Windows 70-411 Chapter Chapters

March 26, 2018 | Author: Srinivas Kumar | Category: Active Directory, Group Policy, Domain Name System, Radius, Microsoft Windows


Comments



Description

Final: 70-411 Chapter: Chapters 1-22Study online at quizlet.com/_u1t2v 1. ? AND * To copy, replace, update, or delete files, you can use wildcard characters. Which wildcard characters can you use? Select all that apply. 2. .ini files Which Windows extension allows you to add, replace, or delete sections or properties in configuration settings or setup information files? the access server Which system, in a RADIUS infrastructure, handles the switchboard duties of relaying requests to the RADIUS server and back to the client? an AccountingResponse to the access server What is the final step in the authentication, authorization, and accounting scenario between an access client and the RADIUS server? Active Which screening technique prevents a user from saving defined unauthorized files? Active Directory database The domain controllers are the computers that store and run the _______________. the Active Directory Recycle Bin What utility first appeared in Windows Server 2008 R2 that allows you to undelete Active Directory containers and objects? 25. an AD domain In addition to meeting operating system requirements, a DirectAccess client must be a member of what? 26. AD server Which of the following is an example of an SRV record? additional storage space required What is the primary disadvantage of DFS Replication? the ADM format for newer operating systems What is an ADMX file? 20. 21. 3. .msi What is the filename extension for the files in which installation information is stored? 4. .net Which of the following is an example of a top-level domain? 22. 5. 0 What setting can you give for account lockout duration that requires an administrator to manually unlock the account? 23. 6. 0 to 24 What is the range of password history settings? 24. 5 minutes What is the default maximum allowable time lapse between domain controllers and client systems for Kerberos to work correctly? 5,000 The default namespace mode is Windows Server 2008, which supports up to 50,000 folders. How many folders does using non-Windows Server 2008 provide? 7. 8. 27. 9. 7 What is the default minimum password length in characters? 10. 24 What is the default setting for password history? 11. 53 Which TCP/UDP port does the DNS service use to communicate? 12. 56 Before Windows 2008 R2, only nine basic audit settings existed. Windows Server 2012 introduces a total of how many audit subsettings? 29. Administrators What key length is considered to be minimally strong for encryption algorithms? What group must you be a member of to enable SMTP? 30. ADSI Edit 600 seconds What is the default timeout value for GPOs to process on system startup? Which tool can you use to add SPNs to an account? 31. All Computers 660 MB What is the default quota size of the Conflict and Deleted folder? By default, to which computer group are computers assigned in WSUS? 32. Allow Read AND Allow Apply A user must have which two existing permissions for new permissions to be applied to their accounts for GPO delegation? Allow Read AND Allow Apply For users to receive GPO settings, they must have which two permissions to the GPO? another WSUS server on your network WSUS can retrieve updates directly from Microsoft or from what other source? answer files What type of XML file do you need to create and add information to when performing an unattended operating system installation via WDS? 13. 14. 15. 16. 17. 18. 19. 80 1812 and 1813 Which ports do Microsoft RADIUS servers use officially? 2003 To use WMI filters, you must have one domain controller running which version of Windows Server or higher? 2008 AND 2008 R2 AND 2012 GPP can be configured on domain controllers running which version of Windows Server? Select all that apply. 8530 What is the default port number for WSUS synchronization? 28. 33. 34. 35. 37. canonical name or CNAME What is another designation for an Alias? 60. or OU has multiple GPOs. domain. how are the group policies processed? 57. Apply Group By default.com Which of the following is an example of a secondlevel domain? 54. 38. C:\Windows\PolicyDefinitions Where is the default location for ADMX files? 59. 63.wim What is the name of the Windows Server 2012 installation DVD boot image file? 55. similar in effect to read-only. 42. boot. 44. by precedence If a site. What can you do to change bidirectional replication into unidirectional? (Choose two. what command will encrypt files and folders? 50. balanced Round-robin DNS is a term that refers to what kind of distribution mechanism for DNS responses to queries? Be sure that you have a good backup. Audit policies might cause conflicts or erratic behavior. you have the option to do which one of the following? Assign the PSOs to a global security group and add users to the group.exe If you're a command-line user. C:\StorageReports\Scheduled By default. what file must you remove as part of the process? AuditPol. Anti-virus/antimalware servers AND Software update servers Identify two remediation server types. 47. Why should you avoid using basic audit policy settings and advanced audit policy settings together? audit. by cryptographic checksum How is data verified when transferred through the Internet? 56. BIOS Where in a system do you configure PXE? 53. 