1,224
13
Review, 6 pages (1400 words)

Chapter 18-19 test review

What service works with Group Policy to install, upgrade, patch, or remove software applications? Windows Installer

What is required to prepare applications with an approval stamp from Microsoft on its packaging, including the Certified for Windows Server 2012 logo, for Windows Installer? Nothing—the application is Windows Installer-enabled

When configuring a GPO to deploy a software package, what is the difference between assigning and publishing the application? Assigning forces the application, whereas publishing provides the option to install.

After deploying software by GPO using the Published option, where is the package made available for the user? Windows Control Panel

After deploying software by GPO using the Assigned option, where is the package made available for the user? Start menu or desktop

When configuring software restriction policies, there are four rules that help determine the programs that can or cannot run. Select which of the following is NOT one of those rules. File location rule

Not all software on the market provides . msi support. What is your best option to use Windows Installer to assign and publish the software? Repackage the software for Windows Installer.

What is AppLocker also known as? Application control policies

In what Group Policy objects container are AppLocker settings located? Computer ConfigurationWindows SettingsSecurity SettingsApplication Control PoliciesAppLocker

What Windows versions support the use of AppLocker polices, which poses a disadvantage compared to using software restriction policies? Windows 7 and Windows Server 2008 R2 or later

How does AppLocker handle all executables, installer packages, and scripts by default? AppLocker blocks all by default, except for those specified in Allow rules.

What service does AppLocker require running to function properly? Application Identity

What are the three default security levels within software restriction policies? Unrestricted, Disallowed, and Basic User

Unrestricted, Disallowed, and Basic User are the three default security levels of —-. software restriction policies

What is the greatest advantage of AppLocker over software restriction policies? You can create rules automatically.

What service uses the three file types: . msi, . mst, and . msp? Windows Installer

What’s a best practice precautionary step regarding compatibility before distributing applications to all users? Testing them, separately, and all together

The functionality of __________ depends on the rules that identify software, followed by the rules that govern its usage. software restriction policies

After you create a new software restriction policy, what folder enables you to create rules that specify the conditions under which programs can be executed or denied? Additional Rules folder

If a software package is set as Assigned, the option to Install This Application At Logon is available. This option enables the application to be installed immediately, rather than advertised on the Start menu. However, when should this method be avoided? If users have slow links between their workstations and the software distribution point

What is the most common way to implement software restriction policies? Linking Group Policy objects to Active Directory Domain Services containers, so that you can apply their policy settings to several computers simultaneously

You want to deploy software using Group Policy. What is necessary before assigning the software to a user account? You must create a distribution share, also called a software distribution point. Then create the Group Policy Object, specifying how to deploy the application.

When installing software using Group Policy, what file or files does an administrator use? Windows Installer package files, or . msi files—modifications to the package files require transform files, or . mst files. Further, patch files are designated as . msp files.

Software restriction relies on four types of rules to specify which programs can or cannot run. What type uses a digital certificate to confirm its legitimacy? Certificate

Software restriction relies on four types of rules to specify which programs can or cannot run. What type identifies software by its directory where the application is stored in the file system? Path

Software restriction relies on four types of rules to specify which programs can or cannot run. What type relies on a value generated by an algorithm that creates a fingerprint of the file, which makes it impossible for another program to have the same value? Hash

Software restriction relies on four types of rules to specify which programs can or cannot run. What type enables Windows Installer packages to be installed only if they come from a trusted area of the network? Network zone

Firewall rules function in two ways: admit all traffic, except that which conforms to the applied rules, and secondly, block all traffic, except that which conforms to the applied rules. How does the Windows Firewall work for inbound traffic and for outbound traffic? Inbound—block all. Outbound—permit all

What does a firewall protect your company against? Network intrusion attempts, such as a denial of service attack

Windows Firewall uses three profiles to represent the type of network to which the server is connected. What are the three profiles? Domain, private, and public

For the Windows Firewall private profile, what type of network is expected? An internal network that is not accessible by unauthorized users

What does the term ” filter” refer to in the Windows Firewall With Advanced Security console? The ability to display inbound or outbound rules according to a profile

If a user attempts to use an Internet-based e-mail account, how will Windows Firewall respond? The firewall does not block client-initiated network traffic by default.

