Jesse Collins
Test por , creado hace más de 1 año

Brought to you by late night industries!

112
1
0
Jesse Collins
Creado por Jesse Collins hace más de 7 años
Cerrar

CIT 214 Microsoft Server Configuration - Final Exam Part 2 - Basic Edition

Pregunta 1 de 71

1

What can be used to add, delete, or modify objects in Active Directory, in addition to modifying the schema if necessary?

Selecciona una de las siguientes respuestas posibles:

  • DCPROMO

  • LDIFDE

  • CSVDE

  • NSLOOKUP

Explicación

Pregunta 2 de 71

1

When using CSVDE, what is the first line of the text file that uses proper attribute names?

Selecciona una de las siguientes respuestas posibles:

  • header row

  • header record

  • name row

  • name record

Explicación

Pregunta 3 de 71

1

Which of the following utilities do you use to perform an offline domain join?

Selecciona una de las siguientes respuestas posibles:

  • net join

  • join

  • djoin

  • dconnect

Explicación

Pregunta 4 de 71

1

Which of the following is not a type of user account that can be configured in Windows Server 2012?

Selecciona una de las siguientes respuestas posibles:

  • local accounts

  • domain accounts

  • network accounts

  • built-in accounts

Explicación

Pregunta 5 de 71

1

Which of the following are the two built-in user accounts created automatically on a computer running Windows Server 2012 R2?

Selecciona una o más de las siguientes respuestas posibles:

  • Network

  • Interactive

  • Administrator

  • Guest

Explicación

Pregunta 6 de 71

1

What is the PowerShell cmdlet syntax for creating a new user account?

Selecciona una de las siguientes respuestas posibles:

  • New-ADUser

  • New-User

  • New-SamAccountName

  • There is no PowerShell cmdlet for user creation.

Explicación

Pregunta 7 de 71

1

What is the PowerShell cmdlet syntax for creating a new computer object?

Selecciona una de las siguientes respuestas posibles:

  • New-Computer -Name <computer name> –path <distinguished name>

  • New-ADComputer -Name <computer name> –path <distinguished name>

  • New-ComputerName <computer name> –path <distinguished name>

  • There is no PowerShell cmdlet for creating computer objects.

Explicación

Pregunta 8 de 71

1

When using Netdom.exe to join an account, you may add the parameter [/OU:OUDN]. If this parameter is left out, where is the object placed?

Selecciona una de las siguientes respuestas posibles:

  • In the same organizational unit (OU) as the administrator running Netdom.exe

  • In the Users container

  • In the Computers container

  • Without the OU specified, the program will fail.

Explicación

Pregunta 9 de 71

1

Who may join a computer to the domain?

Selecciona una de las siguientes respuestas posibles:

  • No one, the computer does this itself when authenticating.

  • The computer joins the domain as part of the object creation process.

  • Only the domain administrator may join the computer to the domain.

  • Members of the computer’s local Administrators group may join the computer to the domain.

Explicación

Pregunta 10 de 71

1

What is the primary means by which people access resources on an Active Directory Domain Service (AD DS) network?

Selecciona una de las siguientes respuestas posibles:

  • By having a computer account

  • Being within the proper site and domain

  • By having elevated privileges

  • By having a user account

Explicación

Pregunta 11 de 71

1

What differences matter most in creating a single user versus multiple users?

Selecciona una de las siguientes respuestas posibles:

  • Single user creation is often done from the graphical user interface (GUI), whereas creating multiple users typically requires using command-line tools.

  • Creating a single user is simple, but manual work.

  • Time does not permit automating the creation of a single user.

  • When creating multiple users, not as many parameters are involved.

Explicación

Pregunta 12 de 71

1

What two graphical tools will help create either user or computer objects?

Selecciona una de las siguientes respuestas posibles:

  • Server Manager and PowerShell

  • Active Directory Administrative Center and Active Directory Users and Computer

  • Server Core and PowerShell

  • LDIFDE.exe and CSVDE.exe

Explicación

Pregunta 13 de 71

1

What is a key benefit to using ADAC or the Active Directory Users and Computers console?

Selecciona una de las siguientes respuestas posibles:

  • ADAC allows you to modify the properties of both multiple users and multiple computers at once.

  • ADAC allows you to import multiple objects at once.

  • ADAC allows you to modify the properties of multiple users or multiple computers at once.

  • ADAC not only helps create user and computer objects, but it helps join them to a domain.

