Question: Question 1 ( 1 point ) Which term refers to the process whereby a user or computer obtains a certificate from a CA ? Question

Question 1(1point)
Which term refers to the process whereby a user or computer obtains a certificate from a CA?
Question 1options:
a)
PKI
b)
enrollment
c)
revocation
d)
hashing
Question 2(1point)
What can you configure in the Windows Defender Firewall with Advanced Security tool to automatically protect network traffic between computers using IPSec?
Question 2options:
a)
IPSec rules
b)
Connection security rules
c)
Firewall profiles
d)
Security Associations
Question 3(1point)
Which of the following statements regarding the functionality of WSUS are true? (Choose all that apply.)
Question 3options:
Group Policy is used to direct domain computers to a WSUS server for updates.
WSUS prevents Microsoft Update traffic from saturating the bandwidth on an organizations Internet connection.
A WSUS server can be configured to remove updates from computers that have installed them.
Updates can be manually or automatically approved for distribution on a WSUS server.
Question 4(1point)
There are no GPOs created in an Active Directory domain by default. True or False?
Question 4options:
a)Trueb)False
Question 5(1point)
You can import administrative template files into a GPO to allow Group Policy to configure third-party software settings. True or False?
Question 5options:
a)Trueb)False
Question 6(1point)
Firewall profiles contain a series of firewall rules that apply to a computer when it is connected to a particular type of network (public,private, domain).True or False?
Question 6options:
a)Trueb)False
Question 7(1point)
Group Policy settings apply to which of the following objects? (Choose all that apply.)
Question 7options:
Computers
Groups
Users
Forest
Question 8(1point)
Group Policy preferences can be used to configure Windows features, but are only interpreted by Windows 7,Windows Server 2008,and later computers by default. True or False?
Question 8options:
a)Trueb)False
Question 9(1point)
Which of the following is not included in a certificate?
Question 9options:
a)
Private key
b)
CRL location
c)
Public key
d)
Digital signature
Question 10(1point)
Group Policy can be configured to auto-enroll certificates for users and computers based on the permissions in a certificate template on an enterprise CA.True or False?
Question 10options:
a)Trueb)False
Question 11(1point)
Which section of a GPO contains the most security-related settings for the Windows operating system?
Question 11options:
a)
Computer Configuration, Administrative Templates
b)
User Configuration, Windows Settings
c)
Computer Configuration, Windows Settings
d)
User Configuration, Administrative Templates
Question 12(1point)
To reduce the amount of storage that is consumed by updates on a WSUS server, you should configure the WSUS server to only synchronize updates for products that are deployed in your organization. True or False?
Question 12options:
a)Trueb)False
Question 13(1point)
You wish to configure a GPO that allows users in your organization to install a package using the Programs and Features section of Control Panel. Which software deployment method should you choose when configuring the Software Settings section of a GPO?
Question 13options:
a)
Publish the software in the User Configuration
b)
Assign the software in the User Configuration
c)
Assign the software in the Computer Configuration
d)
Publish the software in the Computer Configuration
Question 14(1point)
Which of the following Windows Defender features can be used to limit the files, folders and processes that ransomware can modify?
Question 14options:
a)
Memory integrity
b)
Controlled folder access
c)
Secure boot
d)
Core isolation
Question 15(1point)
You have created a new Group Policy Object (GPO).To which of the following objects can this GPO be linked? (Choose all that apply.)
Question 15options:
OU
Site
Domaine
Group

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!