46. 43. or hidden? 39. bi-directional What kind of connectivity does DirectAccess establish between workstation and server? 52. 64. How should you assign Password Settings objects (PSOs) to users? 40. 45.exe authorization Which command do you use to manage auditing at the command prompt? What process determines what a user is permitted to do on a computer or on a network? automated networkbased installations based on network-based boot and installation media Windows Deployment Services (WDS) is a software platform and technology that allows you to perform which function? automatic password management AND simplified SPN management Name two benefits to using Managed Service Accounts (MSAs). 49. at least two How many global catalogs are recommended for every organization? 41. where are storage reports saved? 58. . AND Disable one of the connections.csv When resetting audit settings back to basic mode. which GPO permissions are all authenticated users given? apply the template to all derived file screens When you change a file template and save the changes. certificate What type of NPS authentication is recommended over password authentication? 62. centralized management What is the primary advantage of using Group Policies in a domain environment? 61. compression.) cipher.36. What critical step you should perform before applying patches or updates? because administrator accounts carry more security sensitivity than users do Why should administrator passwords change more often than user passwords? 51. attribute EFS encryption is what type of feature that can be enabled or disabled at will. a certificate authority Where do you get certificates for authentication purposes? Change share permissions. blah. 48. blah. 80. 88. Convert it to an MSI file 77. 67. 70. What is the most efficient way to deploy VPN (virtual private network) configurations to hundreds of users? decryption An encrypted file can be converted back to its original format by a process known as what? Default Domain Policy Which feature affects all users in the domain.65. Windows Installer cannot install .com. To distribute a software package that installs with an . 87. What happens if a client submits a service ticket request for an SPN that does not exist in the identity store? Client-side and Server-side targeting What two ways can you assign computers to groups in WSUS? a CNAME record If you have a server named server1. which group policy permission do you apply to a user or group? Distributed and Central You can configure Windows Server Update Service (WSUS) in one of two modes: Autonomous or Replica. 69. and have requests point to www. What are the two management types? DNS resolver What is another term for DNS client? Domain Administrator privileges AND the editor runs from the domain controller What are the two restrictions for adding SPNs to an account? domain administrators By default. What is the first step in the GPO processing order? The computer is isolated. 72.blah. a computer's overall health Network Access Protection (NAP) is Microsoft's software for controlling network access of computers based on what? 78. What is the most basic requirement for a DirectAccess implementation? Disallow Apply If you don't want a GPO to apply. 81. 83.exe files.exe file.com. Client May Request an IP Address AND Server Must Supply an IP Address Which two of the following are Routing and Remote Access IP settings? The client receives an access denied error. the computers are running Windows Update You should restrict access only for clients that don't have all available security updates installed if what situation exists? constraints When the Remote Access server finds an NPS network policy with conditions that match the incoming connection attempt. What other tasks can you perform with it? denies If a remote connection attempt does not match any configured constraints. Autonomous provides one type of management and Replica provides another. 86. 73. 82. want to use it as your web server. what does the Remote Access server do to the connection? determines the results of network location detection and the IPv6 addresses of the intranet DNS servers What does the netsh namespace show effectivepolicy command do? DHCP The initial configuration of WDS includes setup of what other server? The DirectAccess server must be part of an Active Directory domain. 79. the server checks any _______________ that have been configured for the policy. 75. what must you do to it? 84. 85. 66. including domain controllers? delete resource records You can use the dnscmd command to create zones. who has read/write capability to the Default Domain Policy? . 89. 68. 74. Create and distribute an executable file that contains all the settings. what kind of DNS record would you create? computer and user credentials How do the DirectAccess server and DirectAccess client authenticate each other? The computer establishes a secure link to the domain controller. 71. What happens to a computer that isn't running Windows Firewall? computer name AND CPU speed Which of the following are possible targets for individual preferences? Select all that apply. 76. 110. 111. it is stored in what format? the entire folder and its subtree Placing a quota limit on a folder applies that limit to what part of the folder? event receiving What function does a computer perform when it's issued the command wecutil qc? event subscription Microsoft's new Event Viewer allows you to collect events from remote computers and store them locally. 