Information Technology Reference
In-Depth Information
9. Your network consists of three sites and two domains, with some computers from both
domains located at each site. Each site has certain security settings that should apply to all
computers from both domains when they're located at the site. What's the best way to ensure
that the correct security settings will be applied to the computers at each site?
a. Create three OUs in each domain, one for each site. In both domains, place the com-
puter accounts in the OU corresponding to the site where the computer is located. Apply
a GPO with the appropriate security settings to each OU in both domains.
b. Create three GPOs, one for each site, with the appropriate security settings. Apply the
GPOs to the corresponding site, and enforce the GPO.
c. Create three GPOs, one for each site. Apply the GPOs to the domain object in both
domains. Create three groups, one for each site, and place the computer accounts in the
appropriate groups. Use GPO filtering to make sure the policy configured for each site
affects only the corresponding group of computers.
d. On each computer in each site, configure the local GPO in GPOE with the appropriate
security settings. In GPOE, right-click the Computer Configuration node and click Block
Inheritance.
10. Objects in an OU with the Block Inheritance option set are affected by a domain-linked GPO
with the Enforced option set. True or False?
11. You have created a GPO named RestrictU and linked it to the Operations OU (containing
30 users) with link order 3. RestrictU sets several policies in the User Configuration node.
After a few days, you realize the Operations OU has three users who should be exempt from
the restrictions in this GPO. You need to make sure these three users are exempt from
RestrictU's settings, but all other policy settings are still in effect for them. What's the best
way to proceed?
a. Move the three users to a new OU. Create a GPO with settings appropriate for the three
users, and link it to the new OU.
b. Create an OU under Operations, and move the three users to this new OU. Create a
GPO, and link it to this new OU. Configure the new OU to block inheritance of the
RestrictU GPO.
c. Create a global group and add the three users as members. Configure GPO security fil-
tering so that the global group is denied access to the GPO.
d. Set the Enforced option on RestrictU with an Enforce filter that excludes the three user
accounts.
12. You have a new sales forecasting application that you want to make available to all users in
the Sales OU. You want them to be able to find this application on the Start menu of any
computer they log on to. What's the best way to do this?
a. Create a new GPO, and configure a Software Installation policy in the User Configuration
node to assign the application. Link the GPO to the Sales OU.
b. Create a new GPO, and configure a Software Installation policy in the User Configuration
node to publish the application. Link the GPO to the Sales OU.
c. Create a new GPO, and configure a Software Installation policy in the Computer
Configuration node to assign the application. Link the GPO to the Sales OU.
d. Create a new GPO, and configure a Software Installation policy in the Computer
Configuration node to publish the application. Link the GPO to the Sales OU.
13. You have been getting phone calls about resetting the password for a group of 10 part-time
employees, who work only one or two days per week and have limited access to network
resources. Because of domain account policies, they have to change their passwords every
14 days and are required to use complex passwords of at least 10 characters. You think
these users have a difficult time keeping up with their passwords because of their infrequent
Search WWH ::




Custom Search