Explicación

Pregunta 14 de 71

1

Are typical, authenticated users able to create computer objects in an Active Directory?

Selecciona una de las siguientes respuestas posibles:

  • No, it requires administrative rights to create a computer object.

  • Yes, if they are specially granted the Add Workstations To The Domain right.

  • No, users are not able to do so by default.

  • Yes, by default, users who are successfully authenticated to Active Directory are permitted to join up to 10 workstations to the domain, thus creating up to 10 associated computer objects.

Explicación

Pregunta 15 de 71

1

You are planning an Active Directory implementation for a company that currently has sales, accounting, and marketing departments. All department heads want to manage their own users and resources in Active Directory. What feature will permit you to set up Active Directory to allow each manager to manage his or her own container but not any other containers?

Selecciona una de las siguientes respuestas posibles:

  • Delegation of control

  • Read-only domain controller

  • Multimaster replication

  • SRV records

Explicación

Pregunta 16 de 71

1

If the user named Amy is located in the sales OU of the central.cohowinery.com domain, what is the correct syntax for referencing this user in a command line utility?

Selecciona una de las siguientes respuestas posibles:

  • amy.cohowinery.com

  • cn=amy.ou=sales.dc=cohowinery.com

  • cn=amy,ou=sales,dc=central,dc=cohowinery,dc=com

  • dc=com,dn=cohowinery,ou=sales,cn=amy

Explicación

Pregunta 17 de 71

1

Which of the following is a container object within Active Directory?

Selecciona una de las siguientes respuestas posibles:

  • Folder

  • Group

  • User

  • OU

Explicación

Pregunta 18 de 71

1

Which of the following groups do you use to consolidate groups and accounts that either span multiple domains or the entire forest?

Selecciona una de las siguientes respuestas posibles:

  • Global

  • Domain

  • Built-in

  • Universal

Explicación

Pregunta 19 de 71

1

Which of the following is not a correct reason for creating an OU?

Selecciona una de las siguientes respuestas posibles:

  • To create a permanent container that cannot be moved or renamed

  • To duplicate the divisions in your organization

  • To delegate administration tasks

  • To assign different Group Policy settings to a specific group of users or computers

Explicación

Pregunta 20 de 71

1

Which of the following group scope modifications are not permitted? (Choose all answers that are correct.)

Selecciona una de las siguientes respuestas posibles:

  • Global to universal

  • Global to domain local

  • Universal to global

  • Domain local to universal

Explicación

Pregunta 21 de 71

1

In a domain running at the Windows Server 2012 domain functional level, which of the following security principals can be members of a global group? (Choose all answers that are correct.)

Selecciona una o más de las siguientes respuestas posibles:

  • Users

  • Computers

  • Universal groups

  • Global groups

Explicación

Pregunta 22 de 71

1

You are attempting to delete a global security group in the Active Directory Users and Computers console, and the console will not let you complete the task. Which of the following could possibly be causes for the failure? (Choose all answers that are correct.)

Selecciona una o más de las siguientes respuestas posibles:

  • There are still members in the group.

  • One of the group’s members has the group set as its primary group.

  • You do not have the proper permissions for the container in which the group is located.

  • You cannot delete global groups from the Active Directory Users and Computers console.

Explicación

Pregunta 23 de 71

1

Select the best reasons for using organizational units (OUs)?

Selecciona una de las siguientes respuestas posibles:

  • Organizing by geography, assigning Group Policy settings, and applying security boundaries

  • Applying security boundaries, assigning Group Policy settings, and organizing by geography

  • Duplicating organizational divisions, assigning Group Policy settings, and delegating administration

  • Assigning Group Policy settings, administering delegation, and delegating administration

Explicación

Pregunta 24 de 71

1

What is the primary difference between universal groups and global groups in Windows Server 2012 R2?

Selecciona una de las siguientes respuestas posibles:

  • Global groups use less data in the global catalog. So, in considering replication traffic, universal groups should be within a site.

  • Universal groups use less data in the global catalog. So, in considering replication traffic, global groups should be within a site.

  • Universal groups use more data in the global catalog. However, global groups are best in general, both within a site and across sites.

  • Global groups use less data than universal groups, but not significantly.

Explicación

Pregunta 25 de 71

1

Generally, how do groups differ from OUs?

Selecciona una de las siguientes respuestas posibles:

  • Groups are security principals, meaning you assign access permissions to a resource based on membership to a group. OUs are for organization and for assigning Group Policy settings.

