70-411 R2 Test Bank Lesson 19

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

70-411 Test Bank, Lesson 19 Configuring Group Policy Processing

17 Multiple Choice
6 Short Answer
4 Best Answer
4 Build List
4 Repeated Answer
35 questions

Multiple Choice
1. Which feature affects all users in the domain, including domain controllers?
a. Global Group Policy
b. Default Domain Policy
c. Default Group Policy
d. Default Global Domain Policy
Answer: b
Difficulty: Medium
Section Ref: Understanding Group Policy Inheritance
Explanation: The Default Domain Policy is linked to the domain and affects all users
and computers in the domain, including domain controllers.
2. In which order are Group Policy objects (GPOs) processed?
a. Local group policy, Site, Domain, User
b. OU, Domain, Site, Local group policy
c. Local security policy, Site, Domain, OU
d. Local group policy, Site, Domain, OU
Answer: d
Difficulty: Hard
Section Ref: Understanding Group Policy Inheritance
Explanation: GPOs are processed in the following order:
Domain, and OU.

Local group policy, Site,

3. What is the default timeout value for GPOs to process on system startup?
a. 60 seconds
b. 120 seconds
c. 300 seconds

d. 600 seconds
Answer: d
Difficulty: Medium
Section Ref: Configuring Processor Order and Precedence
Explanation: Computer configuration settings are applied synchronously (one by
one) during computer startup before the user sees the Logon dialog box. If any
startup scripts are configured through GPOs, they are processed synchronously and
have a default timeout of 600 seconds (10 minutes) to complete.
4. GPOs are processed on computer startup and after logon. Why is the user never
aware of the processing?
a. Processing is hidden from the user.
b. The user is too busy to be aware of the processing.
c. The processing occurs when the system is not being used.
d. The user is aware of only startup delays.
Answer: a
Difficulty: Medium
Section Ref: Configuring Processor Order and Precedence
Explanation: Because the user has not logged on yet, the process is hidden.
5. What is the first step in the GPO processing order?
a. The user initiates interactive logon.
b. The computer obtains a list of GPOs from the domain controller.
c. The computer establishes a secure link to the domain controller.
d. The GPOs are applied to the computer and to the user.
Answer: c
Difficulty: Medium
Section Ref: Configuring Processor Order and Precedence
Explanation: Group policies are processed in the following way: When a computer
first starts up, it establishes a secure link between the computer and a domain
controller.
6. The downward flow of group policies is known as what feature of GPOs?
a. cumulative processing
b. inherent processing
c. inheritance
d. control
Answer: c
Difficulty: Easy
Section Ref: Understanding Group Policy Inheritance

Explanation: By default, a Group Policy uses inheritance, in which settings are


inherited from the container above. In other words, group policy settings flow down
into the lower containers and objects.
7. If a site, domain, or OU has multiple GPOs, how are the group policies processed?
a. by precedence
b. by importance
c. by administrative control
d. by GPO controller policy
Answer: a
Difficulty: Medium
Section Ref: Understanding Group Policy Inheritance
Explanation: If a site, domain, or OU has multiple GPOs, group policies are
processed in order as stated by its precedence. A GPO with higher precedence
(lower number) prevails over a GPO with lower precedence (higher number).
8. Which two filters can you use to control who or what receives a group policy?
a. policy filter
b. security group filter
c. domain filter
d. WMI filter
Answer: b and d
Difficulty: Medium
Section Ref: Configuring Security Filtering and WMI Filtering
Explanation: For granular control of which clients (computers and users) receive a
group policy, you can use security group and WMI filtering.
9. For users to receive GPO settings, they must have which two permissions to the
GPO?
a. Allow Read
b. Allow Write
c. Allow Modify
d. Allow Apply
Answer: a and d
Difficulty: Hard
Section Ref: Using Security Filtering
Explanation: For users to receive GPO settings, they must have Allow Read and
Allow Apply Group Policy permissions to the GPO.
10. By default, which GPO permissions are all authenticated users given?
a. Apply Group

