Deck 4: Designing and Implementing Group Policy

ملء الشاشة (f)
exit full mode
سؤال
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.

A) CN
B) OU
C) DC
D) DN
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.

A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
سؤال
Universal group membership information is only contained in the ____.

A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
سؤال
Group Policy is normally applied every ____ minutes.

A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
سؤال
When global groups are added to other global groups it is commonly called ____.

A) cascading
B) nesting
C) aggregating
D) concatenating
سؤال
The ____ setting is useful to control the membership of any group in Active Directory.

A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
سؤال
In group policy settings, ____ are used to manage many of the interfaces, such as Control Panel, Network, Printers, System, and other Windows components.

A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
سؤال
The only technical reasons to design OUs are ____.

A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
سؤال
You must be a member of the Domain Admins group to create a PSO.
سؤال
The GPO order of precedence is ____.

A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
سؤال
On proxy servers, ____ is used to conserve bandwidth usage.

A) caching
C) nesting
B) parsing
D) forward lookup
سؤال
The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.

A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
سؤال
OUs are difficult to modify.
سؤال
Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.

A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
سؤال
____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template
C) Reference
B) Starter
D) Instantiated
سؤال
A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.

A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
سؤال
In group policy settings, ____ allow you to set and configure different settings on users' computers.

A) preferences
C) standards
B) options
D) configurations
سؤال
GPOs can be linked to either the Users container or the Computers container.
سؤال
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
سؤال
Because users see OUs, the OUs must follow a structure understood by the users.
سؤال
Discuss two ways that the GPO can be filtered.
سؤال
You can only block inheritance at the ____ level.

A) OU
C) site
B) container
D) forest
سؤال
List and describe the three default policies of IPSec.
سؤال
Discuss what printer location policies can be used for.
سؤال
The real strength of universal groups is realized with ____________________ domains.
سؤال
Normally, only the ____ group is in the Security Filtering area.

A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
سؤال
Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.

A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
سؤال
____ allows the inspection of systems to look for specific conditions on a computer, and is widely used with scripting.