100. and universal groups What are the three types of groups in a domain? DSRM To perform an authoritative restore. 114. 113. What type of exemption can you set up on folders? 107. replication groups use what type of topology to replicate to all members of the group? Fully Qualified Domain Name What does the acronym FQDN stand for? Global Object Access Auditing Which auditing feature allows you to define computer-wide system access control lists for the file system or the registry? GPP Client-Side Extensions To support GPPs on older Windows versions (Server and Workstation). every 12 hours 102. how often does Active Directory "garbage collection" occur? Execute ipconfig /registerdns. Some exemptions might be required for certain groups to store otherwise restricted file types. When do you perform this task? dynamic driver provisioning Which feature of Windows Server allows you to add driver packages to WDS and then deploy them? editing local security policies What is the secpol. By default. such as the Internet? 98. 121. 92. 116. you have to install what component from Microsoft? group membership Which variable can be set to authorize or deny a remote connection? group MSAs By default.msc utility used for? Enable the Reliability Monitor. fault tolerance What is one of the primary advantages to using Active Directory to store DNS information? 103. encapsulation What term is defined as private data placed in a packet with a header containing routing information that allows the data to traverse a transit network. domain administrators Which domain users are automatically granted permissions to perform Group Policy Management tasks? domain local groups.90. folder You can encrypt individual files. encrypted After a file has been encrypted. which service accounts will the Windows PowerShell cmdlets manage? Group Policy Editor Which utility do you use to access advanced audit policy settings? Group Policy Management Editor Which utility do you use to create GPO preferences? hierarchical distributed What type of structure does DNS have? High levels of auditing can affect system performance. File Screening What technology did Microsoft develop to combat the storage of storage-using and potentially illegal files on corporate servers? 108. you must establish a performance baseline. 99. global groups. 93. file screen exception 106. 112. 120. 119. 115. How can you force a system to update its DNS record? 104. 117. What do you need to do if you run the Reliability Monitor but it is blank? 97. F6 For GPP editing states. which key do you use to toggle Enable Current? 105. 109. 96. 122. 94. but Microsoft recommends encrypting at what level? for enhanced security Why would you set Verify Caller ID on a remote dial-up connection for a user? for light traffic on small networks When is it appropriate to use Windows Server 2012 as a router between two networks? forward lookup zone Which type of DNS zone resolves host names to IP addresses? full mesh By default. Why is choosing what to audit. . instead of auditing everything that a user does. a good idea? history AND length AND complexity AND age What are examples of password policies? Select all that apply. 91. By what name is this collection of events known? 95. 118. 101. into what mode must you reboot the domain controller? during normal usage To examine performance correctly. ADMX files are not stored where? in Security logs in Event Viewer Where can you view audit events? in the SYSVOL directory Where is the Central Store located? inheritance The downward flow of group policies is known as what feature of GPOs? 123. individual computer or other network device in a domain is known as what? how IP addresses are assigned What is the last setting in the Routing and Remote Access IP settings? how many days a user must wait before a password reset What does the minimum password age setting control? hub/spoke Which replication topology is more efficient than the default replication topology and allows you to set bandwidth. 124. IKEv2 Which VPN protocol provides constant connectivity? 130. 127. 136. security updates. 128. 126. IP addresses The Domain Name System (DNS) works much like a phone book to associate URLs (names) with what kinds of numbers? 140. AND It means that you've disabled password aging. 125. IPv6 DHCP enforcement is not available for what kind of clients? 143. as well as additional fixes for problems found internally since the release of the product. in a remote site Where are you most likely to see a Read-Only Domain Controller (RODC)? 131. what mode do you place the policy in? It exports/imports Active Directory information. ipconfig /all Which command do you use to verify local DNS settings? 142. 144. and updates. the client tries to connect using what protocol? 141. IP-HTTPS If the client cannot reach the DirectAccess server using 6to4 or Teredo tunneling. What two things must you do to a Windows Server to convert it to a domain controller? Internet DirectAccess is for clients connected to which network? Internet Explorer proxy settings If Windows Update fails to retrieve updates. timing. 