Which of the following methods of deployment has mason most likely used in the given scenario?

Alonso, a system administrator, has configured and deployed a new GPO at the domain level in his organization . However, when he checks after a few hours, two of the OUs in the Active Directory do not reflect the change. What is the most likely reason the new GPO configuration did not apply to the two OUs?

Which of the following methods of deployment has mason most likely used in the given scenario?

Fatima is configuring a Windows Server 2019 system as a RADIUS server for use with 802.1X Wireless. She has configured the Network Policy and Access Services server role. What is the next step Fatima should take once the server role has been configured?

When a CA public/private key pair expires, a system administrator must generate a new CA public/private key pair the same day to ensure a smooth transition.

Yosef has configured Windows Server 2019 as an enterprise CA and deployed a GPO to enroll all the users for certificates. He chooses the setting that will enroll the users when they boot their computers. When he checks whether all users and computers have been enrolled, he finds that five users were not enrolled for the certificate. Yosef was able to manually enroll those users for certificates. Which of the following permissions to the certificate template is most likely to be missing for the five users who did not get enrolled?

Answer:

Which of the following methods of deployment has mason most likely used in the given scenario?
Unlock to view answer

Stephen sets up manual enrollment for a user certificate from an enterprise CA. However, as he completes the process, he realizes that he has accidently set up the enrollment for a computer certificate rather than a user certificate. Which of the following commands did Stephen most likely type in the Command Prompt window?

Answer:

Unlock to view answer

Denali wants to store information about all Windows updates on a specific Microsoft SQL Server for security reasons. Which of the following wizards can Denali use to set up SQL Server Connectivity to store update information?

Answer:

Unlock to view answer

Giselle, a systems administrator, creates a file redirection GPO, in the User Configuration section that automatically saves files created by her colleagues to a shared network device instead of the local drives in their computers. However, the computers do not receive the configuration specified in the GPO. She runs the gpupdate /force command in the Command Prompt window of one of her colleagues' computer. Despite her effort, the computer does not receive the GPO, and she decides to rectify the issue the next day. To her surprise, she sees that the computer has been configured as per the GPO. What do you see as the issue with the GPO configuration?

Answer:

Unlock to view answer

If multiple GPOs are linked to the same site, domain, or OU, they will be applied in a random order.

Answer:

Unlock to view answer

XM GraFix, a graphics design company, has bought new design software. Mason, the system administrator, wants to install the software on all the computers in the design department. However, not all the designers need the software. Using the GPO, Mason uses a deployment method that allows the users to install the program from the network when they need it. Which of the following methods of deployment has Mason most likely used in the given scenario?

Answer:

Unlock to view answer

While configuring Windows Server 2019 as a WSUS server, which of the following role services would you select to store information about updates in the Windows Internal Database?

Answer:

Unlock to view answer

Which of the following is true of Group Policy Objects (GPOs)?

Answer:

Unlock to view answer

David, a system administrator, has created specific GPOs for every department in his organization based on the permissions required by the various departments. However, he needs to apply the Default Domain Policy for some managers but not for the rest of the users. How can David ensure that the Default Domain Policy is applied only to specific managers' accounts?

Answer:

Unlock to view answer

A 257-bit encryption key is twice as difficult to guess compared to a 256-bit encryption key.

Answer:

Unlock to view answer

Sasha is configuring Windows Server 2019 as an enterprise CA. She installs the Active Directory Certificate Services server role and is prompted to choose the role services that she wishes to install. Which of the following role services should Sasha select to ensure that routers are allowed to obtain certificates?

Answer:

Unlock to view answer

Amina, who works for a pharmaceutical company, configures and issues the Smartcard Logon certificate template with schema version 2. While most of the users get auto-enrolled, some of the users fail to obtain the certificate. Identify the most likely reason auto-enrollment failed for these users.

Answer:

Unlock to view answer

Having heard the data theft suffered by a competing company by a man-in-the-middle attack, Finn asks Talia, his server administrator, to implement measures to prevent such attacks in his company. Which of the following should Talia do to ensure that Finn's company is protected from such attacks?

Answer:

Unlock to view answer

WPA3 is immune to wireless cracking tools because it uses a Wi-Fi password in a different way than WPA2 does.

Answer:

Unlock to view answer

Amber is a hacker who steals information when people enter their personal details on specific websites. She intercepts the public key as it is sent from the Web server to the Web browser and substitutes her own public key in its place. This enables her to intercept the communication and decrypt the symmetric encryption key using her private key. Which type of hacking attack is Amber perpetrating?

Answer:

Unlock to view answer

What is the level of encryption of the public/private key pair that is contained in the domain-server-CA in Microsoft Server 2019?\

Answer:

Unlock to view answer

Ramona, the chief technical officer of an engineering company, needs to install software on 32-bit computers using GPO. The system network consists of over 500 computers and has a mix of 32-bit and 64-bit computers. How can Ramona ensure that the software is installed only on the 32-bit computers?

Answer:

Unlock to view answer