Preview

Lesson 10

Good Essays
Open Document
Open Document
672 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lesson 10
Matching
a. Common Information Management (CMOM) b. GPResult c. Group Policy Modeling
d. Group Policy Results e. Logging mode f. Planning mode
g. Resultant Set of Policy (RSoP)
h. Windows Management Instrumentation (WMI) i. WMI Filtering j. WMI Query Language (WQL)
___f____ 1. This RSoP mode allows administrators to simulate the effect of policy settings prior to implementing them on a computer or user
. ___b____ 2. This command- line utility allows you to create and display an RSoP query from the command line. ____c___ 3. This GPMC node is used to simulate the effect of a policy on the user and computer environment and replaces Planning mode in RSoP. ____i___ 4. This method of controlling GPO application uses filters written in the WMI Query Language (WQL) to determine whether a particular computer should have a GPO applied to it
. ___g____ 5. This MMC snap- in can be used in two possible modes to report actual or planned GPO settings for a particular user/ computer combination. ____d___ 6. This GPMC node is used to report on the actual GPO settings that are applied to a particular user and computer, and replaces Logging mode in RSoP. ___J___ 7. This language, similar to Structured Query Language (SQL), is used to create WMI filters to control the application of Group Policy. ___e____ 8. This RSoP mode queries existing policies in Active Directory to determine the effective GPO settings that are being applied to a user or computer.
___h____ 9. This is used by WMI to retrieve information about computer configuration, including hardware, Group Policy Software Installation Settings, Internet Explorer Maintenance settings, scripts, Folder Redirection settings, and Security settings. ____a___ 10. This is a component of the Microsoft Windows operating system that provides management information and control in an enterprise environment.
Multiple Choice
1. Which Resultant Set of Policy mode queries existing GPOs linked to sites, domains, and OUs to report

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    4. Which of the following is a detailed written definition of how software and hardware are to be used?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    9. Administrative Templates are a large repository of registry-based changes, by using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    On this paper I will be talking about and describing the definition of the RMON (Remote Network Monitoring) and how RMON probes are utilized in the network management system to help manager to better manage the network.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 1 Assignment

    • 4639 Words
    • 19 Pages

    Typically this constitutes an interface for communicating with the device, through the specific computer bus or communications subsystem that the hardware is connected to, providing commands to and/or receiving data from the device, and on the other end, the requisite interfaces to the operating system and software applications. It is a specialized hardware-dependent computer program which is also operating system specific that enables another program, typically an operating system or applications software package or computer program running under the operating system kernel, to interact transparently with a hardware device, and usually provides the requisite interrupt handling necessary for any necessary asynchronous time-dependent hardware interfacing…

    • 4639 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Data base administrator

    • 529 Words
    • 3 Pages

    (3) Ability to perform both DB2 and also operating system performance monitoring and the necessary adjustments.…

    • 529 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Network management entities can be programmed to notify of operations, logs or shutdown on the system, and deploy repair tools. These programmable entities can check values in the end station for variables in the cisco environment for immediate response by the means of agents which are software modules. That helps the management units or entities with stored info in a manage database by these agents through the means of network management protocol such as SNMP or CMIP.…

    • 553 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    The Remediation Server provides the approved compliant settings templates for the clients. A noncompliant device needs to meet policy compliance and remediation is performed before it is allowed into the trusted network. For remote access clients, authorized and unauthorized network traffic will use separate security domains such as Virtual Local Area Networks.…

    • 505 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CSEC 630 Final Exam

    • 1055 Words
    • 4 Pages

    Includes descriptions of security groups and their relationship to one another. This section maps group policies to security groups.…

    • 1055 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    understand the appropriate use of GPOs and how they can be used to ease system administration.…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab1 questions

    • 491 Words
    • 2 Pages

    10. Where in the policy definition do you define how to implement this policy within you organization?…

    • 491 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Group Policy is used to set up configuration settings that can be applied to objects such as…

    • 2298 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    Reference Code: GDTC22599FSA One Microsoft Way Redmond, WA 98052-6399 United States Phone Fax Website Exchange www.microsoft.com MSFT [NASDAQ] +1 425 8828080 Revenue Net Profit Employees Industry Publication Date: FEB 2012 69,943 (million USD) 23,150 (million USD) 90,000 Technology Communications and…

    • 17851 Words
    • 72 Pages
    Powerful Essays
  • Good Essays

    • Remote Network Monitoring (RMON) was g( ) developed to help us understand how the network itself is functioning,eg network itself is functioning,eg…

    • 1254 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Lesson 10

    • 1786 Words
    • 25 Pages

    Preservation of Food with Ionizing Energy Lesson 10 1 Assigned Readings – n Smith, J.S. and Pillai, S. 2004. Irradiation and Food safety. Food Technol. n Fact sheet on Food Irradiation http://www.inspection.gc.ca/food/information-for-consumers/fact-sheets/labelling-food-packaging-and-storage/irradiation/eng/1332358607968/1332358680017 n Frequently Asked Questions regarding Food Irradiation 2 Terminology n Radiation ¨ ¨ n Food irradiation ¨ n Rays of energy Emission and propagation of energy through matter or space by electromagnetic disturbances Application of radiation, as ionizing energy, to foods Electromagnetic spectrum ( of radiation) Radiation Is the Energy!…

    • 1786 Words
    • 25 Pages
    Good Essays
  • Satisfactory Essays

    mashawer case study

    • 386 Words
    • 2 Pages

    1. What kinds of applications are described in this case? What business functions do they support?…

    • 386 Words
    • 2 Pages
    Satisfactory Essays