Information Technology Reference
In-Depth Information
Objective 6.4: thought experiment
Use a File preference with the Replace option to place this document in the user's
Documents\HR folder. By using replace, it will automatically replace the file with the
latest version.
1.
One way to accomplish this would be to use item-level targeting preferences with an
Item of User Is A Member Of The Security Group and place all probationary employees
in the security group. When they pass their probationary period, they come out of the
security group and the preference item setting no longer applies.
2.
There are at least two ways to accomplish this, but think of other ways too. One is
to use URL shortcut preferences to the individual websites. This, however, requires
managing individual shortcuts. Another possibility is to create an Intranet Resources
folder that is deployed to their desktop via a Folder deployment preference. Then you
simply add the URL shortcuts to the source folder for the Group Policy Preference.
You'll want to use the Update or Create option, not Replace. Users are quite likely to
add their own shortcuts to the folder as they discover items they use.
3.
Objective 6.4: review
Correct answer: C
1.
Incorrect: Using the Replace action deletes any current settings for printers with
the same name.
A.
Incorrect: This would work if the printer didn't yet exist, but would not set the
printer as the default if it already existed.
B.
Correct: This would create the printer if it didn't exist and would modify it to make
it the default if it did.
C.
Incorrect: You can't link a GPO to a security group; you can use a security filter to
a GPO.
D.
Correct answer: D
2.
Incorrect: This needs to be a Computer Configuration item so it is enforced
during startup.
A.
Incorrect: The Portable Computer item-level targeting checks to see only whether
a computer is docked or undocked.
B.
Incorrect: This needs to be a Computer Configuration item so that it is enforced
during startup, and Portable Computer item-level targeting checks to see only
whether a computer is docked or undocked.
C.
Correct: This sets the power options for the computer based on it having a
battery, which is a good way to target laptop users.
D.
Search WWH ::




Custom Search