  • Groups are created by the Server Manager, but you create OUs by scripts.

  • OUs are security principals, meaning you assign access permissions to a resource based on membership to an organizational unit. Groups are for organization and for delegating permissions.

  • Organizational units are container objects made from the Active Directory Users and Computers console.

Explicación

Pregunta 26 de 71

1

What are the different kinds of groups?

Selecciona una de las siguientes respuestas posibles:

  • There are two types: security and distribution.

  • There are two types: security and distribution, and three group scopes: domain local, global, and universal.

  • There are three group scopes: domain local, global, and universal.

  • There are three group types: domain local, global, and universal.

Explicación

Pregunta 27 de 71

1

What command-line utility allows administrators to modify groups’ type and scope as well as add or remove members?

Selecciona una de las siguientes respuestas posibles:

  • PowerShell and the applicable cmdlet

  • Active Directory Users and Computers console

  • Active Directory Administrative Center

  • Dsmod.exe

Explicación

Pregunta 28 de 71

1

Which of the following types of files do Group Policy tools access from a Central Store by default?

Selecciona una de las siguientes respuestas posibles:

  • ADM files

  • ADMX files

  • Group Policy objects

  • Security templates

Explicación

Pregunta 29 de 71

1

Which of the following local GPOs takes precedence on a system with multiple local GPOs?

Selecciona una de las siguientes respuestas posibles:

  • Local Group Policy

  • Administrators Group Policy

  • Nonadministrators Group Policy

  • User-specific Group Policy

Explicación

Pregunta 30 de 71

1

Which of the following techniques can you use to apply GPO settings to a specific group of users in an OU?

Selecciona una de las siguientes respuestas posibles:

  • GPO linking

  • Administrative templates

  • Security filtering

  • Starter GPOs

Explicación

Pregunta 31 de 71

1

Which of the following best describes the function of a starter GPO?

Selecciona una de las siguientes respuestas posibles:

  • A starter GPO functions as a template for the creation of new GPOs.

  • A starter GPO is the first GPO applied by all Active Directory clients.

  • Starter GPOs use a simplified interface for elementary users.

  • Starter GPOs contain all of the settings found in the default Domain Policy GPO.

Explicación

Pregunta 32 de 71

1

When you apply a GPO with a value of Not Configured for a particular setting to a system on which that same setting is disabled, what is the result?

Selecciona una de las siguientes respuestas posibles:

  • The setting remains disabled.

  • The setting is changed to not configured.

  • The settings is changed to enabled.

  • The setting generates a conflict error.

Explicación

Pregunta 33 de 71

1

Local GPOs are stored ________, whereas Domain GPOs are stored _________.

Selecciona una de las siguientes respuestas posibles:

  • in Active Directory; in Active Directory

  • in Active Directory; on the local computer

  • on the local computer; in Active Directory

  • on the local computer; on the local computer

Explicación

Pregunta 34 de 71

1

By default, linking a GPO to a container causes all the users and computers in that container to receive the GPO settings. How can you modify the default permission assignments so that only certain users and computers receive the permissions and, consequently, the settings in the GPO?

Selecciona una de las siguientes respuestas posibles:

  • You cannot separate or divide permission assignments within the linked container.

  • You can create and link a different GPO to the applicable objects, overriding the previous GPO.

  • You remove the applicable objects and place in a new container.

  • You apply security filtering in the Group Policy Management console.

Explicación

Pregunta 35 de 71

1

When multiple GPOs are linked to a container, which GPO in the list has the highest priority?

Selecciona una de las siguientes respuestas posibles:

  • The last

  • The first

  • The most permissive

  • The most restrictive

Explicación

Pregunta 36 de 71

1

Group Policy settings are divided into two subcategories: User Configuration and Computer Configuration. Each of these two settings is further organized into three subnodes. What are the three subnodes?

Selecciona una de las siguientes respuestas posibles:

  • Software Settings, Windows Settings, and Delegation Templates

  • Software Settings, Windows Settings, and Administrative Templates

  • Security Settings, Windows Settings, and Delegation Templates

  • Security Settings, Windows Settings, and Administrative Templates

Explicación

Pregunta 37 de 71

1

What is the order in which Windows systems receive and process multiple GPOs?

