Home
81.
Which of the following tools are used to deploy the settings in a security template to all the computers in an AD DS domain?
  • A.
    Active Directory Users and Computers
  • B.
    Security Templates snap-in
  • C.
    Group Policy Object Editor
  • D.
    Group Policy Management console
  • Answer & Explanation
  • Report
Answer : [C, D]
Explanation :
A. Incorrect: You cannot use Active Directory Users and Computers to apply a security template to a domain.
B. Incorrect: You cannot use the Security Templates snap-in to apply a security template to a domain.
C. Correct: You must use the Group Policy Object Editor to import a template into a GPO before you apply it to a domain.
D. Correct. After importing the security template into a GPO, you can link it to a domain object and deploy the template settings.
Report
Name Email  
82.
Which of the following are local groups to which you can add users with the Windows Control Panel? (Choose all that apply.)
  • A.
    Users
  • B.
    Power Users
  • C.
    Administrators
  • D.
    Non-Administrators
  • Answer & Explanation
  • Report
Answer : [A, C]
Explanation :
A. Correct: By creating a standard user in Windows Control Panel, you are adding the account to the local Users group.
B. Incorrect: You cannot add users to the Power Users group by using the Windows Control Panel.
C. Correct: Granting a user administrative privileges in the Windows Control Panel adds the account to the local Administrators group.
D. Incorrect: There is no Non-Administrators local group in Windows.
Report
Name Email  
83.
Which of the following tools are used to modify the settings in a security template?
  • A.
    Active Directory Users and Computers
  • B.
    Security Templates snap-in
  • C.
    Group Policy Object Editor
  • D.
    Group Policy Management console
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A. Incorrect: You cannot use Active Directory Users and Computers to modify the settings in a security template.
B. Correct: You use the Security Templates snap-in to modify the settings in a security template.
C. Incorrect: You cannot use the Group Policy Object Editor to modify the settings in a security template.
D. Incorrect: You cannot use the Group Policy Management console to modify the settings in a security template.
Report
Name Email  
84.
The built-in local groups on a server running Windows Server 2012 R2 receive their special capabilities through which of the following mechanisms?
  • A.
    Security options
  • B.
    Windows Firewall rules
  • C.
    NTFS permissions
  • D.
    User rights
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
A. Incorrect: Security options cannot provide the capabilities granted to the built-in local groups.
B. Incorrect: Windows Firewall rules cannot provide the capabilities granted to the built-in local groups.
C. Incorrect: NTFS permissions cannot provide the capabilities granted to the built-in local groups.
D. Correct: Built-in local groups on a server running Windows Server 2012 R2 receive their special capabilities through user rights.
Report
Name Email  
85.
After configuring and deploying the Audit Directory Service Access policy, what must you do before a computer running Windows Server 2012 R2 begins logging Active Directory access attempts?
  • A.
    You must select the Active Directory objects you want to audit by using the Active Directory Users and Computer console.
  • B.
    You must wait for the audit policy settings to propagate to all the domain controllers on the network.
  • C.
    You must open the Audit Directory Service Access Properties sheet and select all the Active Directory objects you want to audit.
  • D.
    You must add an underscore character to the name of every Active Directory object you want to audit.
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
A. Correct: The Audit Directory Service Access policy audits only the objects you select in the Active Directory Users and Computers console.
B. Incorrect: There is no need to wait for the policy settings to propagate to all the domain controllers.
C. Incorrect: You configure the objects to be audited in the Active Directory Users and Computers console, not in the policy itself.
D. Incorrect: Modifying the object names will have no effect.
Report
Name Email