Sunteți pe pagina 1din 11

70-411 Test Bank, Lesson 20 Configuring Group Policy Settings

15 Multiple Choice
6 Short Answer
4 Best Answer
4 Build List
4 Repeated Answer
33 questions

Multiple Choice
1. Which of the following operating systems can have its security settings managed
by using security templates? Select all that apply.
a. Windows XP
b. Windows Vista
c. Windows 7
d. Windows 8
Answer: c and d
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: Each computer running Windows 7 and 8 and any computer running
Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2
maintains a collection of security settings that can be managed by using the local
GPO.
2. Which two of the following methods can you use to deploy security templates?
a. using Active Directory GPOs
b. using the Security Configuration and Analysis snap-in
c. copying a text file to each managed computers admin$ share
d. using a logon script
Answer: a and b
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: You can deploy security templates using Active Directory group policy
objects and the Security Configuration and Analysis snap-in.
3. What is an ADMX file?

a. an ADM file translator


b. the ADM format for newer operating systems
c. a template buffer
d. the protocol that deploys ADM files across networks
Answer: b
Difficulty: Easy
Section Ref: Converting Administrative Templates Using ADMX Migrator
Explanation: Although Windows XP and Windows Server 2003/Windows Server 2003
R2 use ADM files, Windows Vista, Windows 7, Windows 8, Windows Server
2008/Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2
users use ADMX files.
4. What is the Central Store?
a. an App Store from which you can deploy GPOs
b. a public share that allows users to place GPO requests into a queue
c. a repository for Administrative Templates
d. an online App Store for Administrative Templates
Answer: c
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: ADMX files can be stored in a single location called the Central Store.
5. Which of the following are legitimate Administrative Template Property Filters?
Select all that apply.
a. Keyword Filters
b. Requirements Filters
c. Security Filters
d. Operating System Filters
Answer: a and b
Difficulty: Hard
Section Ref: Configuring Property Filters for Administrative Templates
Explanation: To filter the settings displayed, you can select or deselect the following
filter options: Managed or Non-Managed settings, Configured or Not Configured,
Keyword Filters, and Requirements Filters.
6. What is the name of the software component used for installation, maintenance,
and removal of software on Windows?
a. Control Panel
b. Add/Remove Programs applet
c. Windows Installer
d. Application Installer

Answer: c
Difficulty: Easy
Section Ref: Performing Software Installation Using Group Policies
Explanation: The Windows Installer is a software component used for the
installation, maintenance, and removal of software on Windows.
7. What is the filename extension for the files in which installation information is
stored?
a. .txt
b. .xml
c. .ini
d. .msi
Answer: d
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies
Explanation: The installation information for software is stored in a Microsoft
Software Installation (MSI) file in a database installation file with an .msi filename
extension.
8. What are MST files used for?
a. They deploy customized software installation files
b. They are template files for software packages
c. They are custom patch files
d. They specialize in software installation test files
Answer: a
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies
Explanation: MSI Transform files are used to deploy customized MSI files.
9. Windows Installer cannot install .exe files. To distribute a software package that
installs with an .exe file, what must you do to it?
a. Convert it to a ZIP file
b. Convert it to an MSI file
c. Convert it to an MSP file
d. Convert it to an MST file
Answer: b
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies

Explanation: Windows Installer cannot install .exe files. To distribute a software


package that installs with an .exe file, you must convert the .exe file to an .msi file
by using a third-party utility.
10. The Security template allows you to configure which of the following settings?
Select all that apply.
a. System Services
b. Registry Entries
c. Registry Permissions
d. File System Permissions
Answer: a, c, and d
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: The Security template allows you to configure the following policies
and settings: Account Policies Specify, Local Policies, Event Log Policies, Restricted
Groups, System Services, Registry Permissions, and File System Permissions.
11. Where is the default location for ADMX files?
a. C:\Windows\SYSVOL\ADMX
b. C:\Windows\System32\XML\ADMX
c. C:\Windows\Inf
d. C:\Windows\PolicyDefinitions
Answer: d
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: By default, ADMX files are stored in the Windows\PolicyDefinitions
folder, but they can be stored in a central location in the SYSVOL label.
12. Identify all possible states of an Administrative Template.
a. Not Configured
b. Enabled
c. Disabled
d. Deployed
Answer: a, b, and c
Difficulty: Medium
Section Ref: Managing Administrative Templates
Explanation:
When configuring Administrative Templates, there are three states:

Not Configured: The registry key is not modified or overwritten.