b. Allow Group
c. Apply Global
d. Allow Global
Answer: a
Difficulty: Medium
Section Ref: Using Security Filtering
Explanation: By default, the Authenticated Users give the Apply Group Policy
permissions.
11. At what point are WMI filters evaluated?
a. when the filter is created
b. when the policy is applied
c. when the filter is applied
d. when the policy is processed
Answer: d
Difficulty: Hard
Section Ref: Using WMI Filtering
Explanation: WMI filtering configures a GPO to be applied to certain users or
computers based on specific hardware, software, operating systems, and services.
The filter is evaluated at the time the policy is processed.
12. To use WMI filters, you must have one domain controller running which version
of Windows Server or higher?
a. NT 4.0
b. 2000
c. 2003
d. There is no such requirement to use WMI filters.
Answer: c
Difficulty: Medium
Section Ref: Using WMI Filtering
Explanation: To use WMI filters, you need to have one domain controller running
Windows Server 2003 or higher.
13. How many WMI filters can be configured for a GPO?
a. one
b. two
c. four
d. eight
Answer: a
Difficulty: Medium

Section Ref: Using WMI Filtering


Explanation: Only one WMI filter can be configured per GPO. After a WMI filter is
created, it can be linked to multiple GPOs.
14. What kind of group policies should you enable for student computers?
a. generic
b. loopback
c. extensive
d. compliant
Answer: b
Difficulty: Medium
Section Ref: Configuring Loopback Processing
Explanation: As the name implies, loopback processing allows the Group Policy
processing order to circle back and reapply the computer policies after all user
policies and logon scripts run. Loopback is intended to keep the configuration of the
computer the same regardless of who logs on.
15. What is the primary purpose of running the Group Policy Results Wizard? Check
all that apply.
a. to guarantee that GPOs are enforced in full
b. to analyze the cumulative effect of GPOs
c. for GPO troubleshooting
d. to ensure that you have administrative rights to the client computer
Answer: b and c
Difficulty: Medium
Section Ref: Troubleshooting GPOs
Explanation: To help you analyze the cumulative effect of GPOs and policy settings
on a user or computer in your organization, you can run the Group Policy Results
Wizard.
16. You are administrator of a corporation with clients running Windows 8 or
Windows 8.1. Your domain controllers are running Windows Server 2012 R2. You
have made a change to a GPO and you want the GPO settings to be applied
immediately. What can you do?
a. At the domain controller, execute the Gpupdate /force command.
b. Copy the GPO to all domain controllers using Active Directory Sites and Services.
c. On the domain controller, execute the Windows PowerShell Invoke-GPUpdate
cmdlet.
d. Enable the Group Policy Caching feature using a GPO.
Answer: c
Difficulty: Medium

Section Ref: Configuring and Managing Slow-Link Processing and Group Policy
Caching
Explanation: You can update the Group Policy settings for all computers (Windows
Vista or higher; or Windows Server 2008 or higher) in an organizational unit (OU) by
using the Group Policy Management Console or by using the Windows PowerShell
Invoke-GPUpdate cmdlet.
17. Which of the following Windows 8.1 and Windows Server 2012 R2 features can
speed up the performance of processing synchronous policy settings?
a. GPO Turbo Mode
b. GPO Enhanced Mode
c. Group Policy Update
d. Group Policy Caching
Answer: d
Difficulty: Medium
Section Ref: Forcing Group Policy Update
Explanation: Starting with Windows 8.1 and Windows Server 2012 R2, you can
cache GPOs to improve performance when processing synchronous policy settings.
When Group Policy gets the latest version of a policy from the domain controller, it
writes that policy to a local store (c:\windows\system32\GroupPolicy\Datastore). If
Group Policy is running in synchronous mode, it reads the most recently downloaded
version of the GPO from the local store when the system is rebooted.

