Documente Academic
Documente Profesional
Documente Cultură
? AND *
2.
.ini files
the access
server
an AccountingResponse to the
access server
Active
Active
Directory
database
the Active
Directory
Recycle Bin
25.
an AD domain
26.
AD server
additional
storage space
required
the ADM
format for
newer
operating
systems
20.
21.
3.
.msi
4.
.net
22.
5.
23.
6.
0 to 24
24.
5
minutes
5,000
7.
8.
27.
9.
10.
24
11.
53
12.
56
29.
Administrators
30.
ADSI Edit
600
seconds
31.
All Computers
660 MB
32.
Allow Read
AND Allow
Apply
Allow Read
AND Allow
Apply
another WSUS
server on your
network
answer files
13.
14.
15.
16.
17.
18.
19.
80
1812 and
1813
2003
2008
AND
2008 R2
AND
2012
8530
28.
33.
34.
35.
36.
37.
38.
Apply Group
40.
at least two
41.
attribute
39.
42.
43.
44.
45.
46.
47.
48.
49.
audit.csv
AuditPol.exe
authorization
automatic password
management AND
simplified SPN
management
balanced
because administrator
accounts carry more security
sensitivity than users do
Why should
administrator passwords
change more often than
user passwords?
51.
bi-directional
52.
BIOS
53.
blah.com
54.
boot.wim
55.
by cryptographic checksum
56.
by precedence
If a site, domain, or OU
has multiple GPOs, how
are the group policies
processed?
57.
C:\StorageReports\Scheduled
58.
C:\Windows\PolicyDefinitions
59.
What is another
designation for an Alias?
60.
centralized management
61.
certificate
62.
a certificate authority
cipher.exe
If you're a command-line
user, what command will
encrypt files and folders?
50.
63.
64.
65.
66.
67.
68.
69.
70.
71.
72.
73.
74.
75.
76.
Client May
Request an IP
Address AND
Server Must
Supply an IP
Address
The client
receives an
access denied
error.
Client-side and
Server-side
targeting
a CNAME
record
computer and
user
credentials
The computer
establishes a
secure link to
the domain
controller.
The computer
is isolated.
computer
name AND
CPU speed
a computer's
overall health
78.
79.
80.
81.
82.
83.
the computers
are running
Windows
Update
constraints
Convert it to an
MSI file
77.
84.
85.
86.
87.
88.
89.
Create and
distribute an
executable file that
contains all the
settings.
decryption
Default Domain
Policy
delete resource
records
denies
determines the
results of network
location detection
and the IPv6
addresses of the
intranet DNS
servers
DHCP
The DirectAccess
server must be
part of an Active
Directory domain.
Disallow Apply
Distributed and
Central
DNS resolver
Domain
Administrator
privileges AND the
editor runs from
the domain
controller
domain
administrators
90.
91.
92.
93.
94.
domain
administrators
domain local
groups, global
groups, and
universal
groups
DSRM
during normal
usage
dynamic driver
provisioning
editing local
security
policies
Enable the
Reliability
Monitor.
97.
encapsulation
98.
encrypted
the entire
folder and its
subtree
event receiving
event
subscription
95.
96.
99.
100.
101.
Execute
ipconfig
/registerdns.
104.
F6
105.
fault tolerance
103.
107.
File Screening
108.
folder
for enhanced
security
forward lookup
zone
full mesh
Fully Qualified
Domain Name
Global Object
Access
Auditing
GPP Client-Side
Extensions
group
membership
group MSAs
Group Policy
Editor
Group Policy
Management
Editor
hierarchical
distributed
High levels of
auditing can
affect system
performance.
history AND
length AND
complexity
AND age
109.
110.
111.
112.
every 12 hours
102.
file screen
exception
106.
113.
114.
115.
116.
117.
118.
119.
120.
121.
122.
host
hub/spoke
if they've become
corrupted AND if
someone deleted one
of the policies
129.
IKEv2
130.
in a remote site
131.
in individual GPOs
in Security logs in
Event Viewer
in the SYSVOL
directory
inheritance
123.
124.
125.
126.
127.
128.
139.
IP addresses
140.
IP-HTTPS
141.
ipconfig /all
Which command do
you use to verify local
DNS settings?
142.
IPv6
DHCP enforcement is
not available for what
kind of clients?
143.
isolation
It exports/imports Active
Directory information.
Why is a setting of 0
for maximum
password age not a
good idea? Check all
that apply.
138.
144.
132.
133.
134.
135.
136.
137.
Install Active
Directory Domain
Services (AD DS).
AND Execute
dcpromo from
Server Manager.
Internet
Internet Explorer
proxy settings
145.
146.
147.
148.
149.
150.
151.
152.
153.
154.
155.
It presents the
Windows Welcome
Wizard on the next
boot.
It removes a
system's name and
SID.
