1.
What contains all of the Group Policy
settings that you wish to implement to user and computer objects within
a site, domain, or OU?
Correct Answer
C. Group Policy Objects
Explanation
Group Policy Objects (GPOs) contain all of the Group Policy settings that you wish to implement to user and computer objects within a site, domain, or OU. The GPO must be associated with the container to which it is applied.
2.
Local GPO settings are stored in what folder on a computer?
Correct Answer
A. %systemroot%/System32/GroupPolicy
Explanation
Each computer running Windows Server 2008, Windows Server 2003, Windows XP Professional, or Windows 2000 has only one local GPO, and the settings in that local GPO will apply to all users who log on to the computer. The local GPO settings are stored on the local computer in the %systemroot%/System32/GroupPolicy folder.
3.
Configuring the Loopback Processing
setting on a container object, such as a site, domain, or OU, will
block all policies from parent containers from flowing to this
container.
Correct Answer
B. False
Explanation
Configuring the Loopback Processing setting on a container object, such as a site, domain, or OU, will not block all policies from parent containers from flowing to this container. Loopback Processing allows policies to be applied to user accounts based on the location of the computer object, rather than the user object. This means that policies from both the parent container and the container itself will be applied to the user accounts. Therefore, the correct answer is False.
4.
The Default Domain Policy is linked to the Domain Controllers OU, and its settings affect all domain controllers in the domain.
Correct Answer
B. False
Explanation
The Default Domain Policy is not linked to the Domain Controllers OU. It is linked to the root of the domain and its settings apply to all objects within the domain, including domain controllers. Therefore, the given statement is false.
5.
What advanced technique allows you to
apply GPO settings to only one or more users or groups within a
container by selectively granting the “Apply Group Policy” permission
to one or more users or security groups?
Correct Answer
C. Security group filtering
Explanation
An advanced technique, called security group filtering, will allow you to apply GPO settings to only one or more users or groups within a container by selectively granting the “Apply Group Policy” permission to one or more users or security groups.
6.
Local GPOs support folder redirection and Group Policy software installation.
Correct Answer
B. False
Explanation
Local GPOs do not support folder redirection and Group Policy software installation. These features are only supported by domain-based Group Policy Objects (GPOs). Local GPOs are limited to configuring security settings, auditing policies, and user rights assignments on a local computer.
7.
Which of the following is not a type of GPO?
Correct Answer
B. Advanced GPO
Explanation
There are three types of GPOs: local GPOs, domain GPOs, and starter GPOs.
8.
What is the path to the default GPT structure for a domain?
Correct Answer
A. %systemroot%\sysvol\sysvol\domain.com\Policies
Explanation
The Group Policy templates (GPT) folder structure is located in the shared SYSVOL folder on a domain controller. The path to the default GPT structure for the cohowinery.com domain is %systemroot%\sysvol\sysvol\cohowinery.com\Policies\. Replace %systemroot% with the folder location for the operating system files.
9.
Windows Deployment Services assists in
rebuilding or deploying workstations quickly and efficiently in an
enterprise environment.
Correct Answer
A. True
Explanation
Windows Deployment Services is a server technology that enables IT administrators to deploy Windows operating systems quickly and efficiently across a network. It allows for the automated installation of Windows on multiple computers simultaneously, reducing the time and effort required for workstation deployment in an enterprise environment. Therefore, the statement that Windows Deployment Services assists in rebuilding or deploying workstations quickly and efficiently in an enterprise environment is true.
10.
Group policy is divided into two subcategories, or nodes, that are named Computer Configuration and __________.
Correct Answer
C. User Configuration
Explanation
Configuring Group Policy settings enables you to customize the configuration of a user’s desktop, environment, and security settings. The actual settings are divided into two subcategories: Computer Configuration and User Configuration. The subcategories are referred to as Group Policy nodes. A node is simply a parent structure that holds all related settings. In this case, the node is specific to computer configurations and user configurations.
11.
What allows the Group Policy processing
order to circle back and reapply the computer policies after all user
policies and logon scripts run?
Correct Answer
C. Loopback Processing
Explanation
Loopback processing is a Group Policy option that provides an alternative method of obtaining the ordered list of GPOs to be processed for the user. When set to Enabled, this setting has two options: Merge and Replace.
12.
What is a method of controlling settings across your network?
Correct Answer
A. Group Policy
Explanation
Group Policy is a method of controlling settings across your network. Group Policy consists of user and computer settings on the Windows Server 2008, Windows Server 2003 family, Microsoft Windows 2000 family, Window Vista, and Microsoft Windows XP Professional platforms that can be implemented during computer startup and shutdown and user logon and logoff.
13.
What policies can be used to ensure that users always have the latest versions of applications?
Correct Answer
B. Software installation
Explanation
Software installation policies can be used to ensure that users always have the latest versions of applications. If application files are inadvertently deleted, repairs are made without user intervention.
14.
What process applies Group Policy settings to various containers within Active Directory?
Correct Answer
B. Linking
Explanation
You can configure one or more GPOs within a domain and then use a process called linking, which applies these settings to various containers within Active Directory. You can link multiple GPOs to a single container or link one GPO to multiple containers throughout the Active Directory structure.
15.
What Microsoft Management Console (MMC) snap-in is used to create and modify Group Policies and their settings?
Correct Answer
D. Group Policy Management Console
Explanation
The Group Policy Management Console (GPMC) is the Microsoft Management Console (MMC) snap-in that is used to create and modify Group Policies and their settings.
16.
What policies work with folder redirection to provide the ability to cache files locally?
Correct Answer
D. Offline file storage
Explanation
Offline file storage works with folder redirection to provide the ability to cache files locally. This allows files to be available even when the network is inaccessible.
17.
The __________ Policy is linked to the domain, and its settings affect all users and computers in the domain.
Correct Answer
B. Default Domain
Explanation
The Default Domain Policy is linked to the domain, and its settings affect all users and computers in the domain.
18.
Administrators find that Group Policy implementation helps them to achieve __________.
Correct Answer
C. Centralized management
Explanation
Group Policies probably have their largest impact on reducing TCO due to their administrative benefits. Administrators find that Group Policy implementation helps them to achieve centralized management.
19.
Which of the following is an administrative benefit of using Group Policy?
Correct Answer
D. All of the above
Explanation
The administrative benefits to Group Policy implementation include: administrators have control over centralized configuration of user settings, application installation, and desktop configuration; problems due to missing application files and other minor application errors often can be alleviated by the automation of application repairs; centralized backup of user files eliminates the need and cost of trying to recover files from a damaged drive; and the need to manually make security changes is reduced by the rapid deployment of new settings through Group Policy.