- Home
- Server Administration
- Windows
- Installing and Configuring Windows server 2012 (70-410)
81.
Which of the following tools are used to deploy the settings in a security template to
all the computers in an AD DS domain?
- A.Active Directory Users and Computers
- B.Security Templates snap-in
- C.Group Policy Object Editor
- D.Group Policy Management console
- Answer & Explanation
- Report
Answer : [C, D]
Explanation :
Explanation :
A. Incorrect: You cannot use Active Directory Users and Computers to apply a
security template to a domain. B. Incorrect: You cannot use the Security Templates snap-in to apply a security template to a domain. C. Correct: You must use the Group Policy Object Editor to import a template into a GPO before you apply it to a domain. D. Correct. After importing the security template into a GPO, you can link it to a domain object and deploy the template settings. |
82.
Which of the following are local groups to which you can add users with the Windows
Control Panel? (Choose all that apply.)
- A.Users
- B.Power Users
- C.Administrators
- D.Non-Administrators
- Answer & Explanation
- Report
Answer : [A, C]
Explanation :
Explanation :
A. Correct: By creating a standard user in Windows Control Panel, you are adding the
account to the local Users group. B. Incorrect: You cannot add users to the Power Users group by using the Windows Control Panel. C. Correct: Granting a user administrative privileges in the Windows Control Panel adds the account to the local Administrators group. D. Incorrect: There is no Non-Administrators local group in Windows. |
83.
Which of the following tools are used to modify the settings in a security template?
- A.Active Directory Users and Computers
- B.Security Templates snap-in
- C.Group Policy Object Editor
- D.Group Policy Management console
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A. Incorrect: You cannot use Active Directory Users and Computers to modify the
settings in a security template. B. Correct: You use the Security Templates snap-in to modify the settings in a security template. C. Incorrect: You cannot use the Group Policy Object Editor to modify the settings in a security template. D. Incorrect: You cannot use the Group Policy Management console to modify the settings in a security template. |
84.
The built-in local groups on a server running Windows Server 2012 R2 receive their
special capabilities through which of the following mechanisms?
- A.Security options
- B.Windows Firewall rules
- C.NTFS permissions
- D.User rights
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
A. Incorrect: Security options cannot provide the capabilities granted to the built-in
local groups. B. Incorrect: Windows Firewall rules cannot provide the capabilities granted to the built-in local groups. C. Incorrect: NTFS permissions cannot provide the capabilities granted to the built-in local groups. D. Correct: Built-in local groups on a server running Windows Server 2012 R2 receive their special capabilities through user rights. |
85.
After configuring and deploying the Audit Directory Service Access policy, what must
you do before a computer running Windows Server 2012 R2 begins logging Active
Directory access attempts?
- A.You must select the Active Directory objects you want to audit by using the Active Directory Users and Computer console.
- B.You must wait for the audit policy settings to propagate to all the domain controllers on the network.
- C.You must open the Audit Directory Service Access Properties sheet and select all the Active Directory objects you want to audit.
- D.You must add an underscore character to the name of every Active Directory object you want to audit.
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
A. Correct: The Audit Directory Service Access policy audits only the objects you
select in the Active Directory Users and Computers console. B. Incorrect: There is no need to wait for the policy settings to propagate to all the domain controllers. C. Incorrect: You configure the objects to be audited in the Active Directory Users and Computers console, not in the policy itself. D. Incorrect: Modifying the object names will have no effect. |