1. What type of object will you create to enable multiple password policies within a Windows Server 2008 domain? a. msDS-MinimumPasswordLength b. msDS-MultiplePasswordPolicies c. PasswordSettingsObject (PSO) d. msDS-PasswordObject b 2. Which configuration item has a default value of 90 minutes for workstations and member servers, with a random offset of 0 to 30 minutes to optimize network performance? a. Refresh time b. Refresh interval c. Clock skew d. Clock interval d 3. To determine which users are accessing resources on a particular member server in an Active Directory domain, which event type would you audit?
a. Account logon event b. Policy change event c. Account management event d. Logon event a 4. Monitoring a system such as Active Directory for the success and/or failure of specific user actions is called a. auditing b. inspecting c. scanning d. sniffing c 5. Which audit category includes events such as server startup and shutdown, time changes, and clearing the security log within the Windows Event Viewer? a. Process tracking b. Privileged use c. System Events d. Policy management Knowledge assessment continues on the next page WR7 – 3 Week Seven Assignments a 6.
Which feature allows you to control how much space a user can take on a particular hard drive volume, configurable via Group Policy? a. Disk quotas b. Folder redirection c. Offline files d. Object access auditing d 7. To prevent users from re-using a certain number of network passwords, what can you configure as part of a domain-wide policy or as part of a Fine-Grained Password Policy? a. Minimum password length b. Minimum password age c. Maximum password age d. Enforce password history b 8. A PasswordSettingsObject (PSO) within Active Directory is also known as which type of object?
a. msDS-PasswordSettingsPrecedence b. msDS-PasswordSettings c. msDS-PasswordComplexityEnabled d. msDS-MinimumPasswordLength c 9. Which Group Policy feature allows users to access user files when the user is disconnected from the corporate network? a. Folder redirection b. Disk quotas c. Offline files d. Object access auditing b 10. Which audit event type is triggered when user or group accounts are created, deleted, renamed, enabled, or disabled? a. Account logon events b. Account management events c. Privileged use events d. Policy management events
IT222 Microsoft Network Operating System II 1. Knowledge Assessment: Lesson 9 – Software Distribution (50 points). a. Match the following definitions with the appropriate term. WR7 – 4 Definition a. This feature of Group Policy software installation will automatically reinstall critical application files if they are accidentally or maliciously deleted. b. Group Policy software installations rely on this file type to create an installation package that can be cleanly Assigned and Published and that has self-healing capabilities. c.
This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run. d. This Group Policy software installation option is not available in the Computer Configuration node. e. When deploying software with Group Policy, you need to create one or more of these to house the installation files for the applications that you wish to deploy. f. his software restriction policy rule will prevent executables from running if they have been modified in any way by a user, virus, or piece of malware.
g. If you need to deploy a software installation package that does not have an . msi file available, you can create one of these as an alternative. h. This describes a series of bytes with a fixed length that uniquely identifies a program or file. i. This software restriction policy rule will allow or prevent applications from running that are located within a particular folder or subfolder. j. This GPO software installation method can be used to automatically install an application when a computer starts up or a user logs in. g j