Enabled: The registry key is modified by this setting.


Disabled: The Disabled settings undo a change made by a prior Enabled
setting.
13. What language are ADMX files based on?
a. HTML
b. XML
c. SGML
d. Java
Answer: b
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: Windows Vista and Windows Server 2008 introduced ADMX files, which
are based on eXtensible Markup Language (XML).
14. Unlike ADM files, ADMX files are not stored where?
a. in the Central Store
b. on the domain controller
c. in the SYSVOL folder
d. in individual GPOs
Answer: d
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: Unlike ADM files, ADMX files are not stored in individual GPOs. The
Group Policy Management Editor automatically reads and displays settings from the
local ADMX file store.
15. Where is the Central Store located?
a. in the SYSVOL directory
b. Microsoft Online
c. TechNet
d. on a domain controller public share
Answer: a
Difficulty: Easy
Section Ref: Creating a Central Store
Explanation: The Central Store is a folder structure created in the SYSVOL directory
on the domain controllers in each domain in your organization.

Short Answer
16. What steps do you need to complete to deploy software with group policies?

Answer: You have to create a distribution point, create a GPO to use for software
distribution, and assign a package to a user or computer.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: To deploy software with group policies, you need to create a
distribution point on the publishing server, create a GPO to use to distribute the
software package, and assign or publish a package to a user or computer.
17. If you use the Assign software to a user option, how does the new software
install to the users computer?
Answer: The user would have to launch the software package and then it would
install on first use.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: With the Assign software to a user option, the software is available on
the users Start menu when the user logs on. However, the installation does not
occur unless the user clicks the application icon on the Start menu or a file that is
associated with the application is opened (e.g., opening a .docx file then installs
Microsoft Word).
18. If you select the Assign software to a computer option, when does the software
install on the computer?
Answer: The software install after the next reboot.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: With the Assign software to a computer option, the application is
installed the next time the computer starts.
19. What are the four Administrative Template Property Filters?
Answer: Managed or Non-Managed settings, Configured or Not Configured, Keyword
Filters, and Requirements Filters
Difficulty: Hard
Section Ref: Configuring Property Filters for Administrative Templates
Explanation: To filter the settings displayed, you can select or deselect the following
filter options: Managed or Non-Managed settings, Configured or Not Configured,
Keyword Filters, and Requirements Filters.
20. What utility do you use to convert ADM templates to the new ADMX format?
Answer: Microsoft provides the ADMX Migrator tool as a MMC snap-in.
Difficulty: Medium

Section Ref: Converting Administrative Templates Using ADMX Migrator


Explanation: ADMX Migrator is an MMC snap-in that simplifies the process of
converting your existing Group Policy ADM templates to the new ADMX format. It
provides a graphical user interface for creating and editing Administrative
Templates.
21. What is a security template?
Answer: A security template is a collection of configuration settings stored in a text
file with the INF extension. Theyre deployed as part of a computer or group policy.
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: A security template is a collection of configuration settings stored in a
text file with the .inf extension.

Best Answer
22. An application cannot be published to a _______________.
a. GPO
b. user
c. group
d. computer
Answer: d
Difficulty: Hard
Section Ref: Assigning or Publishing a Package
Explanation: An application cannot be published to a computer.
23. When configuring Group Policy to deploy applications, the applications must be
mapped to where?
a. UNC path
b. drive letter
c. shared folder
d. full install path
Answer: a
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: When configuring Group Policy to deploy applications, they must be
mapped to UNC paths. If you use local paths, the deployment will fail.
24. What happens when an application deployed via group policies becomes
damaged or corrupted?
a. The installer notifies the administrator of the faulty application.

b. The installer will detect and reinstall or repair the application.