Selecciona una de las siguientes respuestas posibles:

  • LSOUD (local, site, OU, and then domain)

  • LOUDS (local, OU, domain, and then site)

  • SLOUD (site, local, OU, and then domain)

  • LSDOU (local, site, domain, and then OU)

Explicación

Pregunta 38 de 71

1

What are the different types of Group Policy objects (GPOs)?

Selecciona una de las siguientes respuestas posibles:

  • Computer, user, and organizational unit

  • Local, domain, and starter

  • Local, domain, and universal

  • Site, domain, and organizational unit

Explicación

Pregunta 39 de 71

1

Installing Windows Server 2012 Active Directory Domain Services (AD DS) installs two default policies: Default Domain Policy and Default Domain Controller Policy. As an administrator, you need different policy settings than the default. What is the best approach to make those changes?

Selecciona una de las siguientes respuestas posibles:

  • Add new settings in the default policies as needed.

  • Create new GPOs to augment or override the existing default settings.

  • Change existing ones in the default policies as needed.

  • Link a new GPO using the AD DS role.

Explicación

Pregunta 40 de 71

1

If creating a local GPO, then a secondary GPO, then a tertiary GPO, what policy settings are included in each GPO?

Selecciona una de las siguientes respuestas posibles:

  • The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only Computer Configuration settings.

  • Each GPO contains both Computer Configuration and User Configuration settings.

  • All GPOs contain User Configuration settings.

  • The first GPO contains both Computer Configuration and User Configuration settings, whereas the secondary and tertiary GPOs contain only User Configuration settings.

Explicación

Pregunta 41 de 71

1

Group Policies applied to parent containers are inherited by all child containers and objects. What are the ways you can alter inheritance?

Selecciona una de las siguientes respuestas posibles:

  • Using the Enforce, Block Policy Inheritance, or Loopback settings.

  • Using Active Directory Administrative Center (ADAC) to block inheritance.

  • Inheritance can be altered by making the applicable registry settings.

  • Using the Enforce or Block Policy Inheritance settings.

Explicación

Pregunta 42 de 71

1

You are an administrator in a mixed environment of Windows Server 2012, Server 2008 R2 and desktops running Vista. You need different settings for users, based on their identities. Can you achieve this through multiple local GPOs?

Selecciona una de las siguientes respuestas posibles:

  • All these operating systems support for multiple local GPOs. However, some servers are standalone (non-AD DS) systems.

  • Yes, this is achievable through support by all OSs, regardless of whether standalone or whether members of an AD DS domain.

  • No, this is not achievable given the current environment.

  • No, this is not achievable until software is added.

Explicación

Pregunta 43 de 71

1

Which of the following tools would you use to deploy the settings in a security template to all of the computers in an Active Directory Domain Services domain?

Selecciona una de las siguientes respuestas posibles:

  • Active Directory Users and Computers

  • Security Templates snap-in

  • Group Policy Object Editor

  • Group Policy Management console

Explicación

Pregunta 44 de 71

1

Which of the following are local groups to which you can add users with the Windows Control Panel?

Selecciona una o más de las siguientes respuestas posibles:

  • Users

  • Power Users

  • Administrators

  • Nonadministrators

Explicación

Pregunta 45 de 71

1

Which of the following tools would you use to modify the settings in a security template?

Selecciona una de las siguientes respuestas posibles:

  • Active Directory Users and Computers

  • Security Templates snap-in

  • Group Policy Object Editor

  • Group Policy Management console

Explicación

Pregunta 46 de 71

1

The built-in local groups on a server running Windows Server 2012 receive their special capabilities through which of the following mechanisms?

Selecciona una de las siguientes respuestas posibles:

  • Security options

  • Windows Firewall rules

  • NTFS permissions

  • User rights

Explicación

Pregunta 47 de 71

1

After configuring and deploying the Audit Directory Service Access policy, what must you do before a computer running Windows Server2012 begins logging Active Directory access attempts?

Selecciona una de las siguientes respuestas posibles:

  • You must select the Active Directory objects you want to audit in the Active Directory Users and Computer console.

  • You must wait for the audit policy settings to propagate to all of the domain control- lers on the network.

  • You must open the Audit Directory Service Access Properties sheet and select all of the Active Directory objects you want to audit.

  • You must add an underscore character to the name of every Active Directory object you want to audit.

Explicación

Pregunta 48 de 71

1

What is the purpose of the Audit Policy section of a Local Group Policy objects (GPO)?

Selecciona una de las siguientes respuestas posibles:

  • Administrators can log successful and failed security events, such as logon events, database errors, and system shutdown.