Short Answer
18. Group policy settings affect computers and users. When do the group policies go
into effect for each?
Answer: User policies are applied at logon and computer policies are applied at
system startup.
Difficulty: Medium
Section Ref: Configuring Processor Order and Precedence
Explanation: When configuring group policies, the settings are applied to the
computer or the user. Computer configuration settings are processed when a
computer starts, and user configuration settings are processed when a user logs on.
19. What is the purpose of Group Policy loopback processing?
Answer: The purpose is to reapply computer policies after the user logs on so that
every user has the same policies applied. It is to enforce a consistent computing
environment.
Difficulty: Medium
Section Ref: Configuring Loopback Processing

Explanation: As the name implies, loopback processing allows the Group Policy
processing order to circle back and reapply the computer policies after all user
policies and logon scripts run. Loopback is intended to keep the configuration of the
computer the same regardless of who logs on.
20. What four conditions must exist for you to be able to run the Group Policy
Results Wizard?
Answer: The target computer must be online, you must have administrative rights
on the target computer, the operating system must be Windows XP or higher, WMI
must be running and ports 135 and 445 must not be blocked by firewall.
Difficulty: Hard
Section Ref: Troubleshooting GPOs
Explanation: To run the Group Policy Results Wizard, the following must be true: The
target computer must be online; you must have administrative credentials on the
target computer; the target computer must run Windows XP or newer; and WMI
must be running on the target computer, and ports 135 and 445 must be available
to access WMI on the target computer.
21. What is the command-line command to see the Group Policy Results from user
Bob on computer DESK01?
Answer: gpresult /s DESK01 /user Bob /r
Difficulty: Medium
Section Ref: Troubleshooting GPOs
Explanation: The command version of the Group Policy Results Wizard is
GPResult.exe. To view the Group Policy Results, execute the following command:
gpresult /s computername /user username /r
22. What happens to the GPOs for computers that are disconnected from the
network?
Answer: They stay in place but others such as logon, logoff, and shutdown scripts
are suspended in a disconnected state.
Difficulty: Medium
Section Ref: Looking at GPOs and Disconnected Computers
Explanation: If a computer is disconnected from the network, the settings previously
applied by group policies continue to take effect. If you are not connected to the
network, the logon, logoff, and shutdown scripts will not run, because they might
rely on other servers to execute.
23. Explain the difference between Replace mode GPO and Merge mode GPO.

Answer: In Replace mode, the GPO of the computer overwrites that of the user. In
Merge mode, theyre combined. GPO settings always take precedence over any
other settings.
Difficulty: Medium
Section Ref: Configuring Loopback Processing
Explanation: You have two modes to choose from that specify the loopback
processing mode:
Replace modeThe user settings defined in the computers GPO replaces the
user settings normally applied to the user.
Merge modeThe user settings defined in the computers GPOs and user
settings normally applied to the user are combined. If the settings conflict,
the user settings in the computers GPO take precedence over the users
normal settings.

Best Answer
24. Which utility do you use to set up loopback policies?
a. Server Manager
b. Active Directory Users and Groups
c. Group Policy Management Editor
d. PowerShell
Answer: c
Difficulty: Medium
Section Ref: Configuring Loopback Processing
Explanation: The loopback policy is enabled using the Group Policy Management
Editor, specifically the Computer Configuration\Administrative
Templates\System\Group Policy\Configure user Group Policy Loopback processing
mode.
25. How are client-side extensions applied?
a. as part of group policies
b. as startup and logon scripts
c. to the local computer or currently logged-on user
d. as part of another policy
Answer: c
Difficulty: Medium
Section Ref: Configuring Client-Side Extension Behavior
Explanation: Group policies are client driven, which means that the Group Policy
client pulls the GPOs from the domain, which triggers processes called client-side
extensions (CSEs) that interrupt the settings in a GPO and make the changes to the
local computer or the currently logged-on user.

26. What is the best method of dealing with slow-link processing?


a. increasing the link bandwidth above 500 kbps
b. changing the slow-link policy processing behavior
c. disabling GPO processing for slow-link systems
d. placing a read-only domain controller at the slow-link site
Answer: b
Difficulty: Medium
Section Ref: Configuring and Managing Slow-Link Processing and Group Policy
Caching
Explanation: You can change the slow-link policy processing behavior of each CSE
by using policy settings located in Computer Configuration\Policies\Administrative
Templates\System\Group Policy.
27. Where would using Replace mode GPOs be appropriate?
a. in a classroom
b. in a developer environment
c. in a group of system administrator users
d. in a graphic design department
Answer: a
Difficulty: Medium
Section Ref: Configuring Loopback Processing
Explanation: The Replace mode is useful in a situation such as a kiosk, classroom, or
public library, where users should receive a standard configuration.