A) IPMI
C) SNMP
B) WMI
D) HTTP
سؤال
The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
سؤال
The _________________________ design is a simple OU design based on the structure of the organization.
سؤال
What is the most common use of WMI filters?
سؤال
Discuss how OUs should be named.
سؤال
What are the two commands that can be used to redirect computer accounts and user accounts?
سؤال
The acceptable values for the PSO "mustHave" attribute msDS-msDS-LockoutThreshold are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
سؤال
Discuss reasons to use OUs.
سؤال
Among the most risky devices in an organization are ____________________ flash drives.
سؤال
Describe the geography structure for OUs.
سؤال
Actual GPOs are commonly named based on their ____________________.
سؤال
The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
سؤال
Describe the Kerberos policy within Group Policy.
سؤال
Explain how to create fine-grained policies.
سؤال
Match between columns
Used in a multiple-domain environment
universal groups
Used in a multiple-domain environment
global groups
Used in a multiple-domain environment
domain local groups
Used in a multiple-domain environment
Software settings
Used in a multiple-domain environment
Windows settings
Used in a multiple-domain environment
IPSec
Used in a multiple-domain environment
loopback processing
Used in a multiple-domain environment
fine-grained account policies
Used in a multiple-domain environment
password policy
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
universal groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
global groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
domain local groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Software settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Windows settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
IPSec
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
loopback processing
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
fine-grained account policies
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
password policy
Used to organize users in the same domain
universal groups
Used to organize users in the same domain
global groups
Used to organize users in the same domain
domain local groups
Used to organize users in the same domain
Software settings
Used to organize users in the same domain
Windows settings
Used to organize users in the same domain
IPSec
Used to organize users in the same domain
loopback processing
Used to organize users in the same domain
fine-grained account policies
Used to organize users in the same domain
password policy
Allows the GPO settings for a computer to override the settings applied to a user
universal groups
Allows the GPO settings for a computer to override the settings applied to a user
global groups
Allows the GPO settings for a computer to override the settings applied to a user
domain local groups
Allows the GPO settings for a computer to override the settings applied to a user
Software settings
Allows the GPO settings for a computer to override the settings applied to a user
Windows settings
Allows the GPO settings for a computer to override the settings applied to a user
IPSec
Allows the GPO settings for a computer to override the settings applied to a user
loopback processing
Allows the GPO settings for a computer to override the settings applied to a user
fine-grained account policies
Allows the GPO settings for a computer to override the settings applied to a user
password policy
Can be used to assign permissions to resources within the domain
universal groups
Can be used to assign permissions to resources within the domain
global groups
Can be used to assign permissions to resources within the domain
domain local groups
Can be used to assign permissions to resources within the domain
Software settings
Can be used to assign permissions to resources within the domain
Windows settings
Can be used to assign permissions to resources within the domain
IPSec
Can be used to assign permissions to resources within the domain
loopback processing
Can be used to assign permissions to resources within the domain
fine-grained account policies
Can be used to assign permissions to resources within the domain
password policy
Allow an organization to have more than one account policy within a single domain
universal groups
Allow an organization to have more than one account policy within a single domain
global groups
Allow an organization to have more than one account policy within a single domain
domain local groups
Allow an organization to have more than one account policy within a single domain
Software settings
Allow an organization to have more than one account policy within a single domain
Windows settings
Allow an organization to have more than one account policy within a single domain
IPSec
Allow an organization to have more than one account policy within a single domain
loopback processing
Allow an organization to have more than one account policy within a single domain
fine-grained account policies
Allow an organization to have more than one account policy within a single domain
password policy
Can be used to automate the deployment of applications within the network
universal groups
Can be used to automate the deployment of applications within the network
global groups
Can be used to automate the deployment of applications within the network
domain local groups
Can be used to automate the deployment of applications within the network
Software settings
Can be used to automate the deployment of applications within the network
Windows settings
Can be used to automate the deployment of applications within the network
IPSec
Can be used to automate the deployment of applications within the network
loopback processing
Can be used to automate the deployment of applications within the network
fine-grained account policies
Can be used to automate the deployment of applications within the network
password policy
Includes items such as minimum age and minimum password length
universal groups
Includes items such as minimum age and minimum password length
global groups
Includes items such as minimum age and minimum password length
domain local groups
Includes items such as minimum age and minimum password length
Software settings
Includes items such as minimum age and minimum password length
Windows settings
Includes items such as minimum age and minimum password length
IPSec
Includes items such as minimum age and minimum password length
loopback processing
Includes items such as minimum age and minimum password length
fine-grained account policies
Includes items such as minimum age and minimum password length
password policy
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
universal groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
global groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
domain local groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Software settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Windows settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
IPSec
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
loopback processing
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
fine-grained account policies
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
password policy
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Designing and Implementing Group Policy
1
The ____ can be used to identify individual users, or non-OU containers such as the Users or Computers container.

A) CN
B) OU
C) DC
D) DN
A
2
____ refers to how Group Policy is applied and what settings take precedence if there are problems with two conflicting settings.

A) GPO order of hiding
B) GPO order of encapsulation
C) GPO order of inheritance
D) GPO order of precedence
D
3
Universal group membership information is only contained in the ____.

A) global catalog
B) DNS server
C) GlobalNames Zone
D) RID master
A
4
Group Policy is normally applied every ____ minutes.

A) 10 to 30
C) 90 to 120
B) 30 to 45
D) 60 to 240
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
When global groups are added to other global groups it is commonly called ____.

A) cascading
B) nesting
C) aggregating
D) concatenating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
The ____ setting is useful to control the membership of any group in Active Directory.

A) Restrict Group Policy
C) Lock Group Membership
B) Block Inheritance
D) Restrict Group Membership
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
In group policy settings, ____ are used to manage many of the interfaces, such as Control Panel, Network, Printers, System, and other Windows components.