  • Administrators can log successful and failed security events, such as loss of data, account access, and object access.

  • Administrators can log successful and failed events, forwarded from other systems.

  • Administrators can log events related specifically to domain controllers.

Explicación

Pregunta 49 de 71

1

What are the three primary event logs?

Selecciona una de las siguientes respuestas posibles:

  • Application, Forwarded, and System

  • Application, Security, and Setup

  • Application, Security, and System

  • Application, System, and Setup

Explicación

Pregunta 50 de 71

1

After you create a GPO that contains computer or user settings, but not both, what can you do for faster GPO processing?

Selecciona una de las siguientes respuestas posibles:

  • Set the priority higher for the configured setting area.

  • Manually refresh the GPO settings.

  • Disable the setting area that is not configured.

  • Regardless of whether part or all of a GPO is configured, the GPO is processed at the same speed.

Explicación

Pregunta 51 de 71

1

What are the two interfaces for creating and managing local user accounts for a computer joined to the domain?

Selecciona una de las siguientes respuestas posibles:

  • Control Panel and ADAC

  • User Accounts control panel and the Local Users and Groups snap-in for MMC

  • ADAC and the Active Directory of Users and Computers snap-in for MMC

  • Server Manager and PowerShell

Explicación

Pregunta 52 de 71

1

What did Microsoft introduce in Windows Server 2012 to ensure users with administra- tive privileges still operate routine tasks as standard users?

Selecciona una de las siguientes respuestas posibles:

  • New Group Policy and Local Security Policy

  • Secure desktop

  • User Account Control (UAC)

  • Built-in administrator account

Explicación

Pregunta 53 de 71

1

When would you need to create a user account through the Control Panel?

Selecciona una de las siguientes respuestas posibles:

  • You can create users through the Control Panel or with the Local Users and Groups snap-in.

  • You can create users through the Control Panel when the Windows Server 2012 computer is part of a workgroup.

  • When you join a computer to an Active Directory Domain Services (AD DS) domain, you can create only new local user accounts with the Local Users and Groups snap-in. Control Panel is while the computer is not a member of an AD DS domain.

  • Creating users through the Control Panel is not possible.

Explicación

Pregunta 54 de 71

1

What is the best approach for planning a security template strategy?

Selecciona una de las siguientes respuestas posibles:

  • Plan according to the needs of individual computers, not users.

  • Plan according to the needs of computer roles, and also company locations.

  • Plan according to the needs of computer roles, but not individual computers.

  • Plan according to the needs of users.

Explicación

Pregunta 55 de 71

1

What are the key benefits of security templates?

Selecciona una de las siguientes respuestas posibles:

  • Apply consistent, scalable, and reproducible security settings throughout an enterprise.

  • Deploy alongside with group policies.

  • Although a text editor is possible, Windows Server 2012 enables the use of a graphical interface.

  • Simple deployment as configuration files are text (.inf extension) and uses a graphical and unified interface.

Explicación

Pregunta 56 de 71

1

How are most Group Policy settings applied or reapplied?

Selecciona una de las siguientes respuestas posibles:

  • Every time a computer starts up

  • At the refresh interval

  • Whenever a user logs on

  • Whenever the domain controller is restarted

Explicación

Pregunta 57 de 71

1

What are the two interfaces available for creating and managing user accounts in Windows Server 2012?

Selecciona una de las siguientes respuestas posibles:

  • Control Panel and the MMC snap-in

  • Server Manager and Control Panel

  • Control Panel and Active Directory Users and Computers

  • User Accounts control panel and the Local Users and Groups snap-in for MMC

Explicación

Pregunta 58 de 71

1

Which of the following rule types apply only to Windows Installer packages?

Selecciona una de las siguientes respuestas posibles:

  • Hash rules

  • Certificate rules

  • Internet zone rules

  • Path rules

Explicación

Pregunta 59 de 71

1

Which file type is used by Windows Installer?

Selecciona una de las siguientes respuestas posibles:

  • .inf

  • .bat

  • .msf

  • .msi file

Explicación

Pregunta 60 de 71

1

Which of the following is not one of the Default Security Levels that can be used with a software restriction policy?

Selecciona una de las siguientes respuestas posibles:

  • Basic User

  • Unrestricted

  • Restricted

  • Disallowed

Explicación

Pregunta 61 de 71

1

As part of your efforts to deploy all new applications using Group Policy, you discover that several of the applications you wish to deploy do not include the necessary installer files. What can you use to deploy these applications?