What tool offers more flexibility in creating rules compared with the Windows Firewall interface under Control Panel? Windows Firewall With Advanced Security snap-in for the Microsoft Management console

In the Windows Firewall With Advanced Security console, while creating a new rule, the Program page specifies whether the ______. rule applies to all programs, to one specific program, or to a specific service

By exporting the Windows Firewall policy, you have a file with a . wfw extension that contains _____. all its rules, including the preconfigured rules and the ones you have created or modified

If an administrator wants to enable the ” Block all incoming connections, including those in the list of allowed apps” setting, to which of the firewall profiles does it apply? Public, private, and domain

Windows Firewall allows an administrator to import and export firewall rules. What are the rules’ file extension?. wfw

What is the typical incoming port number for a web server? 80

You can configure the Windows Firewall to allow or block specific _________. ports, protocols, applications, users, and IP address ranges

What GPO node presents the interface with which to configure Windows Firewall properties? Computer ConfigurationPoliciesWindows SettingsSecurity SettingsWindows Firewall with Advanced Security

Which of the three Windows Firewall profiles is most appropriate for a library kiosk? Public

Which of the three Windows Firewall profiles is most appropriate for a company file and print server? Private

Which of the three Windows Firewall profiles is most appropriate for a company domain controller? Domain

Which of the three firewall profiles will turn on the firewall by default? All three: domain, private, and public

A firewall is essentially a series of _____ that examine the contents of packets and the traffic patterns to and from the network to determine which packets they should allow to pass through. filters

What is the primary objective of a firewall? To permit traffic in and out for legitimate users, and to block the rest

In Windows Firewall Customized Settings, there are three profiles (public, private, and domain). What differentiates these profiles from each other? Public is for servers accessible to temporary users. Private is for servers on an internal network. Domain is for servers in which users are all authenticated.

When creating a firewall exception, what is the difference between opening a port and allowing an application through? Allowing an application opens the specified port only while the program is running, and thus is less risky.

Windows Firewall allows you to create inbound, outbound, and connection security rules for individual servers or systems. How can you do this for multiple systems? You can create a new Group Policy Object and you can import settings from a policy file created earlier. Then deploy the GPO to other systems on the network.

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the IP address range of local and remote systems to which the rule applies? Scope

What parameter in the Windows Firewall New Inbound Rule Wizard specifies the exact type of traffic at the network or transport layer, which the firewall can block or allow? Protocol and Ports

What parameter in the Windows Firewall New Inbound Rule Wizard specifies what the firewall should do when a packet matches the rule? Action

What parameter in the Windows Firewall New Inbound Rule Wizard specifies whether the rule applies to all programs, to one specific program, or to a specific service? Program

ONCHAPTER 18-19 TEST REVIEW SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder Now

Thank's for Your Vote!
Chapter 18-19 test review. Page 1
Chapter 18-19 test review. Page 2
Chapter 18-19 test review. Page 3
Chapter 18-19 test review. Page 4
Chapter 18-19 test review. Page 5
Chapter 18-19 test review. Page 6
Chapter 18-19 test review. Page 7
Chapter 18-19 test review. Page 8
Chapter 18-19 test review. Page 9

This work, titled "Chapter 18-19 test review" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Review

References

AssignBuster. (2022) 'Chapter 18-19 test review'. 30 September.

Reference

AssignBuster. (2022, September 30). Chapter 18-19 test review. Retrieved from https://assignbuster.com/chapter-18-19-test-review/

References

AssignBuster. 2022. "Chapter 18-19 test review." September 30, 2022. https://assignbuster.com/chapter-18-19-test-review/.

1. AssignBuster. "Chapter 18-19 test review." September 30, 2022. https://assignbuster.com/chapter-18-19-test-review/.


Bibliography


AssignBuster. "Chapter 18-19 test review." September 30, 2022. https://assignbuster.com/chapter-18-19-test-review/.

Work Cited

"Chapter 18-19 test review." AssignBuster, 30 Sept. 2022, assignbuster.com/chapter-18-19-test-review/.

Get in Touch

Please, let us know if you have any ideas on improving Chapter 18-19 test review, or our service. We will be happy to hear what you think: [email protected]