135. and directionality to your configuration? if they've become corrupted AND if someone deleted one of the policies Why would you ever want or need to reset the domain policy and the domain controller policy to the default settings? Select all that apply. cumulative set of hotfixes. Install Active Directory Domain Services (AD DS). It places you into nslookup's interactive mode. What does issuing the nslookup command with no parameters do on your system? 138. 134. 132. what should you check first? 145. 148. AND Execute dcpromo from Server Manager.host A specific. What effect does using quotas in File Server Resource Manager have? It means that passwords never expire. isolation When you fully engage NAP for remediation enforcement. . which is a major security problem. Intra-Site Automatic Tunnel Addressing Protocol What does the acronym ISATAP stand for? 139. if your users have laptop computers and work from home or office When would you want to use a split tunnel for users? 129. 147. What function does the CSVDE tool perform? It is a tested. critical updates. Why is a setting of 0 for maximum password age not a good idea? Check all that apply. in individual GPOs Unlike ADM files. 137. 146. 133. What is the definition of a service pack? It limits the number of gigabytes allocated to a volume or folder. necessary resource entries A stub zone is a zone copy that contains only what type of records? net start wuauserv Which of the following is the proper method of starting the Windows Update service? netsh What command-line utility is used to import and export NPS templates? netsh nap client show state To verify a NAP client's configuration. 175. why do you include the /oobe parameter? It removes a system's name and SID. 156. 150. 174. 161. metadata cleanup Which of the following ntdsutil commands cleans up metadata? 169. DNS follows what kind of model? the NAP Server Event Viewer Where do you look to find out which computers are blocked and which are granted access via NAP? NAP-compliant AND NAPnoncompliant Health policies are in pairs. loopback What kind of group policies should you enable for student computers? low-level database corruption In interactive mode. What happens if you move unencrypted files into an encrypted folder? nonauthoritative If a single domain controller's AD database becomes corrupt. Domain. 179. what does an AAAA record do? 168. changed. MS-CHAPv2 Which authentication protocol allows you to change an expired password during the connection process? 172. multi-master By using the Active Directory's integrated zone. Logon/Logoff What type of audit event notifies you that an account failed to log on? 165. minimal When creating service accounts. 178. 163. MPPE 128-Bit Which of the following is the strongest type of encryption? 171. 182. you should follow the rule of what type of rights and permissions? 170.149.exe) perform on a system? It replicates deleted. 177. 151. which command would you run? network policies AND connection request policies Health policies are connected to what two other policies? Network Policy Server What is a RADIUS server known as in Microsoft parlance? The new files become encrypted. last-writer wins What type of resolution model does DFS Replication use to resolve simultaneous-write conflicts? 164. 159. and corrupted files. What is the primary advantage of a caching-only DNS server? It's used to boot to a WDS Server to install a preinstallation environment. What role does preboot execution environment (PXE) play in WDS? item-level targeting Which term describes changing the scope of individual preference items so that the preference items apply only to selected users or computers? its distinguished name To perform an authoritative restore of an object or subtree. DFS Replication does not replace the need for backups because of what feature of replication? It speeds DNS queries by building a DNS request cache. 173. OU In which order are Group Policy objects (GPOs) processed? locally Where is the default connection policy set to process all authentication requests? 176. what bit of information do you need to know about the object? Keyword Filters AND Requirements Filters Which of the following are legitimate Administrative Template Property Filters? Select all that apply. the length of time a record remains in DNS cache What does Time to Live (TTL) mean in DNS parlance? Local group policy. 167. 162. logon AND object searches AND universal group membership . 154. which type of restore should you perform on it? 166. Site. It presents the Windows Welcome Wizard on the next boot. What function does the System Preparation Utility (Sysprep. locally connected computers Which computers are not affected by VPN enforcement? 180. 152. what aspect of AD can you check with the ntdsutil integrity command? maps a host name to a single IPv6 address If an A record maps a host name to an IP address. 157. 153. What are the members of the pair? Select two. What are the reasons for keeping that partial copy? Select all that apply. When using sysprep on the master computer. 158. 155. log viewer The Event Viewer is essentially what kind of tool? 181. 160. The global catalog stores a partial copy of all objects in the forest. 183. on bootable media Where do you place a discover image to ensure proper deployment? 209. nslookup 192. 