Term
This feature of Group Policy software installation will automatically reinstall critical application files if they are accidentally or maliciously deleted |
|
Definition
|
|
Term
Group Policy software installations rely on this file type to create an installation package that can be cleanly Assigned and Published and that has self-healing capabilities. |
|
Definition
|
|
Term
This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run |
|
Definition
|
|
Term
This Group Policy software installation option is not available in the Computer Configuration node. |
|
Definition
|
|
Term
When deploying software with Group Policy, you need to create one or more of these to house the installation files for the applications that you wish to deploy |
|
Definition
|
|
Term
This software restriction policy rule will prevent executables from running if they have been modified in any way by a user, virus, or piece of malware |
|
Definition
|
|
Term
If you need to deploy a software installation package that does not have an .msi file available, you can create one of these as an alternative |
|
Definition
|
|
Term
This describes a series of bytes with a fixed length that uniquely identifies a program or file |
|
Definition
|
|
Term
This software restriction policy rule will allow or prevent applications from running that are located within a particular folder or subfolder |
|
Definition
|
|
Term
This GPO software installation method can be used to automatically install an application when a computer starts up or a user logs in |
|
Definition
|
|
Term
Which of the following rule types apply only to Windows Installer packages? a. Hash rules b. Certificate rules c. Internet zone rules d. Path rules |
|
Definition
Internet Zone Rules
Internet Zone rules in a Software Restriction Policy can only be applied to Microsoft Software Installation files, which are installer files that end in a .MSI file extension |
|
|
Term
Which file type is used by Windows Installer? a. .inf b. .bat c. .msf d. .msi file |
|
Definition
.msi file
Microsoft Software Installation files end in a .MSI file extension. |
|
|
Term
Which of the following is not one of the Default Security Levels that can be used with a software restriction policy? a. Basic User b. Unrestricted c. Restricted d. Disallowed |
|
Definition
Restricted
Restricted is not a default security level that can be applied within a Software Restriction Policy |
|
|
Term
As part of your efforts to deploy all new applications using Group Policy, you discover that several of the applications you wish to deploy do not include the necessary installer files. What can you use to deploy these applications? a. Software restriction policies b. .msi files c. .mdb files d. .zap files |
|
Definition
.zap files
If an application that you want to deploy via GPO does not possess an MSI installer file, you can create a ZAP installation file that will have limited capabilities within GPO software installation |
|
|
Term
Which of the following describes the mathematical equation that creates a digital "fingerprint" of a particular file? a. Hash rule b. Hash algorithm c. Software restriction policy d. Path rule |
|
Definition
Hash algorithm
A hash algorithm describes the mathematical equation used to create a digital fingerprint, or hash, of a particular file. |
|
|
Term
Which of the following rules will allow or disallow a script or a Windows Installer file to run on the basis of how the file has been signed? a. Path rule b. Hash rule c. Network zone rule d. Certificate rule |
|
Definition
Certificate Rule
A certificate rule within a Software Restriction Policy will allow or prevent executables from running on the basis of the PKI certificate used with the software |
|
|
Term
You wish to deploy several software applications using Group Policy, such that the applications can be manually installed by the users from the Add/Remove Programs applet in their local Control Panel. Which installation option should you select? a. Assign b. Disallowed c. Publish d. Unrestricted |
|
Definition
Publish
By Publishing software via GPO, users have the option to add the published software manually via the Add/Remove programs Control Panel applet |
|
|
Term
You have assigned several applications using GPOs. Users have complained that there is a delay when they double-click on the application icon, which you know is the result of the application being installed in the background. What option can you use to pre-install assigned applications when users log on or power on their computers? a. Uninstall when the application falls out of scope b. Install This Application At Logon c. Advanced Installation Mode d. Path rule |
|
Definition
Install this application at Logon
When publishing software via GPO, the Install this application at logon option automatically installs all assigned software when the user first logs on, preventing subsequent delays when double-clicking a file associated with an assigned application for the first time |
|
|
Term
Which of the following is used to develop information systems software through a structured process that includes analysis, design, implementation, and maintenance? a. Hash algorithm b. System Development Life Cycle c. Software Restriction Policy d. Group Policy Object |
|
Definition
System Development Life Cycle
The SDLC is used to analyze, deploy, and maintain an organization’s process for deploying mission-critical and line-of-business applications over time |
|
|
Term
Which of the following Default Security Levels in Software Restriction Policies will disallow any executable from running that has not been explicitly enabled by the Active Directory administrator? a. Basic User b. Restricted c. Disallowed d. Power User |
|
Definition
Disallowed
The Disallowed default security level within a Software Restriction Policy prevents any software from running that an administrator has not explicitly permitted to run |
|
|