the advanced audit policy settings?

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

which command clears the audit policy on a computer?

A

auditpol /clear

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

which of the following should you use to give you more control on what events to audit?

A

advanced audit policy settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

which of the following do you define when you configure auditing files and printers?

A

system access control lists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

how many primary zones can a zone have?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

which are often known as name servers?

A

dns servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

which zone is used to translate host names to ip addresses?

A

forward lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

which would you use when you create a reverse lookup zone for the 172.25.0.0 255.255.0.0 subnet?

A

0.0.25.172

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

which is each node or leaf in the dns tree referred to as?

A

resource record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

which is used to automatically create and update the host’s primary dns server?

A

dynamic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

which zone contains only the necessary resource records that act as an authoritative name server?

A

stub zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

which forwards queries to other dns servers based on the dns domain name in the query?

A

conditional forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

which sends dns information from a zone on a dns server to another dns server?

A

zone transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

which command do you use to create a zone to a dns on a dns server?

A

dnscmd /zoneadd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

which records are automatically created when you create a zone? (choose all that apply)

A

soa

ns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

which dns resource record is used to map a host name to an ip address?

A

A record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

which dns resource record specifies the authoritative information about a zone?

A

soa record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

which resource record defines an alias for a host name?

A

cname record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

which type of zone do you find a ptr record in?

A

reverse lookup zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

which record do you use to specify an organization’s mail server?

A

mx record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

which of the following do you use to ensure the only computer that can update its own resource records used?

A

secure dynamic updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

to scavenge dns records, where must you enable scavenging and aging? (choose two answers)

A

dns server

zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

which command do you use to clear a computer’s dns cache?

A

ipconfig /flushdns

90
Q

when is the ttl that is defined by the soa overwritten?

A

when a resource record has its own ttl

91
Q

which of the following can you find in rras? (choose all that apply)

A

routing

nat

92
Q

is you want to use vpn reconnect, which vpn protocol should you use?

A

ikev2

93
Q

you want to make a server running windows 20129 r2 into a vpn server. however, the networking team allows only https through the firewall. which vpn protocol should you use?

A

sstp

94
Q

you want to start using smart cards with the vpn. what authentication protocol should you use?

A

eap

95
Q

which authentication protocol should you not use because it is the least secure?

A

pap

96
Q

how do you allow split tunneling?

A
  • open advanced tcp/ip settings

- deselect use default gateway on remote network

97
Q

what is the easiest way to set up a vpn client on a computer for a user that is not technical?

A

use cmak to create an executable install

98
Q

which option would you use to make sure that a user can dial in using only his or her home phone?

A

always callback to

99
Q

which tab in the rip properties would you use to prevent routes being received from a router located on 10.10.10.10?

A

security

100
Q

which option should you use with the route command when creating a static route that will ensure the route is still available if the computer is rebooted?

A

-p

101
Q

you have the following servers for direct access:
-domain controller/dns server running windows server 2008 operating at windows server 2003 domain functional level
-certificate authority running windows server 2012 r2
-file server running windows 2008 r2
-direct access server running windows server 2012 r2
which of the following do you need to modify?

A

upgrade the domain controller to windows server 2008 r2

102
Q

you are to configure the network location server (nls). which web server (iis) role service would you install on the nls server?

A

ip and domain restrictions

103
Q

you have installed and configured a direct address server. you created a group called daclients. however, when users log into their computers, the computers are not configured to us direct access. what do you need to do to configure the clients to use direct access?

A

make sure that the client is added to the daclients group

104
Q

you are configuring direct access on server1. which step do you need to perform to ensure that server1 can initiate connections to direct access client computers?

A

infrastructure server

105
Q

how can you identify the url of the network location server that a client is using?

A

run netsh namespace show effective policy command

106
Q

what two steps do you need to perform on the dns server so that it can support direct access?

A
  • remove the isatap from the dns global query block

- add a record for the nsl server

107
Q

you have a client that is configured for direct access. the client is connected to the internet from home. how can you verify whether the client can resolve the direct access server called server1.contosol.com?

