MCSA Windows Server 2012 R2 Complete Study Guide. Panek William
Чтение книги онлайн.
Читать онлайн книгу MCSA Windows Server 2012 R2 Complete Study Guide - Panek William страница 11
A. The Sharing tab
B. The Advanced tab
C. The Device Settings tab
D. The Printing Preferences button
25. Isabel is a system administrator for an Active Directory environment that is running in Native mode. Recently, several managers have reported suspicions about user activities and have asked her to increase security in the environment. Specifically, the requirements are as follows:
■ The accessing of certain sensitive files must be logged.
■ Modifications to certain sensitive files must be logged.
■ System administrators must be able to provide information about which users accessed sensitive files and when they were accessed.
■ All logon attempts for specific shared machines must be recorded.
Which of the following steps should Isabel take to meet these requirements? (Choose all that apply.)
A. Enable auditing with the Computer Management tool.
B. Enable auditing with Group Policy Objects.
C. Enable auditing with the Active Directory Domains and Trusts tool.
D. Enable auditing with the Event Viewer tool.
E. View the audit log using the Event Viewer tool.
F. View auditing information using the Computer Management tool.
G. Enable failure and success auditing settings for specific files stored on NTFS volumes.
H. Enable failure and success auditing settings for logon events on specific computer accounts.
26. You are the network administrator for a large widget distributor. Your company’s network has 20 Windows 2012 R2 servers, and all of the clients are running either Windows 8 or Windows 7. All of your end users use laptops to do their work, and many of them work away from the office. What should you configure to help them work on documents when away from the office?
A. Online file access
B. Offline file access
C. Share permissions
D. NTFS permissions
27. Your company has decided to implement an external hard drive. The company IT manager before you always used FAT32 as the system partition. Your company wants to know whether it should move to NTFS. Which of the following are some advantages of NTFS? (Choose all that apply.)
A. Security
B. Quotas
C. Compression
D. Encryption
28. You have been hired by a small company to implement new Windows Server 2012 R2 systems. The company wants you to set up a server for users’ home folder locations. What type of server would you be setting up?
A. PDC server
B. Web server
C. Exchange server
D. File server
29. GPOs assigned at which of the following level(s) will override GPO settings at the domain level?
A. OU
B. Site
C. Domain
D. Both OU and site
30. A system administrator wants to ensure that only the GPOs set at the OU level affect the Group Policy settings for objects within the OU. Which option can they use to do this (assuming that all other GPO settings are the defaults)?
A. The Enforced option
B. The Block Policy Inheritance option
C. The Disable option
D. The Deny permission
31. Mateo, a system administrator, is planning to implement Group Policy objects in a new Windows Server 2012 R2 Active Directory environment. To meet the needs of the organization, he decides to implement a hierarchical system of Group Policy settings. At which of the following levels is he able to assign Group Policy settings? (Choose all that apply.)
A. Sites
B. Domains
C. Organizational units
D. Local system
32. Ann is a system administrator for a medium-sized Active Directory environment. She has determined that several new applications that will be deployed throughout the organization use registry-based settings. She would like to do the following:
■ Control these registry settings using Group Policy.
■ Create a standard set of options for these applications and allow other system administrators to modify them using the standard Active Directory tools.
Which of the following options can she use to meet these requirements? (Choose all that apply.)
A. Implement the inheritance functionality of GPOs.
B. Implement delegation of specific objects within Active Directory.
C. Implement the No Override functionality of GPOs.
D. Create administrative templates.
E. Provide administrative templates to the system administrators who are responsible for creating Group Policy for the applications.
33. You are the network administrator for your organization. A new company policy has been released wherein if a user enters their password incorrectly three times within 5 minutes, they are locked out for 30 minutes. What three actions do you need to set to comply with this policy? (Choose all that apply.)
A. Set Account Lockout Duration to 5 minutes.
B. Set Account Lockout Duration to 30 minutes.
C. Set the Account Lockout Threshold setting to 3 invalid logon attempts.
D. Set the Account Lockout Threshold setting to 30 minutes.
E. Set the Reset Account Lockout Counter setting to 5 minutes.
F. Set the Reset Account Lockout Counter setting to 3 times.
34. You are teaching a Microsoft Active Directory class, and one of your students asks you, “Which of the following containers in the Active Directory Users and Computers tool is used when users from outside the forest are granted access to resources within a domain?” What answer would you give your student?
A. Users