Build List
28. Order the following steps required to configure a security group filter.
a. Open the Group Policy Management console.
b. Add the Administrators group.
c. Select the Delegation tab and then select Advanced.
d. Select Administrators and then select Deny for the Apply Group Policy option.
e. Select the GPO to be modified.
Answer: A E C B D
Difficulty: Medium
Section Ref: Using Security Filtering
Explanation: Refer to the steps in Configure a Security Group Filtering.
29. Order the following steps required to assign a WMI filter to a GPO.
a. Right-click WMI filters and then click New.

b. Assign the WMI filter to a GPO via the Scope drop-down list.
c. Add a WMI query.
d. Enter the query information.
e. Enter a Name and Description for the new WMI filter.
f. Open the Group Policy Management console.
Answer: F A E C D B
Difficulty: Medium
Section Ref: Using WMI Filtering
Explanation: Refer to the steps outlined under Use WMI with GPOs.
30. Order the following steps required to run the Group Policy Results wizard.
a. Select the user under the Group Policy Results node.
b. Right-click Group Policy Results and select Group Policy Results Wizard.
c. View the info on the Details tab.
d. Open the Group Policy Management console.
e. Select a user on the User Selection page.
f. Select Another Computer and enter the name of a computer.
Answer: D B F E A C
Difficulty: Medium
Section Ref: Troubleshooting GPOs
Explanation: Refer to the steps outlined under Run the Group Policy Results Wizard.
31. Order the steps to run the Group Policy Modeling Wizard.
a. Place the user into an OU.
b. Select Slow network connection or Loopback processing on the Advanced
Simulations page.
c. Select any WMI filters.
d. Add or remove security groups to the computer.
e. Place the computer into an OU.
f. Add or remove security groups to/from the user.
g. Right-click Group Policy Modeling and then select Group Policy Modeling Wizard.
h. Open the Group Policy Management console.
Answer: H G A E B F D C
Difficulty: Medium
Section Ref: Troubleshooting GPOs
Explanation: Refer to the steps outlined under Run the Group Policy Modeling
Wizard.

Repeated Answer

32. What feature uses a security access list (ACL) to determine who can modify or
read a policy and who or what a GPO is applied to?
a. Windows Management Instrumentation (WMI)
b. WMI filtering
c. security group filtering
d. inheritance
Answer: c
Difficulty: Medium
Section Ref: Configuring Security Filtering and WMI Filtering
Explanation: Security group filtering uses an ACL to determine who can modify or
read a policy and who or what a GPO is applied to.
33. What component extends the Windows Driver Model to provide an interface to
the operating system to provide information and notification on hardware, software,
operating systems, and services?
a. Windows Management Instrumentation (WMI)
b. WMI filtering
c. security group filtering
d. inheritance
Answer: a
Difficulty: Medium
Section Ref: Using WMI Filtering
Explanation: Windows Management Instrumentation (WMI) is a component that
extends the Windows Driver Model to provide an interface to the operating system
to provide information and notification on hardware, software, operating systems,
and services.
34. How do group policy settings flow down into the lower containers and objects?
a. Windows Management Instrumentation (WMI)
b. WMI filtering
c. security group filtering
d. inheritance
Answer: d
Difficulty: Medium
Section Ref: Understanding Group Policy Inheritance
Explanation: By default, a Group Policy uses inheritance, in which settings are
inherited from the container above. In other words, group policy settings flow down
into the lower containers and objects.
35. What feature configures a GPO to be applied to certain users or computers
based on specific hardware, software, operating systems, and services?

a. Windows Management Instrumentation (WMI)


b. WMI filtering
c. security group filtering
d. inheritance
Answer: b
Difficulty: Medium
Section Ref: Using WMI Filtering
Explanation: WMI filtering configures a GPO to be applied to certain users or
computers based on specific hardware, software, operating systems, and services.

You might also like