189. Why is the user never aware of the processing? The PTR record doesn't exist. but then issue nslookup server1 and receive 192. one How many WMI filters can be configured for a GPO? 210.Not Configured AND Enabled AND Disabled Identify all possible states of an Administrative Template. how many other groups may a computer be assigned to in WSUS? Operations Master Which Active Directory object is defined as a specialized domain controller that performs certain tasks so that multimaster domain controllers can operate and synchronize properly? 186.exe so that you can update it? 208.1. priority Which parameter specifies the order of importance of the RADIUS server to the NPS proxy server? Privilege Use Shutting down the system is an example of what kind of audit event? process What term describes an instance of a program being executed? Processing is hidden from the user. if needed. PPTP Of the four VPN tunneling protocols. GPOs are processed on computer startup and after logon. 201.50 Which one of the following is correct for querying a PTR record? NT LAN Manager What does the acronym NTLM stand for? ntdsutil Which utility do you use to defragment Active Directory? NTFS and shared folder permissions How do you secure DFS Namespaces? 190. 206. offline How do you mount a Windows image using Dism. out-of-band patches What kind of updates are released on an as-required basis and are not part of the standard release cycle? PAP Which authentication method is weakest (least secure)? pass all SHV checks To use the NAP-compliant policy. a connection request is sent to what system? 185. 213. Which of the following are legitimate subsets of account policies? Check all that apply. What is a back-links file? referral What term is defined as "an ordered list of servers or targets that a client computer receives from a domain controller or namespace server when the user accesses a namespace root or a DFS folder with targets"? 203. 194.50 and get no response. 184. 212. one How many PDC Emulators are required. which has the weakest encryption? 202.50 as a response. 204. you are recommended to use what built-in feature to assist you? RADIUS The default connection request policy uses NPS as what kind of server? the RADIUS accounting server Which system is the destination for Accounting-Start messages? a RADIUS proxy server What kind of RADIUS server is placed between the RADIUS server and RADIUS clients? RADIUS server To configure RADIUS service load balancing.168. 199. 192. one Other than the default computer group. 193. 188.1. the NPS server When an access client contacts a VPN server or wireless access point. 211. 215.168. 198. NTLM What is the default authentication protocol for non-domain computers? 191. . If you issue the command nslookup 192.1. 214.168. you must have more than one kind of what system per remote RADIUS server group? read-only What type of Active Directory domain controller is recommended to minimize security risks for remediation servers? recording user's actions Auditing is used for what purpose? a reference to an attribute within another object When you do an authoritative restore process. in a domain? 195. 205. 187. 196. you need to install _________ to install NAP. 197. what do you know is wrong? quick glance Task Manager is not a definitive performance tool because it gives you what kind of look at computer performance? quota template When you create quotas. the client must do what? Password Policy AND Account Lockout Policy AND Kerberos Policy Account policies contain various subsets. 207. 200. NPS. 216. NPS Because NAP is provided by _________. a back-links file is created. What types of tasks can you add to events? sending a password to the server NTLM uses a challenge-response mechanism for authentication without doing what? Server Settings Determine IP Address Assignment Which Routing and Remote Access IP setting is the default setting? servers On what type of computer is BitLocker not commonly used? 232. what DNS objects must you create? role What type of service is the Windows File Server Resource Manager? 237. and display a message. 246. 244. which DFS feature can you disable? Removable Storage Access Replace AND Delete Save useful event filters as custom views that can be reused. 238. limit.217. schema When you add attributes to an Active Directory object. 242. 230. 227. Which of the following tasks does the Event Viewer MMC snap-in allow you to perform? 233. 218. 241. start a program. Registry Which Windows extension allows you to copy registry settings and apply them to other computers? create. . 220.microsoft. 245. or deny a user's ability to use removable storage devices such as USB drives in Windows Server 2012? When working with Network Drive Mapping Preferences. What is that feature? reverse lookup zones Before creating PTR records. After you undelete a user account with the LDP utility. 226. sales.com Which one of the following is an example of an FQDN? 243. what action do you need to perform? Restartable Active Directory Domain Services Windows Server 2012 introduces a new time-saving feature when performing tasks such as AD defragmentation. How do you stop processing a preference if an error occurs? Send an email. 221. 225. 