139 Quiz Questions #2 Flashcards

1
Q

T/F - Computer policy settings are applied whenever a user logs in or out of a computer.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F - User policy settings are applied whenever a user logs in or out of a computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which user account does a linked Computer Policy apply to on a domain computer?

A

All Domain users logging onto the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which two Active Directory objects do group policies get applied to?

A

Computers

Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Once a GPO is created, it is usually linked to:

A

an OU containing a group of users or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F - the order in which multiple group policies are applied to a container does not matter as the cumulative affect of the policies will apply.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Windows Server tool is used to mange group policy settings?

A

GPMC (Group Policy Management Controller)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The three major policy headings that can be configured are:

A

Software Settings

Windows Settings

Administrative Templates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

T/F - User rights and user permissions represent the same accessibility within a domain environment.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the default setting for most of the group policy settings?

A

Not Configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a single-label name DNS entry?

A

maintain compatibility with older OS that use flat namespaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When configuring the only DNS service within a domain you need to create at least a:

A

Primary Forward Lookup Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name for the zone used for single-name records?

A

GlobalName Zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

T/F - You must configure the DNS role on the Active Directory Domain Controller.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Three command line tools commonly used to troubleshoot DNS issues are:

A

PING

NSLOOKUP

IPCONFIG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

If there are no forwarders set in the DNS configuration, the next step in resolving DNS queries is:

A

Use Root Hints

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F - A ‘Non-authoritative answer’ to a DNS query means the response is not reliable and should be ignored.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the main difference between Shared permissions and NTFS permissions?

A

NTFS permissions are applied to files and folders and Shared permissions are applied to folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F - An Allow permission will take precedence over a corresponding Deny permission.

A

False

20
Q

Which three of the following are configurable NTFS permisssions?

A

Read

Write

Modify

21
Q

hich standard NTFS permission allows a user to take ownership of a file or folder?

A

Full Control

22
Q

What two types of disk quotas can be set on a partition?

A

Hard

Soft

23
Q

Disk quotas can either allow or prevent a user from exceeding a maximum disk storage that has been set.

A

True

24
Q

Which of the following are configurable Shared Permissions for a shared folder?

A

Read

Read/Write

25
Q

Moving a shared file from an NTFS partition to a FAT32 memory stick will:

A

remove the permissions that were set before moving the file.

26
Q

What is the purpose of adding a ‘$’ after a network sharename?

A

It hides the share name from browsing.

27
Q

T/F - Permissions that are set on a parent folder are inherited by subfolders by default.

A

TRUE

28
Q

What term is used to describe a WSUS computer that connects directly to Microsoft for updates?

A

Upstream WSUS Server

29
Q

Drive encryption is a common technique used to hold a computer hostage using a Ransomware malware attack.

A

TRUE

30
Q

Which of the following are updates that a WSUS server can provide to client computers?

A

Critical Updates

MS Office Updates

Service Packs

31
Q

A malware exploit that disguises itself as legitimate software is often called a:

A

Trojan Horse

32
Q

Which two media types does the Windows Server Backup feature support?

A

Network Share

Local Hard Drive

33
Q

T/F - Backup methods that allow for the entire system to be recovered include Full Server and Bare Metal Recovery options.

A

FALSE

34
Q

Which two of the following are advantages of using a WSUS server?

A

Conserve WAN bandwidth.

Consistency of updated computers.

35
Q

Which of the following Windows Server monitoring tools is commonly used with data collector sets to log resource use?

A

Performance Monitor

36
Q

A malware exploit that self-replicates and uses the network to spread is called a:

A

WORM

37
Q

Three Common components that cause bottlenecks within a computer system that should be monitored include:

A

Memory usage

CPU usage

Hard Disk usage

38
Q

DHCP can provide which of the following three network settings to a client machine:

A

Default Gateway

Subnet Mask

DNS Server Address

39
Q

How many scopes are supported for each subnet?

A

ONE

40
Q

What is required to create a DHCP reservation?

A

The client computer’s MAC address.

41
Q

When would it be necessary to create an exclusion?

A

When a client computer has a reservation configured.

42
Q

A DHCP server can be located on a different subnet.

A

True

43
Q

If a DHCP Server shows that DHCP DISCOVERS are increasing, but that DHCP OFFERS are static then the possible fault is:

A

the server is out of addresses.

44
Q

A red down arrow icon next to a DHCP server indicates:

A

that the DHCP server is connected to the network, but not authorized.

45
Q

Filtering with DHCP will allow or deny computers from getting IP addresses based on MAC address information.

A

True