Filters
Question type

Study Flashcards

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?\


A) 256-bit encryption
B) 257-bit encryption
C) 1024 -bit encryption
D) 2048-bit encryption

Correct Answer

verifed

verified

By default, where are updates synchronized from in WSUS?


A) Microsoft Update servers on the Internet
B) The Windows Internal Database
C) The specified Microsoft SQL Server
D) Windows Server Update Services

Correct Answer

verifed

verified

What are the advantages of implementing a Windows Server Update Services (WSUS) server in an organization?

Correct Answer

verifed

verified

A WSUS server can be configured to regul...

View Answer

Navin wants to reduce the chances of a data breach and monitor and control the traffic on his company's website. Instead of using a NAT router, he sets up an external server that acts as a filter between the organization's website and end users. Which of the following options must Navin select and configure when configuring WSUS?


A) Store updates in the following location
B) Use a proxy server when synchronizin
C) Synchronize from another Windows Server Update Services server
D) Synchronize from Microsoft Update servers

Correct Answer

verifed

verified

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured?


A) Configure the Configure 802.1X wizard
B) Activate the server in Active Directory
C) Edit or remove existing RADIUS clients
D) Choose the EAP authentication method

Correct Answer

verifed

verified

While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?


A) WID connectivity
B) WSUS services
C) SQL server connectivit
D) Certification authority

Correct Answer

verifed

verified

What are the four main features provided by Windows Defender that can be configured? Give a brief description of each feature.

Correct Answer

verifed

verified

The four main features provided by Windo...

View Answer

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?


A) certmgr.msc
B) certlm.msc
C) wf.msc
D) gpedit.msc

Correct Answer

verifed

verified

Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?


A) The Online Responder role service
B) The Network Device Enrollment Service role service
C) The Certificate Enrollment Policy Web Service role service
D) The Certification Authority Web Enrollment role service

Correct Answer

verifed

verified

Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization . However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?


A) The OUs were under another domain.
B) The Block Inheritance setting prevented the OUs from applying the GPOs.
C) The users under the OUs declined the domain-level setting when prompted.
D) The GPO link was configured with the Enforced setting.

Correct Answer

verifed

verified

Lisa, the system administrator of a bank, is going on a sabbatical for 12 weeks. Before leaving, she must prepare a knowledge transfer document to assist her colleague who will oversee her responsibilities in her absence. The document must include a report of the properties and settings of the GPOs. List the steps that Lisa needs to follow to obtain this report.

Correct Answer

verifed

verified

To obtain GPO reports, Lisa should take ...

View Answer

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?


A) By using the Block Inheritance setting on the domain-level GPO
B) By using the Enforced setting on the OU-level GPOs for the OUs that contain the managers' accounts
C) By removing the Authenticated Users group from the Security Filtering section and adding the managers' accounts
D) By using a WMI filter to check for conditions under which the Default Domain Policy must be applied

Correct Answer

verifed

verified

List and briefly describe the folders in the Certification Authority tool that are used to manage and configure most CA functionalities.

Correct Answer

verifed

verified

The folders under the Certification Auth...

View Answer

Anthony is a server administrator and has been asked to configure and issue the Root Certification Authority certificate to all the users in his organization. The default template is a schema version 1 template, but Anthony wants users to be auto-enrolled. Briefly outline the steps Anthony can follow to create a new template to ensure that users are auto-enrolled.

Correct Answer

verifed

verified

Templates that list schema version 1 can...

View Answer

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers?


A) By using a WMI filter
B) By using the Security Filtering option
C) By setting Group Policy preferences
D) By modifying Software Settings under Group Policy

Correct Answer

verifed

verified

Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled?


A) Read
B) Write
C) Enroll
D) Autoenroll

Correct Answer

verifed

verified

If a newly created firewall allows connection to a program only if the connection is authenticated by IPSec, which of the following options was most likely selected in the Action pane in the New Inbound Rule Wizard at the time of creating the rule?


A) Authentication exemptio
B) Allow the connection
C) Allow the connection if it is secure
D) Block the connection

Correct Answer

verifed

verified

Showing 21 - 37 of 37

Related Exams

Show Answer