A

run the ping server1.contoso.com command

108
Q

you have configured a server called server1 as a direct access server. how do you need to configure the windows firewall on the server to support direct access?

A

allow icmpv6 echo request

109
Q

which table is used to determine the behavior of the dns clients when determining the address of internal resources?

A

nrtp (name resolution policy table)

110
Q

which of the following clients can connect to a direct access server? (choose all that apply)

A
  • windows 8 enterprise
  • windows 7 ultimate
  • windows 8 professional
111
Q

which ports does nps use for authentication and accounting? (choose four)

A
  • 1812
  • 1813
  • 1645
  • 1646
112
Q

you have several vpn servers configured using rras. what is the best way to collect information on when and how long someone is connected through the vpn?

A

radius accounting

113
Q

which do you use to provide central authentication of vpn and wireless connections on the network?

A

use an nps server (network policy server)

114
Q

which of the following are access clients? (choose all that apply)

A
  • vpn server
  • dial up server
  • 802.1x server
115
Q

which of the following is used to save a configuration so that it can be reused on other nps servers?

A

templates

116
Q

which two locations can nps log to? (choose two)

A
  • sql server

- text file

117
Q

to use eap-tsl, each client must have which of the following?

A

digital certificate

118
Q

which of the following are used with nps templates? (choose all that apply)

A
  • remote radius servers

- radius clients

119
Q

Microsoft’s radius server is known as which of the following?

A

AAA server

120
Q

which of the following tracks network usage for auditing and billing purposes?

A

radius accounting

121
Q

which of the following is the default location for the log files if you use text files for radius accounting?

A

c:\windows\system32\logfiles

122
Q

which three types of policies are avialbale on the network policy server (nps)? (choose all that apply)

A
  • health policies
  • network polices
  • connection request policies
123
Q

which policy is used to establish sets of conditions and settings that specify which radius servers perform the authentication. authorization, and accounting of connection requests received by the nps server from radius clients?

A

connection request polices

124
Q

which policy establishes sets of conditions, constraints, and settings that specify who is authorized to connect to the network?

A

network policies

125
Q

which policy would you use if you want to limit when a user can log in through the vpn?

A

network policies

126
Q

how do you specify which radius server handles authentication for a vpn server?

A

connection request policies

127
Q

how can you stop an nps server to stop acting as a radius server and to stop process connections requests locally?

A

delete the default connection request policy

128
Q

which of the following are remote connections based on when creating network policies? (choose all that apply)

A
  • constraints
  • conditions
  • settings
129
Q

which of the following are remote connections based on when creating a connection request policy? (choose all that apply)

A
  • conditions

- settings

130
Q

what technology allows you to decrease allocated bandwidth when using multilink?

A

BAP (bandwidth allocation protocol)

131
Q

if you use an isdn line, which of the following allows you to use multiple connections to allow for higher bandwidth?

A
  • multilink connections

- BAP

132
Q

how many bits does basic encryption support?

A

40 bit

133
Q

which of the following nap enforcement mechanisms is considered the weakest?

A

DHCP

134
Q

which of the following nap enforcement mechanisms is considered the strongest?

A

ipsec

135
Q

which component used with nap maintains information and reports on the health of a nap client?

A

system health agent

136
Q

which is the most common system health agent used in windows?

A

windows security center

137
Q

which is used to make a computer compliant when you have quarantined computers that are not compliant when using nap?

A

use remediation servers

138
Q

with nap, what defines the requirements for the client computers to connect to a network that is connected?

A

shv (system health validator)

139
Q

which of the following is typically a remediation server when using nap? (choose all that apply)

A
  • antivirus management server
  • dhcp server
  • dns server
  • domain controller
140
Q

you just implemented nap. how can you ensure that domain computers are up to date?

A

wsus

141
Q

which server is used as the nap health policy server?

A

nps

142
Q

which of the following is used as a windows security health validator? (choose all that apply)

A
  • anti virus program

- spyware

143
Q

which act confirms the identity of a user or system?

