Chapter 009 Performing Software Installation with Group Policy in Windows Server 2008 R2

Card Set Information

Author:
pacheco2001usa
ID:
217703
Filename:
Chapter 009 Performing Software Installation with Group Policy in Windows Server 2008 R2
Updated:
2013-05-04 19:34:58
Tags:
Chapter 009 Performing Software Installation Group Policy Windows Server 2008 R2
Folders:

Description:
Chapter 009 Performing Software Installation with Group Policy in Windows Server 2008 R2
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user pacheco2001usa on FreezingBlue Flashcards. What would you like to do?


  1. What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use?
    a) software life cycle
    b) software longevity cycle
    c) software duration cycle
    d) software usage cycle
    • Ans: a
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: The process that takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use is referred to as the software life cycle. The software life cycle is a derivative of the System Development Life Cycle (SDLC).
  2. Which of the following is not a phase of the software life cycle?a) planningb) implementationc) evaluationd) removal
    • Ans: c
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: The four phases of the software life cycle are planning, implementation, maintenance, and removal.
  3. Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
    a) .exe
    b) .msi
    c) .mse
    d) .inf
    • Ans: b
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into an .msi file. An .msi file is a relational database file that is copied to the target computer system with the program files it deploys.
  4. Modifications to .msi files require transform files, which have the __________ extension.
    a) .msit
    b) .mse
    c) .msx
    d) .mst
    • Ans: d
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
    • Feedback: At times, you may need to modify Windows Installer files to better suit the needs of your corporate network. Modifications to .msi files require transform files, which have an .mst extension.
  5. __________ files are used to apply service packs and hotfixes to installed software.
    a) Update
    b) Patch
    c) Upgrade
    d) Enhanced
    • Ans: b
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: Windows Installer files with the .msp extension serve as patch files. Patch files are used to apply service packs and hotfixes to installed software. Unlike an .msi file, a patch package does not include a complete database. Instead, it contains, at minimum, a database transform procedure that adds patching information to the target installation package database.
  6. Before deploying software using Group Policy, what must you create?
    a) deployment share
    b) deployment point
    c) distribution share
    d) mount point
    • Ans: c
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: Before deploying software using Group Policy, you must create a distribution share. This shared folder, also named the software distribution point, is a network location from which users can download the software that they need.
  7. What option allows users to install the applications that they consider useful to them?
    a) Assign
    b) Require
    c) Amend
    d) Publish
    • Ans: d
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: As part of configuring a GPO for software installation, you have to decide whether you are going to use the Assign or Publish option for deploying the application. The Assign option is helpful when you are deploying required applications to pertinent users and computers. The Publish option allows users to install the applications that they consider useful to them.
  8. What option is helpful when you are deploying required applications to pertinent users and computers?
    a) Assign
    b) Require
    c) Amend
    d) Publish
    • Ans: a
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: As part of configuring a GPO for software installation, you must decide whether you are going to use the Assign or Publish option for deploying the application. The Assign option is helpful when you are deploying required applications to pertinent users and computers. The Publish option allows users to install the applications that they consider useful to them
  9. What allows published applications to be organized within specific groupings for easy navigation?
    a) software classifications
    b) software methods
    c) software categories
    d) software assignments
    • Ans: c
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
    • Feedback: Software categories allow published applications to be organized within specific groupings for easy navigation.
  10. What policies are designed to identify software and control its execution?
    a) Software Restriction
    b) Software Execution Prevention
    c) Malicious Software Detection
    d) Malicious Software Removal Policies
    • Ans: a
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
    • Feedback: First introduced in Windows Server 2003 and Windows XP operating systems, the options in the Software Restriction Policies node provide organizations greater control in preventing potentially dangerous applications from running. Software restriction policies are designed to identify software and control its execution. In addition, administrators can control who will be affected by the policies.
  11. When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
    a) Unrestricted
    b) Restricted
    c) Basic User
    d) Disallowed
    • Ans: c
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
    • Feedback: The Basic User software restriction policy prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users
  12. By default, the Software Restriction Policies area has what value in the Default Security Level setting?
    a) Unrestricted
    b) Restricted
    c) Basic User
    d) Disallowed
    • Ans: a
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
    • Feedback: By default, the Software Restriction Policies area has an Unrestricted value in the Default Security Level setting.
  13. Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?a) hash ruleb) certificate rulec) Path ruled) all of the above
    • Ans: d
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: Four types of software restriction rules can be used to govern which programs can or cannot run on your network. These are hash rules, certificate rules, path rules, and network zone rules.
  14. What is a series of bytes with a fixed length that uniquely identifies a program or file?
    a) algorithm
    b) hash
    c) policy
    d) IP address
    • Ans: b
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: A hash is a series of bytes with a fixed length that uniquely identifies a program or file.
  15. What identifies software by specifying the directory path where the application is stored in the file system?
    a) hash rule
    b) certificate rule
    c) path rule
    d) network zone rules
    • Ans: c
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
    • Feedback: A path rule identifies software by specifying the directory path where the application is stored in the file system. Path rules can be used to create an exception rule to allow an application to execute when the Default Security Level for software restriction policies is set to Disallowed, or they can be used to prevent an application from executing when the Default Security Level for software restriction policies is set to Unrestricted.
  16. What type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network?
    a) hash rule
    b) certificate rule
    c) path rule
    d) network zone rules
    • Ans: d
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
    • Feedback: Network zone rules apply only to Windows Installer packages that attempt to install from a specified zone such as a local computer, a local intranet, trusted sites, restricted sites, or the Internet. This type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network.