c. The user must request a reinstall of the application.
d. The user must initiate a repair of the application.
Answer: b
Difficulty: Hard
Section Ref: Assigning or Publishing a Package
Explanation: When software is installed with group policies, the applications are
resilient. If an application becomes corrupted, the installer will detect and reinstall
or repair the application.
25. If you, as administrator, change an installed application, how do you update
your users?
a. by redeploying the application via the GPO
b. by instructing the users to reinstall the application
c. by creating a GPO to remove the old application and installing the new one
d. by distributing the updates on next logon
Answer: a
Difficulty: Medium
Section Ref: Redeploying an Application
Explanation: After a computer has installed an application, and you choose to
change the software package, you can then choose to redeploy the software. To
redeploy the software, you right-click the package in the GPO, click All Tasks, and
click Redeploy Application.

Build List
26. Order the following general steps required to use scripts.
a. Execute the script manually to make sure that it runs and performs as planned.
b. Create the script.
c. Copy the script to c:\Windows\Sysvol\Sysvol\Domain Name\Scripts on a domain
controller.
d. Configure a GPO to execute the script during startup, shutdown, logon, or logoff.
Answer: B A C D
Difficulty: Easy
Section Ref: Using Scripts with Group Policies
Explanation: To use scripts, perform the following steps:
1. Create the login script.
2. Execute the script manually to ensure that it runs and performs as planned.

3. Copy the script to the c:\Windows\Sysvol\Sysvol\Domain Name\Scripts folder on a


domain controller. The content of the SYSVOL volume is automatically replicated to
the other domain controllers within the domain.
4. Configure a GPO to execute the script during startup, shutdown, logon, or logoff.
27. Order the following steps required to configure the desktop background with
group policies.
a. Double-click Desktop Wallpaper. The Desktop Wallpaper dialog box opens.
b. In the Wallpaper Name text box, type the path and name of an image file.
c. Navigate to User Configuration\Policies\Administrative
Templates\Desktop\Desktop.
d. Enable the GPO.
e. Open the Group Policy Management Editor for the GPO you want to configure.
Answer: E C A D B
Difficulty: Medium
Section Ref: Managing Administrative Templates
Explanation: Refer to the steps outlined under Configure the Desktop Background
Image with Group Policies.
28. Order the following steps required to compare settings with a security template.
a. Select Add/Remove Snap-In.
b. Select Security Configuration and Analysis and click Add.
c. Select Analyze Now.
d. Enter mmc at the prompt.
e. Right-click Security Configuration and Analysis and click Open Database.
f. Check the settings for compliance.
g. Open a command prompt with Administrator privileges.
Answer: G D A B E C F
Difficulty: Hard
Section Ref: Using Security Templates
Explanation: Refer to the steps given in the Compare Settings with a Security
Template section.
29. Order the following steps required to add a custom ADM administrative
template.
a. Select either Computer Configuration\Policies\Administrative Templates or User
Configuration\Policies\Administrative Templates.
b. Navigate to the custom Administrative Templates and click Open.
c. Right-click Administrative Templates and Add/Remove Templates.
d. Open the Group Policy Management Editor.
Answer: D A C B

Difficulty: Easy
Section Ref: Using Custom Administrative Template Files
Explanation: Refer to the steps outlined in Add a Custom ADM Administrative
Template File.

Repeated Answer
30. Which node contains only one node, Software installation, which allows you to
install and maintain software within your organization?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: a
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: Software Settings: Contains only one node, Software installation, which
allows you to install and maintain software within your organization.
31. Which node contains settings that are applied when the user logs on?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: d
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The User Configuration node contains settings that are applied when
the user logs on.
32. Which node contains settings that are applied to the computer regardless of
who logs on to the computer?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: c
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The Computer Configuration node contains settings that are applied to
the computer regardless of who logs on to the computer.

33. Which node allows you to configure settings such as Name Resolution Policy,
Security Settings, and Policy-Based QoS nodes?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: b
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The Windows Settings node allows you to configure Windows settings,
including Name Resolution Policy, Scripts (Startup/Shutdown), Security Settings, and
Policy-Based QoS (Quality of Service) nodes.

S-ar putea să vă placă și