A

authentication

144
Q

which fallback authentication is used when kerberos does not work?

A

ntlm (ny lan manager)

145
Q

by default, what is the maximum amount time that a clock can be off in order for kerberos to work?

A

300 seconds

146
Q

which authentication protocol uses the key distribution center that maintains a database of secret keys and is more secure than ntlm?

A

kerberos

147
Q

which of the following is the format for kerberos?

A

sqlservice/service1:1433

148
Q

which name uniquely identifies an insurance of a service for a client?

A

spn (service principal name)

149
Q

which command do you use to configure an spn for a user account?

A

setspn

150
Q

what allows a kerberos ticket to be created for another service on the originating user’s behalf?

A

kerberos delegation

151
Q

by default,how often do passwords change for managed service accounts?

A

30 days

152
Q

which account runs a service on multiple computers that belong to a cluster and that automatically have the password changed on a regular basis?

A

group managed service account

153
Q

which of the following is found on a domain controller? (choose all that apply)

A
  • global catalog
  • rid master
  • pdc emulator
154
Q

which of the following is not an operations master?

A

global catalog

155
Q

what is the cause of the problem if account lockout is not working?

A

the pdc emulator is down

156
Q

what do you use to transfer the holder of the rid master?

A

active directory users and computers

157
Q

what do you use to transfer the holder of the schema master?

A

active directory schema

158
Q

what do you use to seize the role of the domain naming operations master?

A

ntdsutil.exe

159
Q

you are creating a self served kiosk console at a local mall. at the mall, the kiosk will need to access a domain controller. what should you use?

A

rodc

160
Q

what are you cloning when you use the new-addccloneconfigfile?

A

virtual domain controller

161
Q

what is the minimum forest function level for rodc?

A

windows server 2008

162
Q

you deployed a rodc running windows server 2008 to a branch office. you need to ensure that users at the branch office are able to log on to the domain using the rodc. what should you do?

A

configure a password replication policy on the rodc

163
Q

which windows powershell applet enables the active directory recycle bin?

A

enable-adoptionalfeature

164
Q

which of the following does the system state contain? (choose all that apply)

A
  • boot files
  • user profiles
  • active directory database
  • iis database
165
Q

with the windows backup, how do you back up the active directory database?

A

back up the system state

166
Q

which of the following is included with the sysvol folder? (choose all that apply)

A
  • login scripts

- dfs staging folder and files

167
Q

which mode do you need to use when you perform an authoritative restore?

A

directory services restore mode (dsrm)

168
Q

how do you create an active directory snapshot?

A

use ntdsutil.exe

169
Q

how can you determine the size of the active directory database?

A

use windows explorer to view the properties of the c:\windows\ntds
ntds.dit file

170
Q

how do you compress the size of an active directory database?

A

use the ntdsutil command with the files option

171
Q

which utility can you use to remove the server metadata? (choose two)

A
  • active directory recycle bin

- ntdsutil.exe

172
Q

you mount an active directory snapshot. what do you need to do so that you can query the snapshot by using ldap?

A

dsamain.exe

173
Q

which of the following is found under the account policies? (choose all that apply)

A
  • kerberos policy
  • password policy
  • account lockout policy
174
Q

what is used to determine the circumstances and length of time that an account will be locked out of the system?

A

account lockout policy

175
Q

what determines settings for passwords, including enforcement and lifetime?

A

password policy

176
Q

how many password policies can you define for each domain?

A

1

177
Q

what is the default value for the enforce password history?

A

24

178
Q

what value must you assign to the account lockout duration to ensure that the administrator will have to manually unlock the account?

A

0

179
Q

which do you use if you want to assign different password policies to different sets of people?

A

fine grained password policies

180
Q

which do you use to configure a password policy on a standalone computer running windows?

A

secpol.msc

181
Q

what is the minimum domain level necessary in order for the forest to use fine grained password policies?

A

windows server 2008

182
Q

in which policy do you normally find the password policy?