A) administrative policies
C) administrative zones
B) administrative templates
D) administrative preferences
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
The only technical reasons to design OUs are ____.

A) administrative control and software distribution
B) administrative control and well-organized structure
C) to delegate control or manage security policy
D) to delegate control or manage objects using Group Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
You must be a member of the Domain Admins group to create a PSO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The GPO order of precedence is ____.

A) domain, parent OUs, children OUs, site
B) site, parent OUs, children OUs, domain
C) site, domain, parent OUs, children OUs
D) site, domain, children OUs, parent OUs
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
On proxy servers, ____ is used to conserve bandwidth usage.

A) caching
C) nesting
B) parsing
D) forward lookup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
The ____ on the proxy server translates private addresses to public addresses and public addresses back to private.

A) PAT protocol
C) HTTP protocol
B) NAP protocol
D) NAT protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
OUs are difficult to modify.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
Internet Protocol Security (IPSec) provides confidentiality by encrypting the data using ____.

A) Internet Key Exchange
C) Encrypted Security Header
B) Encapsulated Security Payload
D) Authentication Header
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
____ GPOs are templates of GPOs that can accelerate the use of GPOs in an organization.

A) Template
C) Reference
B) Starter
D) Instantiated
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
A(n) ____ strategy can deploy applications, lock down computers, and reduce the total cost of ownership for computers in an organization.

A) Domain Policy
B) Security Policy
C) Group Policy
D) Administration Policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
In group policy settings, ____ allow you to set and configure different settings on users' computers.

A) preferences
C) standards
B) options
D) configurations
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
GPOs can be linked to either the Users container or the Computers container.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
You can apply Group Policy objects (GPOs) to sites, domains, and Organizational Units (OUs).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
Because users see OUs, the OUs must follow a structure understood by the users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Discuss two ways that the GPO can be filtered.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
You can only block inheritance at the ____ level.

A) OU
C) site
B) container
D) forest
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
List and describe the three default policies of IPSec.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Discuss what printer location policies can be used for.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
The real strength of universal groups is realized with ____________________ domains.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
Normally, only the ____ group is in the Security Filtering area.

A) Security Policy Administrators
C) Domain Administrators
B) Domain Users
D) Authenticated Users
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
Sometimes, you might not want inherited Group Policies to apply to an OU; this can be achieved by setting the ____.

A) Block Settings
C) Block Inheritance
B) Restrict Inheritance
D) Disable Inheritance
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
____ allows the inspection of systems to look for specific conditions on a computer, and is widely used with scripting.

A) IPMI
C) SNMP
B) WMI
D) HTTP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
The acceptable values for the PSO "mustHave" attribute msDS-PasswordSettingsPrecedence are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
The _________________________ design is a simple OU design based on the structure of the organization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
What is the most common use of WMI filters?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Discuss how OUs should be named.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
What are the two commands that can be used to redirect computer accounts and user accounts?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
The acceptable values for the PSO "mustHave" attribute msDS-msDS-LockoutThreshold are ____.

