Information Technology Reference
In-Depth Information
working hours. What can you do to reduce phone calls from them without compromising
the security of other users' passwords?
a. Place these users and their computers in their own OU. Create a new GPO with less
restrictive password settings, and link it to the new OU.
b. Remove these users' computers from the domain and set a local GPO with less restric-
tive password settings on each of their computers.
c. Place these users and their computers in their own OU. In GPMC, create a new PSO in
the Group Policy Objects folder, and link it to the OU.
d. Add the part-time users to a global group. Use ADSI Edit to create a new PSO, and link
the PSO to the global group.
14. You have been working with ADMX files to modify existing Administrative Templates and
to create new templates. You work on different domain controllers, depending on your loca-
tion. Despite a concerted effort, your ADMX files are getting out of sync. How can you solve
this problem?
a. Remove group policy management tools from all but one domain controller so that poli-
cies can be managed from only one computer.
b. Create an ADMX store in the Sysvol share, and copy the ADMX files to the ADMX store.
c. Create an ADMX store in Active Directory, and move all your ADMX files to Active
Directory.
d. Share the %systemroot%\PolicyDefinitions folder on all your domain controllers, and
set up Task Scheduler to copy ADMX files automatically from one system to all other
systems.
15. You have set up roaming profiles for all users in your network, but users are complaining
that logon and logoff take a long time. You investigate and arrive at a solution that doesn't
require users to change the way they work and can be implemented quickly. Which solution
did you most likely choose?
a. Upgrade your network infrastructure to increase bandwidth.
b. Forbid users from storing files in their profile folders.
c. Set folder redirection policies.
d. Revert back to nonroaming policies.
16. You're concerned that some domain controllers and workstations don't meet security
requirements. What should you do to verify security settings on a computer against a list of
known settings?
17. None of the computers in an OU seem to be getting computer policies from the GPO linked
to the OU, but users in the OU are getting user policies from this GPO. Which of the fol-
lowing is a possible reason that computer policies in the GPO aren't affecting the comput-
ers? (Choose all that apply.)
a. The GPO link is disabled.
b. The Computer Configuration settings are disabled.
c. The computer accounts have Deny Read permission.
d. The OU has the Block Inheritance option set.
18. You need to move some user and computer accounts in Active Directory, but before you do,
you want to know how these accounts will be affected by the new group policies they will
be subject to. What can you do?
a.
7
Run Secedit.exe.
b.
Run Group Policy Modeling.
c.
Run Group Policy Results.
d.
Run RSoP.
Search WWH ::




Custom Search