240. what part of the domain database are you actually changing? seamless and always on What kind of connectivity does DirectAccess provide between client computers and network resources? secret key Kerberos security and authentication are based on what type of technology? a secure network authentication protocol What type of protocol is Kerberos? security Why primarily are account lockout policies put into place? Security Center AND NAP Agent Which two components must a NAP client have enabled in order to use NAP? security group filter AND WMI filter Which two filters can you use to control who or what receives a group policy? seize schema master AND seize PDC Which of the following commands issued at the fsmo maintenance prompt would successfully seize the role of an Operations Master Holder? Select all that apply. 222. 219. which component must you install on each system on your network? 234. safe What's the status of your data if someone has your public key? 231. 229. a repository for Administrative Templates What is the Central Store? Reset the user's password. replace. Identify all that apply. By using what type of policy can you track. or delete registry settings? Registry AND Shortcuts AND Folders Windows Settings has multiple preference extensions. the Registry Wizard Which component allows you to create multiple Registry preference items based on registry settings that you select? Remote Access Management Console What utility do you use to configure DirectAccess? remote differential compression (RDC) What compression algorithm does Microsoft use to limit the amount of bandwidth used in DFS Replication? remote differential compression (RDC) If you want to save on CPU and disk I/O but consume more network bandwidth for replication. 224. Select the Stop processing items option on the Common tab. 235. the SCCM agent To get the full capability of SCCM. 239. 236. 228. which preference behaviors delete drive mappings? Select all that apply. 223. What should you do before approving updates to be installed? that all User Rights Assignments will be replaced When you're about to reset domain policy and domain controllers policy back to default with the dcgpofix. Storage Reports What FSRM feature can you use to show the state of file server volumes. targets What are DFS Namespace shared folders referred to in relation to the virtual folders? 268. 256.exe command. 251. 248. Shared Secrets AND Health Policies AND RADIUS Clients Identify the correct NPS templates. Select all that apply. 261. 266. What type of special cache folder does each replication folder use to hold files ready to be replicated? What is an easy method of creating a strong password? 262. host name. 253. service What type of account is an account under which an operating system. What is the name of this range of numbers? staging folder Start with a sentence and then add numbers and special characters. 255. sysprep What utility must you run on a cloned system to ensure that the clone receives its own SID? System Image Manager (SIM) What Microsoft tool do you use to create and manage Windows setup answer files? System Services AND Registry Permissions AND File System Permissions The Security template allows you to configure which of the following settings? Select all that apply. . 272. 259. what final warning are you given before you accept the change? that you might have a bottleneck What can Task Manager tell you about performance? They allow you to break up larger domains into smaller. 275. and disallowed files? 263. shows the NRPT rules as configured on the group policy What does the netsh namespace show policy command do? Simple Mail Transfer Protocol What does the acronym SMTP stand for? small Windows Updates. or service runs? service class. 271. 274. especially the Automatic Updates feature of Windows Updates. 252. WSUS allows you to automatically approve every update. symmetric Single-key encryption is also known as what kind of encryption? 264. process.247. 260. 258. templates Using what feature can streamline the creation and setup of RADIUS servers? Test the updates on your own systems before approving for rollout. more manageable ones. which GPP would you use? Select all that apply. 257. are for what kind of environments? so that you can focus on important audit items What is the purpose of implementing new audit subsettings? SOA record Which DNS record contains the serial number for the zone? speed and load between sites and the number of clients The number of WSUS servers you need is determined by the number of sites you have and what two other factors? Stability Index The Reliability Monitor provides a range of numbers to help you evaluate the reliability of a computer. Why are phone lines and ISDN not used today for remote access services (RAS)? 265. quotas. and port number Which three components make up a service principal name (SPN)? services and processes Resource Monitor is a powerful tool for understanding how your system resources are used by what two system consumers? setspn Identify another utility that you can use to add SPNs to an account. but you shouldn't necessarily do that. 250. 254. 249. Shortcut AND Drive Maps If you need to provide users access to a common network location. What is one advantage of subdomains? They deploy customized software installation files What are MST files used for? They no longer supply acceptable bandwidth. 273. 267. templates What feature can you use to simplify the management of file screens? 269. 270. . 294. 280. 277. Why is password-based authentication not recommended? using Active Directory GPOs AND using the Security Configuration and Analysis snap-in Which two of the following methods can you use to deploy security templates? using strong passwords AND granting the least rights possible When creating accounts for operating systems. 