17-19 Server 2012 70-410

Unlock all answers in this set

Unlock answers
question
After deploying software by GPO using the Assigned option, where is the package made available for the user?
answer
Start menu or desktop
question
After deploying software by GPO using the Published option, where is the package made available for the user?
answer
Windows Control Panel
question
By exporting the Windows Firewall policy, you have a file with a .wfw extension that contains _____.
answer
all its rules, including the preconfigured rules and the ones you have created or modified
question
Computer Configuration node security settings include several security areas. Which of the following is NOT one of them?
answer
Wireless Network Policies (IEEE 802.3)
question
During the Windows Server 2012 installation, what account creation prompts you for the password?
answer
Administrator
question
How are most Group Policy settings applied or reapplied?
answer
At the refresh interval
question
How does AppLocker handle all executables, installer packages, and scripts by default?
answer
AppLocker blocks all by default, except for those specified in Allow rules.
question
If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should this method be avoided?
answer
If users have slow links between their workstations and the software distribution point
question
If an administrator wants to enable the "Block all incoming connections, including those in the list of allowed apps" setting, to which of the firewall profiles does it apply?
answer
Public, private, and domain
question
In Windows Firewall Customized Settings, there are three profiles (public, private, and domain). What differentiates these profiles from each other?
answer
Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.
question
In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______.
answer
rule applies to all programs, to one specific program, or to a specific service
question
In what Group Policy objects container are AppLocker settings located?
answer
Computer ConfigurationWindows SettingsSecurity SettingsApplication Control PoliciesAppLocker
question
Not all software on the market provides .msi support. What is your best option to use Windows Installer to assign and publish the software?
answer
Repackage the software for Windows Installer.
question
Regarding security templates, a strategy plan should consider ______.
answer
computer roles
question
Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network?
answer
Network zone
question
Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system?
answer
Path
question
Software restriction relies on four types of rules to specify which programs can or cannot run. What type relies on a value generated by an algorithm that creates a fingerprint of the file, which makes it impossible for another program to have the same value?
answer
Hash
question
Software restriction relies on four types of rules to specify which programs can or cannot run. What type uses a digital certificate to confirm its legitimacy?
answer
Certificate
question
What GPO node presents the interface with which to configure Windows Firewall properties?
answer
Computer ConfigurationPoliciesWindows SettingsSecurity SettingsWindows Firewall with Advanced Security
question
What Windows versions support the use of AppLocker polices, which poses a disadvantage compared to using software restriction policies?
answer
Windows 7 and Windows Server 2008 R2 or later
question
What account is created during Windows Server 2012 installation with the account disabled by default?
answer
Guest
question
What are the key benefits of security templates?
answer
Apply consistent, scalable, and reproducible security settings throughout an enterprise.
question
What are the three default security levels within software restriction policies?
answer
Unrestricted, Disallowed, and Basic User
question
What are the three primary event logs?
answer
Application, Security, and System
question
What are the two categories of security settings within Group Policy? Select two answers.
answer
User AND Computer
question
What are the two interfaces available for creating and managing user accounts in Windows Server 2012?
answer
User Accounts control panel and the Local Users and Groups snap-in for MMC
question
What are the two interfaces for creating and managing local user accounts a computer joined to the domain?
answer
User Accounts control panel and the Local Users and Groups snap-in for MMC
question
What does a firewall protect your company against?
answer
Network intrusion attempts, such as a denial of service attack
question
What is AppLocker also known as?
answer
Application control policies
question
What is a collection of configuration settings stored as a text file with an .inf extension?
answer
Security template
question
What is required to prepare applications with an approval stamp from Microsoft on its packaging, including the Certified for Windows Server 2012 logo, for Windows Installer?
answer
Nothing—the application is Windows Installer-enabled
question
What is the default size for each of the three Event logs?
answer
16,384 KB
question
What is the most common way to implement software restriction policies?
answer
Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously
question
What is the primary objective of a firewall?
answer
To permit traffic in and out for legitimate users, and to block the rest
question
What is the purpose of the Audit Policy section of a local GPO?
answer
Administrators can log successful and failed security events, such as loss of data, account access, and object access.
question
What is the simplest way to deploy a security template on several computers simultaneously?
answer
Importing the security template into a GPO
question
What is the typical incoming port number for a web server?
answer
80
question
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies?
answer
Scope
question
What parameter in the Windows Firewall New Inbound Rule Wizard specifies the exact type of traffic at the network or transport layer, which the firewall can block or allow?
answer
Protocol and Ports
question
What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule?
answer
Action
question
What parameter in the Windows Firewall New Inbound Rule Wizard specifies whether the rule applies to all programs, to one specific program, or to a specific service?
answer
Program
question
What policy setting enables you to specify group membership lists, allowing you to control membership in important groups, such as the local Administrators and Backup Operators groups?
answer
Restricted Groups policy
question
What service works with Group Policy to install, upgrade, patch, or remove software applications?
answer
Windows Installer
question
What tool for creating new users is only valid while the Windows Server 2012 computer is part of a workgroup and not joined to an AD DS domain?
answer
User Accounts Control Panel
question
What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel?
answer
Windows Firewall With Advanced Security snap-in for the Microsoft Management console
question
When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application?
answer
Assigning forces the application, whereas publishing provides the option to install.
question
When configuring software restriction policies, there are four rules that help determine the programs that can or cannot run. Select which of the following is NOT one of those rules.
answer
File location rule
question
When creating a firewall exception, what is the difference between opening a port and allowing an application through?
answer
Allowing an application opens the specified port only while the program is running, and thus is less risky.
question
When does Windows apply Computer Configuration policies by default?
answer
When the computer starts up
question
When does Windows apply User Configuration policies by default?
answer
As the user logs in
question
When installing software using Group Policy, what file or files does an administrator use?
answer
Windows Installer package files, or .msi files modifications to the package files require transform files, or .mst files. Further, patch files are designated as .msp files.
question
When would you need to create a user account through Control Panel?
answer
When you join a computer to an AD DS domain, you can create new local user accounts with the Local Users and Groups snap-in. Control Panel is used when the computer is not a member of an AD DS domain.
question
Windows Firewall allows an administrator to import and export firewall rules. What are the rules' file extension?
answer
.wfw
question
Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems?
answer
You can create a new Group Policy Object and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.
question
Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles?
answer
Domain, private, and public
question
You can configure the Windows Firewall to allow or block specific _________.
answer
ports, protocols, applications, users, and IP address ranges
question
You create a GPO that contains computer settings, but not user settings. What can you do to quicken GPO processing?
answer
You can disable the setting area that is not configured for faster processing.
question
You want to deploy software using Group Policy. What is necessary before assigning the software to a user account?
answer
You must create a distribution share, also called a software distribution point. Then create the Group Policy Object, specifying how to deploy the application.
question
What impacts the types of logs and events logged on a server?
answer
Roles installed
question
What did Microsoft introduce in Windows Server 2012 to ensure users with administrative privileges still operate routine tasks as standard users?
answer
User Account Control (UAC)
question
What tool for user creation provides full access to all local user and group accounts on the computer?
answer
Local Users and Groups snap-in
question
What service does AppLocker require running to function properly?
answer
Application Identity
question
Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic?
answer
Inbound—block all. Outbound—permit all
question
If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond?
answer
The firewall does not block client-initiated network traffic by default.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New