A) 0 through 65,535 (values of 3 and 5 commonly used)
B) 0 through 1024 (24 commonly used)
C) Anything greater than 0 (only used if more than one PSO applies)
D) 0 through 255 values of 8 to 15 often used
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
Discuss reasons to use OUs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
Among the most risky devices in an organization are ____________________ flash drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe the geography structure for OUs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Actual GPOs are commonly named based on their ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
The ____________________ Policy includes the account lockout duration, threshold, and the time to reset the account lockout counter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
Describe the Kerberos policy within Group Policy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Explain how to create fine-grained policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Used in a multiple-domain environment
universal groups
Used in a multiple-domain environment
global groups
Used in a multiple-domain environment
domain local groups
Used in a multiple-domain environment
Software settings
Used in a multiple-domain environment
Windows settings
Used in a multiple-domain environment
IPSec
Used in a multiple-domain environment
loopback processing
Used in a multiple-domain environment
fine-grained account policies
Used in a multiple-domain environment
password policy
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
universal groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
global groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
domain local groups
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Software settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
Windows settings
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
IPSec
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
loopback processing
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
fine-grained account policies
Include the ability to have scripts run at certain times, configure a wide variety of security settings, and implement a TCP/IP-based Quality of Service policy to throttle outbound traffic
password policy
Used to organize users in the same domain
universal groups
Used to organize users in the same domain
global groups
Used to organize users in the same domain
domain local groups
Used to organize users in the same domain
Software settings
Used to organize users in the same domain
Windows settings
Used to organize users in the same domain
IPSec
Used to organize users in the same domain
loopback processing
Used to organize users in the same domain
fine-grained account policies
Used to organize users in the same domain
password policy
Allows the GPO settings for a computer to override the settings applied to a user
universal groups
Allows the GPO settings for a computer to override the settings applied to a user
global groups
Allows the GPO settings for a computer to override the settings applied to a user
domain local groups
Allows the GPO settings for a computer to override the settings applied to a user
Software settings
Allows the GPO settings for a computer to override the settings applied to a user
Windows settings
Allows the GPO settings for a computer to override the settings applied to a user
IPSec
Allows the GPO settings for a computer to override the settings applied to a user
loopback processing
Allows the GPO settings for a computer to override the settings applied to a user
fine-grained account policies
Allows the GPO settings for a computer to override the settings applied to a user
password policy
Can be used to assign permissions to resources within the domain
universal groups
Can be used to assign permissions to resources within the domain
global groups
Can be used to assign permissions to resources within the domain
domain local groups
Can be used to assign permissions to resources within the domain
Software settings
Can be used to assign permissions to resources within the domain
Windows settings
Can be used to assign permissions to resources within the domain
IPSec
Can be used to assign permissions to resources within the domain
loopback processing
Can be used to assign permissions to resources within the domain
fine-grained account policies
Can be used to assign permissions to resources within the domain
password policy
Allow an organization to have more than one account policy within a single domain
universal groups
Allow an organization to have more than one account policy within a single domain
global groups
Allow an organization to have more than one account policy within a single domain
domain local groups
Allow an organization to have more than one account policy within a single domain
Software settings
Allow an organization to have more than one account policy within a single domain
Windows settings
Allow an organization to have more than one account policy within a single domain
IPSec
Allow an organization to have more than one account policy within a single domain
loopback processing
Allow an organization to have more than one account policy within a single domain
fine-grained account policies
Allow an organization to have more than one account policy within a single domain
password policy
Can be used to automate the deployment of applications within the network
universal groups
Can be used to automate the deployment of applications within the network
global groups
Can be used to automate the deployment of applications within the network
domain local groups
Can be used to automate the deployment of applications within the network
Software settings
Can be used to automate the deployment of applications within the network
Windows settings
Can be used to automate the deployment of applications within the network
IPSec
Can be used to automate the deployment of applications within the network
loopback processing
Can be used to automate the deployment of applications within the network
fine-grained account policies
Can be used to automate the deployment of applications within the network
password policy
Includes items such as minimum age and minimum password length
universal groups
Includes items such as minimum age and minimum password length
global groups
Includes items such as minimum age and minimum password length
domain local groups
Includes items such as minimum age and minimum password length
Software settings
Includes items such as minimum age and minimum password length
Windows settings
Includes items such as minimum age and minimum password length
IPSec
Includes items such as minimum age and minimum password length
loopback processing
Includes items such as minimum age and minimum password length
fine-grained account policies
Includes items such as minimum age and minimum password length
password policy
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
universal groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
global groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
domain local groups
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Software settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
Windows settings
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
IPSec
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
loopback processing
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
fine-grained account policies
A protocol that can be used to provide both confidentiality and authentication when data is transmitted on a network
password policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.