A

default domain policy

183
Q

what are the two default group policies that are already created in active directory? (choose two answers)

A
  • default domain controller policy

- default domain policy

184
Q

gpo’s are assigned to users by which of the following?

A

being linked to a container in active directory

185
Q

you assign a gpo at the domain. how do you ensure that it is not overridden by another gpo?

A

use the enforce option

186
Q

you have 20 users assigned to an ou. you want 10 of those users to be affected by another gpo. what should you do?

A

use a security filter

187
Q

which do you use if you want to apply a group policy that affects only laptops?

A

wmi filtering (windows management instrumentation)

188
Q

how many wmi filters can you configure per gpo

A

one per gpo

189
Q

which two modes are used in loopback processing?

A
  • replace mode

- merge mode

190
Q

which command is used to force a computer to download gpo settings after a gpo has been modified?

A

gpupdate /force

191
Q

by default, what speed is considered a slow link when using slow link processing?

A

500kbps

192
Q

which tool is used to order gpo precedence when assigning multiple gpo’s to an ou?

A

group policy management console

193
Q

how often do gpos get refreshed on client pc’s

A

every 90 to 120 minutes

194
Q

which filename extension patches files for microsoft software installation (msi) files?

A

.msp

195
Q

which type of software installation would you perform if you want to add an icon to the users control panel?

A

publish software to a user

196
Q

which type of software supports self healing?

A

.msi

197
Q

which option would you use to repoint the documents folder to the user’s home folder?

A

folder redirection

198
Q

which type of folder redirection would you use to redirect the user’s home directory to a location based on the group that the user is a member of?

A

advanced

199
Q

most of the time, why do laptop users use folder redirection?

A

offline folders

200
Q

where is the central store located?

A

c:\windows\sysvol\domain\policies\policydefinitions

201
Q

what is used to display only the administrative templates that are being used?

A

property filters

202
Q

which two components make up a gpo?

A
  • GPT (group policy template)

- GPC (group policy container)

203
Q

which tool is used to backup only a gpo?

A

group policy management console

204
Q

which feature allows you to restore from backup, delete a backup, and view the settings of a gpo?

A

group policy object editor

205
Q

which file maps references to users, groups, computers, and unc paths when importing settings from one gpo to another gpo?

A

migration table

206
Q

which command allows you to restore the default domain policy or the default domain controllers policy to their default settings?

A

dcgpofix

207
Q

which tab do you use in the gpmc that grants permissions to a user or group for a gpo?

A

delegation

208
Q

which of the following permissions can you grant to a group or user to manage a gpo? (choose all that apply)

A
  • edit settings
  • read
  • delete
  • modify security
209
Q

which button do you click on the delegation tab that allows you to assign granular permissions to a gpo?

A

advanced

210
Q

which permission is necessary for a gpo to be applied to a group or user? (choose all that apply)

A
  • allow apply group policy permission

- allow read permission

211
Q

after you copy and paste a gpo, what is the last step you have to do?

A

rename the gpo

212
Q

which minimum domain controller is needed to use group policy preferences (gpp)?

A

windows server 2008

213
Q

which of the following are actions found in preferences? (choose all that apply)

A
  • delete
  • create
  • replace
214
Q

which two categories are gpp divided into? (choose two)

A
  • windows settings

- control panel settings

215
Q

you create a preference item for windows internet explorer 10 and you configure the html editor option and it includes a red dashed underline. what do you do to enable this option?

A

press the f6 key

216
Q

which of the following are control panel settings options in gpp? (choose all that apply)

A

power options extension

217
Q

which of the following are windows settings options in gpp? (choose all that apply)

A

network shares

218
Q

you want to configure the default home page for internet explorer for your organization. you have windows 7, windows 8, windows 9, and windows 10. how many preference items do you need to create?

A

3

219
Q

which of the following preferences support editing state for gpp? (choose all that apply)

A
  • folder options

- regional and language settings

220
Q

which printers are supported for gpp? (choose all that apply)

A
  • tcp/ip printer
  • local printer
  • shared printer
221
Q

how do you include multiple targeting items when configuring gpp?

A

use logical operators