  17. When implementing multiple Software Restriction Policy rules, which rule is always applied last?
    a) hash rule
    b) certificate rule
    c) path rule
    d) network zone rules
    • Ans: c
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
    • Feedback: When implementing multiple rule types, rules are applied in the following order: hash rules, certificate rules, network zone rules, and path rules.
  18. What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?
    a) enforcement
    b) designated file types
    c) security settings
    d) trusted publishers
    • Ans: a
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
    • Feedback: Enforcement properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded. This is the most practical method of enforcement.
  19. What Software Restriction Policy properties allow an administrator to control how certificate rules are handled?
    a) enforcement
    b) designated file types
    c) security settings
    d) trusted publishers
    • Ans: d
    • Difficulty: Hard
    • Section Ref: Managing Software through Group PolicyFeedback: The Trusted Publishers properties allow an administrator to control how certificate rules are handled.
  20. What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?
    a) .msi
    b) .exe
    c) .zap
    d) .ini
    • Ans: c
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
    • Feedback: When repackaging an application is not an option and a Windows Installer file is not available, you can use a .zap file to publish an application. A .zap file is a non–Windows Installer package that can be created in a text editor. A .zap file looks and functions very similarly to an .ini file.
  21. The implementation phase of the software life cycle includes the elements that are required to keep the software running smoothly.
    • Ans: False
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  22. When repackaging an application is not an option and a Windows Installer file is not available, you can use a .zap file to publish an application.
    • Ans: True
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  23. The Assign option allows users to install the applications that they consider useful to them.
    • Ans: False
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  24. When configuring Software Restriction Policies, the Disallowed option allows all applications to run except those that are specifically excluded.
    • Ans: False
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  25. The Disallowed Default Security Level should be used cautiously because all applications will be restricted unless explicitly allowed.
    • Ans: True
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  26. The software life cycle is a derivative of the System __________ Life Cycle.
    • Ans: Development
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  27. The __________ phase is the final phase before the software life cycle begins again with a new software deployment plan.
    • Ans: removal
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  28. A(n) __________ file is a relational database file that is copied to the target computer system with the program files it deploys.
    • Ans: .msi
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  29. Before deploying software using Group Policy, you must create a(n) __________ share.
    • Ans: distribution
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  30. If you use the __________ option, you must also decide whether you will assign the application to a computer or a user account.
    • Ans: Assign
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  31. Use the __________ option to provide all installation messages and screens for users during the installation of all packages in the GPO.
    • Ans: Maximum
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
  32. When customizing software installation packages, use the __________ tab to specify the transform (.mst) files or patch (.msp) files that are to be applied to the package.
    • Ans: Modifications
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  33. The Software __________ Policies node is found in the Windows Settings\Security Settings\ node of the User Configuration or the Computer Configuration node of a Group Policy.
    • Ans: Restriction
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  34. A hash is computed by a hash __________, which in effect creates a fingerprint of the file.
    • Ans: algorithm
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
  35. A(n) __________ rule identifies software by specifying the directory path where the application is stored in the file system.
    • Ans: path
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  36. What is the client-side component of Windows Installer?
    • Ans: Windows Installer Service
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  37. When repackaging an application is not an option and a Windows Installer file is not available, what type of file can be used to publish an application?
    • Ans: .zap file
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  38. What allows published applications to be organized within specific groupings for easy navigation?
    • Ans: software categories
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  39. What is designed to identify software and control its execution?
    • Ans: Software Restriction Policies
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  40. When configuring Software Restriction Policies, what option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
    • Ans: Basic User
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  41. What is generated by a formula that makes it nearly impossible for another program to have the same hash?
    • Ans: hash value
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  42. What can be used to allow software from a trusted source to run or prevent software that does not come from a trusted source from running?
    • Ans: certificate rule
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
  43. What rules apply only to Windows Installer packages that attempt to install from a specified zone such as a local computer, local intranet, trusted sites, restricted sites, or the Internet?
    • Ans: network zone rules
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy
  44. What are the four stages of the software life cycle?
    • Ans: planning, implementation, maintenance, and removal
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  45. What two methods can be used to install software with Group Policy when no .msi file exists?
    • Ans: You can repackage the original installation file or create a .zap file.
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  46. What is an .msi file?
    • Ans: An .msi file is a relational database file that is copied to the target computer system with the program files it deploys. In addition to providing installation information, this database file assists in the self-healing process for damaged applications and clean application removal.
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  47. What two options exist when choosing how to deploy software with Group Policy?
    • Ans: Assign and Publish.
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  48. What are Software Restriction Policies?
    • Ans: Software Restriction Policies are designed to identify software and control its execution.
    • Difficulty: Easy
    • Section Ref: Managing Software through Group Policy
  49. What are the three basic strategies for enforcing software restrictions?
    • Ans: Unrestricted, Disallowed, and Basic User
    • Difficulty: Medium
    • Section Ref: Managing Software through Group Policy
  50. What four types of software restriction rules can be used to govern which programs can run on your network?
    • Ans: hash rule, certificate rule, path rule, and network zone rule
    • Difficulty: Hard
    • Section Ref: Managing Software through Group Policy

What would you like to do?

Home > Flashcards > Print Preview