283. What is the proper procedure for removing a domain controller from Active Directory? a unique identifier for a snapshot What is a GUID? unreadable Encryption is the process of converting data into what kind of format? Use separate accounts for both services. 295. 304. to grant access to a user Authorization is used for what purpose? to notify users that they have reached the quota limit What is the purpose of setting soft quotas? to provide user information in case of a compliance failure Why do you need a web server as part of your NAP remediation infrastructure? to store passwords in a non-readable format What is one purpose of using hash function encryption? to verify a user's identity Authentication is used for what purpose? Transport Server and Deployment Server Which two role services does the WDS Role include? Trusted Platform Module What built-in computer hardware feature makes BitLocker Drive Encryption far more secure than other forms of folder or file-based encryption? What information does the Accounting-Start message contain? Uninstall Active Directory Domain Services. 285. 281. 289. What special hardware configuration should a RAS server have? 301. 279. What would be the purpose of that report? to analyze the cumulative effect of GPOs AND for GPO troubleshooting What is the primary purpose of running the Group Policy Results Wizard? Check all that apply. 296. processes. you should always configure them with what two things in mind? 299. 287. What happens to files and subfolders within an EFS encrypted folder? through the use of RIP How are routing tables created dynamically? To allow you to archive unused files You can generate several different reports from FSRM. 298. what rule should you follow when creating service accounts? Usernames and passwords are sent in plain text. 288. and services. They're encrypted with the parent folder. two Public-key cryptography uses how many keys? two consecutive public IP addresses Windows Server 2012 varies from the Windows Server 2008 R2 implementation in that it does not require which one of the following? Two minutes When you set a service to start automatically with delayed start. Why use a VPN for client-toserver connections over the Internet? 300. 303. 293. If you install SQL Server and a third-party backup service on the same system. 282.276. VPN traffic is encrypted. 278. web What type of server is the network location server (NLS)? when the policy is processed At what point are WMI filters evaluated? when the source NPS database has a higher version number than the version number of the destination NPS database When should you not use the command-line method of exporting and importing the NPS configuration? where the namespaces are stored What is the primary difference between domain-based namespace and stand-alone namespace? who is authorized to connect AND the connection circumstances for connectivity Network policies determine what two important connectivity constraints? 292. 297. One of them gives you a list of Least Recently Accessed Files. 302. how long is the delay? two network interface cards the type of service and the user it's delivered to 291. 290. 284. 286. 321.who. 318. 315.0 is based on which operating system? Windows Assessment and Deployment Kit (ADK) To convert a discover image to a bootable ISO image. and removal of software on Windows? 312. XML To which type of file do you export an NPS configuration? You can't ping that interface. AND You have to set the AD forest to Windows Server 2008 R2 or higher. You have to enable the AD Recycle Bin. You do not place the infrastructure master on a global catalog server unless what situation exists? 305. when. What is the result of enabling security on the RRAS interface in your RAS server? You have a single domain. 319. Windows 7/Windows Server 2008 R2 DirectAccess was introduced with which workstation/server pair? Windows 8 Windows PE 4. 310. 320. Windows Installer What is the name of the software component used for installation. Windows Server 2003 Which version of Windows Server introduced incremental universal group membership replication? 313. 306. XML What language are ADMX files based on? 317. what two actions do you have to perform? the zone serial number A Start of Authority record specifies what kind of information about a zone? . Before you can use the Active Directory Recycle Bin. maintenance. 309. 308. and how An NPS policy is a set of permissions or restrictions that determine what three aspects of network connectivity? Windows 7 AND Windows 8 Which of the following operating systems can have its security settings managed by using security templates? Select all that apply. Windows Server 2012 Beginning with which server version can you safely deploy domain controllers in a virtual machine? writable domain controller Which type of system must you connect to and use to make changes to Active Directory? 316. Windows Server 2008 Which one of the following operating systems may not act as a DirectAccess client? 314. 311. what nonincluded component do you need to download and install? Windows Firewall applet AND Documents folder AND Microsoft Excel AND Printer Which items can you configure shortcuts to in performing GPP deployments? Select all that apply. 307.
Copyright © 2024 DOKUMEN.SITE Inc.