Selecciona una de las siguientes respuestas posibles:

  • Software restriction policies

  • .msi files

  • .mdb files

  • .zap files

Explicación

Pregunta 62 de 71

1

Which of the following describes the mathematical equation that creates a digital “fingerprint” of a particular file?

Selecciona una de las siguientes respuestas posibles:

  • Hash rule

  • Hash algorithm

  • Software restriction policy

  • Path rule

Explicación

Pregunta 63 de 71

1

Which of the following rules will allow or disallow a script or a Windows Installer file to run on the basis of how the file has been signed?

Selecciona una de las siguientes respuestas posibles:

  • Path rule

  • Hash rule

  • Network zone rule

  • Certificate rule

Explicación

Pregunta 64 de 71

1

You want to deploy several software applications using Group Policy, such that the applications can be manually installed by the users from the Add/Remove Programs applet in their local Control Panel. Which installation option should you select?

Selecciona una de las siguientes respuestas posibles:

  • Assign

  • Disallowed

  • Publish

  • Unrestricted

Explicación

Pregunta 65 de 71

1

You have assigned several applications using GPOs. Users have complained that there is a delay when they double-click on the application icon, which you know is the result of
the application being installed in the background. What option can you use to pre-install assigned applications when users log on or power on their computers?

Selecciona una de las siguientes respuestas posibles:

  • Uninstall when the application falls out of scope

  • Install This Application At Logon

  • Advanced Installation Mode

  • Path rule

Explicación

Pregunta 66 de 71

1

Which of the following Default Security Levels in Software Restriction Policies will disallow any executable from running that has not been explicitly enabled by the Active Directory administrator?

Selecciona una de las siguientes respuestas posibles:

  • Basic User

  • Restricted

  • Disallowed

  • Power User

Explicación

Pregunta 67 de 71

1

When installing software using Group Policy, what file or files does an administrator use?

Selecciona una de las siguientes respuestas posibles:

  • Windows Installer package files, or .msi files. Modifications to the package files are transform files, or .mst files. Further, patch files are designated as .msp files.

  • Any approved software from Microsoft, including the Certified for Windows Server 2012 logo on the packaging.

  • Windows Installer package files, or .mst files. Modifications to the package files are instruction files, or .msi files.

  • Windows Installer packages that contain all the information about the software.

Explicación

Pregunta 68 de 71

1

You want to deploy software using Group Policy. What is necessary before deciding to Assign the software to your user accounts?

Selecciona una de las siguientes respuestas posibles:

  • You must create a Group Policy object (GPO) or modify an existing GPO. As part of configuring the GPO, you decide whether to Assign or Publish the application.

  • You create the GPO. Whether to Assign or Publish is decided elsewhere.

  • You must create a distribution share, also called a software distribution point. Then create the GPO, specifying how to deploy the application.

  • You decide whether to Assign or Publish the application. If using .zap files, you might need user intervention.

Explicación

Pregunta 69 de 71

1

If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should you avoid this method?

Selecciona una de las siguientes respuestas posibles:

  • If users have slow links between their workstations and the software distribution point

  • If computers are already under a very strict security policy and computer configuration

  • If users often take their computer home

  • If computers require administrative logon for each new package

Explicación

Pregunta 70 de 71

1

What does file-activated installation mean, and where is it utilized?

Selecciona una de las siguientes respuestas posibles:

  • When a user opens a file associated with an application that does not currently exist on the user’s workstation, the application is installed. It is used for both Publishing and Assigning an application to a user.

  • When a user logs on and the local computer has a file associated with an application that does not exist, the application is installed. It is used when Assigning an applica- tion to a user.

  • When a user opens a file associated with an application that does not currently exist on the user’s workstation, the application is installed. It is used when Assigning an application to a user.

  • When a user logs on and the local computer has a file associated with an applica- tion that does not exist, the application is installed. It is used when Publishing an application to a user.

Explicación

Pregunta 71 de 71

1

What is the most common way to implement software restriction policies?

Selecciona una de las siguientes respuestas posibles:

  • By configuring software restriction policies on individual computers by using Local Security Policy

  • Through Active Directory Users and Computers

  • Through GPOs linked to Active Directory Domain Services (AD DS) containers, so that you can apply their policy settings to several computers simultaneously

  • By using AppLocker, provided you apply to a computer running Windows 7 and Windows Server 2008 R2 or later

Explicación