Documente Academic
Documente Profesional
Documente Cultură
15 Multiple Choice
6 Short Answer
4 Best Answer
4 Build List
4 Repeated Answer
33 questions
Multiple Choice
1. Which of the following operating systems can have its security settings managed
by using security templates? Select all that apply.
a. Windows XP
b. Windows Vista
c. Windows 7
d. Windows 8
Answer: c and d
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: Each computer running Windows 7 and 8 and any computer running
Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2
maintains a collection of security settings that can be managed by using the local
GPO.
2. Which two of the following methods can you use to deploy security templates?
a. using Active Directory GPOs
b. using the Security Configuration and Analysis snap-in
c. copying a text file to each managed computers admin$ share
d. using a logon script
Answer: a and b
Difficulty: Medium
Section Ref: Using Security Templates
Explanation: You can deploy security templates using Active Directory group policy
objects and the Security Configuration and Analysis snap-in.
3. What is an ADMX file?
Answer: c
Difficulty: Easy
Section Ref: Performing Software Installation Using Group Policies
Explanation: The Windows Installer is a software component used for the
installation, maintenance, and removal of software on Windows.
7. What is the filename extension for the files in which installation information is
stored?
a. .txt
b. .xml
c. .ini
d. .msi
Answer: d
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies
Explanation: The installation information for software is stored in a Microsoft
Software Installation (MSI) file in a database installation file with an .msi filename
extension.
8. What are MST files used for?
a. They deploy customized software installation files
b. They are template files for software packages
c. They are custom patch files
d. They specialize in software installation test files
Answer: a
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies
Explanation: MSI Transform files are used to deploy customized MSI files.
9. Windows Installer cannot install .exe files. To distribute a software package that
installs with an .exe file, what must you do to it?
a. Convert it to a ZIP file
b. Convert it to an MSI file
c. Convert it to an MSP file
d. Convert it to an MST file
Answer: b
Difficulty: Medium
Section Ref: Performing Software Installation Using Group Policies
Disabled: The Disabled settings undo a change made by a prior Enabled
setting.
13. What language are ADMX files based on?
a. HTML
b. XML
c. SGML
d. Java
Answer: b
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: Windows Vista and Windows Server 2008 introduced ADMX files, which
are based on eXtensible Markup Language (XML).
14. Unlike ADM files, ADMX files are not stored where?
a. in the Central Store
b. on the domain controller
c. in the SYSVOL folder
d. in individual GPOs
Answer: d
Difficulty: Medium
Section Ref: Using Administrative Templates
Explanation: Unlike ADM files, ADMX files are not stored in individual GPOs. The
Group Policy Management Editor automatically reads and displays settings from the
local ADMX file store.
15. Where is the Central Store located?
a. in the SYSVOL directory
b. Microsoft Online
c. TechNet
d. on a domain controller public share
Answer: a
Difficulty: Easy
Section Ref: Creating a Central Store
Explanation: The Central Store is a folder structure created in the SYSVOL directory
on the domain controllers in each domain in your organization.
Short Answer
16. What steps do you need to complete to deploy software with group policies?
Answer: You have to create a distribution point, create a GPO to use for software
distribution, and assign a package to a user or computer.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: To deploy software with group policies, you need to create a
distribution point on the publishing server, create a GPO to use to distribute the
software package, and assign or publish a package to a user or computer.
17. If you use the Assign software to a user option, how does the new software
install to the users computer?
Answer: The user would have to launch the software package and then it would
install on first use.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: With the Assign software to a user option, the software is available on
the users Start menu when the user logs on. However, the installation does not
occur unless the user clicks the application icon on the Start menu or a file that is
associated with the application is opened (e.g., opening a .docx file then installs
Microsoft Word).
18. If you select the Assign software to a computer option, when does the software
install on the computer?
Answer: The software install after the next reboot.
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: With the Assign software to a computer option, the application is
installed the next time the computer starts.
19. What are the four Administrative Template Property Filters?
Answer: Managed or Non-Managed settings, Configured or Not Configured, Keyword
Filters, and Requirements Filters
Difficulty: Hard
Section Ref: Configuring Property Filters for Administrative Templates
Explanation: To filter the settings displayed, you can select or deselect the following
filter options: Managed or Non-Managed settings, Configured or Not Configured,
Keyword Filters, and Requirements Filters.
20. What utility do you use to convert ADM templates to the new ADMX format?
Answer: Microsoft provides the ADMX Migrator tool as a MMC snap-in.
Difficulty: Medium
Best Answer
22. An application cannot be published to a _______________.
a. GPO
b. user
c. group
d. computer
Answer: d
Difficulty: Hard
Section Ref: Assigning or Publishing a Package
Explanation: An application cannot be published to a computer.
23. When configuring Group Policy to deploy applications, the applications must be
mapped to where?
a. UNC path
b. drive letter
c. shared folder
d. full install path
Answer: a
Difficulty: Medium
Section Ref: Assigning or Publishing a Package
Explanation: When configuring Group Policy to deploy applications, they must be
mapped to UNC paths. If you use local paths, the deployment will fail.
24. What happens when an application deployed via group policies becomes
damaged or corrupted?
a. The installer notifies the administrator of the faulty application.
Build List
26. Order the following general steps required to use scripts.
a. Execute the script manually to make sure that it runs and performs as planned.
b. Create the script.
c. Copy the script to c:\Windows\Sysvol\Sysvol\Domain Name\Scripts on a domain
controller.
d. Configure a GPO to execute the script during startup, shutdown, logon, or logoff.
Answer: B A C D
Difficulty: Easy
Section Ref: Using Scripts with Group Policies
Explanation: To use scripts, perform the following steps:
1. Create the login script.
2. Execute the script manually to ensure that it runs and performs as planned.
Difficulty: Easy
Section Ref: Using Custom Administrative Template Files
Explanation: Refer to the steps outlined in Add a Custom ADM Administrative
Template File.
Repeated Answer
30. Which node contains only one node, Software installation, which allows you to
install and maintain software within your organization?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: a
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: Software Settings: Contains only one node, Software installation, which
allows you to install and maintain software within your organization.
31. Which node contains settings that are applied when the user logs on?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: d
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The User Configuration node contains settings that are applied when
the user logs on.
32. Which node contains settings that are applied to the computer regardless of
who logs on to the computer?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: c
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The Computer Configuration node contains settings that are applied to
the computer regardless of who logs on to the computer.
33. Which node allows you to configure settings such as Name Resolution Policy,
Security Settings, and Policy-Based QoS nodes?
a. Software Settings
b. Windows Settings
c. Computer Configuration
d. User Configuration
Answer: b
Difficulty: Easy
Section Ref: Configuring Group Policy Settings
Explanation: The Windows Settings node allows you to configure Windows settings,
including Name Resolution Policy, Scripts (Startup/Shutdown), Security Settings, and
Policy-Based QoS (Quality of Service) nodes.