It replicates
deleted, changed,
and corrupted
files.
It speeds DNS
queries by building
a DNS request
cache.
item-level targeting
its distinguished
name
Keyword Filters
AND Requirements
Filters
last-writer wins
164.
Logon/Logoff
165.
loopback
low-level database
corruption
168.
metadata cleanup
169.
minimal
170.
MPPE 128-Bit
171.
MS-CHAPv2
172.
multi-master
NAP-compliant
AND NAPnoncompliant
necessary
resource entries
net start
wuauserv
netsh
network policies
AND connection
request policies
Network Policy
Server
nonauthoritative
166.
167.
173.
174.
156.
175.
157.
158.
159.
160.
161.
162.
163.
locally
176.
177.
178.
179.
locally connected
computers
180.
log viewer
181.
182.
Not Configured
AND Enabled
AND Disabled
184.
185.
NPS, NPS
183.
201.
PPTP
202.
priority
Privilege
Use
process
Processing
is hidden
from the
user.
The PTR
record
doesn't
exist.
quick
glance
quota
template
RADIUS
the
RADIUS
accounting
server
a RADIUS
proxy
server
RADIUS
server
read-only
recording
user's
actions
a reference
to an
attribute
within
another
object
referral
203.
204.
nslookup
192.168.1.50
NT LAN
Manager
ntdsutil
NTFS and
shared folder
permissions
190.
NTLM
191.
offline
208.
on bootable
media
209.
193.
one
210.
194.
one
195.
one
Operations
Master
186.
187.
188.
189.
192.
205.
206.
207.
211.
212.
196.
197.
198.
199.
200.
out-of-band
patches
PAP
Password
Policy AND
Account
Lockout Policy
AND Kerberos
Policy
213.
214.
215.
216.
217.
218.
219.
220.
221.
222.
223.
224.
225.
226.
227.
228.
229.
Registry
Registry AND
Shortcuts AND
Folders
Remote Access
Management
Console
remote differential
compression (RDC)
remote differential
compression (RDC)
Removable Storage
Access
Save useful
event filters as
custom views
that can be
reused.
233.
234.
schema
seamless and
always on
secret key
a secure
network
authentication
protocol
security
Security Center
AND NAP
Agent
security group
filter AND
WMI filter
seize schema
master AND
seize PDC
Send an email,
start a
program, and
display a
message.
sending a
password to
the server
Server Settings
Determine IP
Address
Assignment
servers
232.
235.
236.
a repository for
Administrative
Templates
Restartable Active
Directory Domain
Services
reverse lookup
zones
role
237.
238.
239.
240.
241.
242.
230.
safe
231.
sales.microsoft.com
243.
244.
245.
246.
247.
248.
249.
250.
251.
252.
253.
254.
255.
256.
257.
258.
259.
260.
261.
service
services and
processes
setspn
Shared Secrets
AND Health
Policies AND
RADIUS Clients
Shortcut AND
Drive Maps
Simple Mail
Transfer Protocol
small
SOA record
Stability Index
staging folder
Start with a
sentence and then
add numbers and
special
characters.
262.
Storage Reports
263.
symmetric
264.
sysprep
System Image
Manager (SIM)
System Services
AND Registry
Permissions
AND File System
Permissions
267.
targets
268.
templates
269.
templates
They deploy
customized
software
installation files
They no longer
supply
acceptable
bandwidth.
265.
266.
270.
271.
272.
273.
274.
275.
276.
277.
278.
279.
280.
281.
282.
283.
284.
285.
286.
287.
288.
289.
290.
They're encrypted
with the parent
folder.
To allow you to
archive unused
files
to analyze the
cumulative effect
of GPOs AND for
GPO
troubleshooting
to grant access to
a user
to notify users
that they have
reached the quota
limit
to provide user
information in
case of a
compliance
failure
to store
passwords in a
non-readable
format
to verify a user's
identity
Transport Server
and Deployment
Server
Trusted Platform
Module
What is a GUID?
unreadable
Usernames and
passwords are sent in
plain text.
Why is password-based
authentication not
recommended?
299.
300.
web
who is authorized to
connect AND the
connection circumstances
for connectivity
292.
293.
294.
295.
296.
297.
298.
two
two consecutive
public IP
addresses
Two minutes
two network
interface cards
291.
301.
302.
303.
304.
Windows 7 AND
Windows 8
Windows 7/Windows
Server 2008 R2
Windows 8
Windows Assessment
and Deployment Kit
(ADK)
Windows Firewall
applet AND
Documents folder
AND Microsoft Excel
AND Printer
311.
Windows Installer
312.
313.
314.
writable domain
controller
316.
XML
317.
XML
305.
306.
307.
308.
309.
310.
315.
318.
319.
320.
321.
A Start of Authority
record specifies what
kind of information
about a zone?