NTC 324 Chapter 16 Best Answer Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer. 1. What are the different types of Group Policy objects (GPOs)? a. Computer, user, and organizational unit b. Local, domain, and starter c. Local, domain, and universal d. Site, domain, and organizational unit 2. Installing Windows Server 2012 Active Directory Domain Services (AD DS) installs two default policies: Default Domain Policy and Default Domain Controller Policy. As an administrator, you need different policy settings than the default. What is the best approach to make those changes? a. Add new settings in the default policies as needed. b. Create new GPOs to augment or override the existing default settings. c. Change existing ones in the default policies as needed. d. Link a new GPO using the AD DS role. 3. If creating a local GPO, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO? a. The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only Computer Configuration settings. b. Each GPO contains both Computer Configuration and User Configuration settings. c. All GPOs contain User Configuration settings. d. The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only User Configuration settings. 4. Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance? a. Using the Enforce, Block Policy Inheritance, or Loopback settings. b. Using Active Directory Administrative Center (ADAC) to block inheritance. c. Inheritance can be altered by making the applicable registry settings. d. Using the Enforce or Block Policy Inheritance settings. 5. You are an administrator in a mixed environment of Windows Server 2012, Server 2008 R2 and desktops running Vista. You need different settings for users, based on their identities. Can you achieve this through multiple local GPOs? a. All these operating systems support for multiple local GPOs. However, some servers are standalone (non-AD DS) systems. b. Yes, this is achievable through support by all OSs, regardless of whether standalone or whether members of an AD DS domain. c. No, this is not achievable given the current environment. d. No, this is not achievable until software is added. Chapter 17 Best Answer Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer. 1. When would you need to create a user account through the Control Panel? a. You can create users through the Control Panel or with the Local Users and Groups snap-in. b. You can create users through the Control Panel when the Windows Server 2012 computer is part of a workgroup. c. When you join a computer to an Active Directory Domain Services (AD DS) domain, you can create only new local user accounts with the Local Users and Groups snap-in. Control Panel is while the computer is not a member of an AD DS domain. d. Creating users through the Control Panel is not possible. 2. What is the best approach for planning a security template strategy? a. Plan according to the needs of individual computers, not users. b. Plan according to the needs of computer roles, and also company locations. c. Plan according to the needs of computer roles, but not individual computers. d. Plan according to the needs of users. 3. What are the key benefits of security templates? a. Apply consistent, scalable, and reproducible security settings throughout an enterprise. b. Deploy alongside with group policies. c. Although a text editor is possible, Windows Server 2012 enables the use of a graphical interface. d. Simple deployment as configuration files are text (.inf extension) and uses a graphical and unified interface. 4. How are most Group Policy settings applied or reapplied? a. Every time a computer starts up b. At the refresh interval c. Whenever a user logs on d. Whenever the domain controller is restarted 5. What are the two interfaces available for creating and managing user accounts in Windows Server 2012? a. Control Panel and the MMC snap-in b. Server Manager and Control Panel c. Control Panel and Active Directory Users and Computers d. User Accounts control panel and the Local Users and Groups snap-in for MMC Chapter 18 Best Answer Choose the letter that corresponds to the best answer. More than one answer choice may achieve the goal. Select the BEST answer. 1. When installing software using Group Policy, what file or files does an administrator use? a. Windows Installer package files, or .msi files. Modifications to the package files are transform files, or .mst files. Further, patch files are designated as .msp files. b. Any approved software from Microsoft, including the Certified for Windows Server 2012 logo on the packaging. c. Windows Installer package files, or .mst files. Modifications to the package files are instruction files, or .msi files. d. Windows Installer packages that contain all the information about the software. 2. You want to deploy software using Group Policy. What is necessary before deciding to Assign the software to your user accounts? a. You must create a Group Policy object (GPO) or modify an existing GPO. As part of configuring the GPO, you decide whether to Assign or Publish the application. b. You create the GPO. Whether to Assign or Publish is decided elsewhere. c. You must create a distribution share, also called a software distribution point. Then create the GPO, specifying how to deploy the application. d. You decide whether to Assign or Publish the application. If using .zap files, you might need user intervention. 3. If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should you avoid this method? a. If users have slow links between their workstations and the software distribution point b. If computers are already under a very strict security policy and computer configuration c. If users often take their computer home d. If computers require administrative logon for each new package 5. What does file-activated installation mean, and where is it utilized? a. When a user opens a file associated with an application that does not currently exist on the user- workstation, the application is installed. It is used for both Publishing and Assigning an application to a user. b. When a user logs on and the local computer has a file associated with an application that does not exist, the application is installed. It is used when Assigning an application to a user. c. When a user opens a file associated with an application that does not currently exist on the user- workstation, the application is installed. It is used when Assigning an application to a user. d. When a user logs on and the local computer has a file associated with an application that does not exist, the application is installed. It is used when Publishing an application to a user. 6. What is the most common way to implement software restriction policies? a. By configuring software restriction policies on individual computers by using Local Security Policy b. Through Active Directory Users and Computers c. Through GPOs linked to Active Directory Domain Services (AD DS) containers, so that you can apply their policy settings to several computers simultaneously d. By using AppLocker, provided you apply to a computer running Windows 7 and Windows Server 2008 R2 or later