Which of the following local GPOs takes precedence on a system with multiple local
GPOs?
Local Group Policy
Administrators Group Policy
Non-Administrators Group Policy
User-specifc Group Policy
SHOW ANSWERWhich of the following techniques can be used to apply GPO settings to a specific
group of users in an OU?
GPO linking
Administrative templates
Security filtering
Starter GPOs
SHOW ANSWERWhich of the following statements best describes the function of a starter GPO?
A starter GPO functions as a template for the creation of new GPOs.
A starter GPO is the frst GPO applied by all Active Directory clients.
A starter GPO uses a simplifed interface for elementary users.
A starter GPO contains all the settings found in the default Domain Policy GPO
SHOW ANSWERWhen you apply a GPO with a value of Not Configured for a particular setting to a
system on which that same setting is disabled, what is the result?
The setting remains disabled.
The setting is changed to Not Configured.
The setting is changed to Enabled.
The setting generates a conflict error.
SHOW ANSWERWhich of the following tools are used to deploy the settings in a security template to
all the computers in an AD DS domain?
Active Directory Users and Computers
Security Templates snap-in
Group Policy Object Editor
Group Policy Management console
SHOW ANSWERWhich of the following are local groups to which you can add users with the Windows
Control Panel? (Choose all that apply.)
Users
Power Users
Administrators
Non-Administrators
SHOW ANSWERWhich of the following tools are used to modify the settings in a security template?
Active Directory Users and Computers
Security Templates snap-in
Group Policy Object Editor
Group Policy Management console
SHOW ANSWERThe built-in local groups on a server running Windows Server 2012 R2 receive their
special capabilities through which of the following mechanisms?
Security options
Windows Firewall rules
NTFS permissions
User rights
SHOW ANSWERAfter confguring and deploying the Audit Directory Service Access policy, what must
you do before a computer running Windows Server 2012 R2 begins logging Active
Directory access attempts?
You must select the Active Directory objects you want to audit by
using the Active
Directory Users and Computer console.
You must wait for the audit policy
settings to propagate to all the domain
controllers on the network.
You must open the Audit Directory
Service Access Properties sheet and select all
the Active Directory objects you want to audit.
You must add an underscore character
to the name of every Active Directory
object you want to audit.
Which of the following is not one of the software restriction rule types supported by
Windows Server 2012 R2?
Hash rules
Certifcate rules
Path rules
Firewall rules
SHOW ANSWERWhich of the following strategies for enforcing software restrictions will prevent any
executable from running except for those that have been specifcally allowed by an
administrator?
Basic user
Disallowed
Power user
Unrestricted
SHOW ANSWERUnder which of the following conditions will a hash rule in a software restriction policy
cease to function? (Choose all that apply.)
When you move the fle on which the hash is based to a different folder
When you update the fle on which the hash is based to a new version
When the fle on which the hash is based is modifed by a virus
When you change the permissions for the fle on which the hash is based
SHOW ANSWER
Which of the following rule types applies to fles with an .msi extension?
Executable rules
Windows Installer rules
Script rules
Packaged app rules
SHOW ANSWER