Preview

Lesson 9

Good Essays
Open Document
Open Document
673 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lesson 9
Matching
a) zap file
b) Assign
c) Basic User
d) hash
e) path rule
f) Publish
g) self- healing
h) distribution share
i) msi file
j) hash rul
___g____ 1. This feature of Group Policy software installation will automatically reinstall critical application files if they are accidentally or maliciously deleted. ___i____ 2. Group Policy software installations rely on this file type to create an installation package that can be cleanly Assigned and Published and that has self- healing capabilities. ___c____ 3. This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run. ___f____ 4. This Group Policy software installation option is not available in the Computer Configuration node. ___h____ 5. When deploying software with Group Policy, you need to create one or more of these to house the installation files for the applications that you wish to deploy. ___j____ 6. This software restriction policy rule will prevent executables from running if they have been modified in any way by a user, virus, or piece of malware. ___a____ 7. If you need to deploy a software installation package that does not have an msi file available, you can create one of these as an alternate
___d____ 8. This describes a series of bytes with a fixed length that uniquely identifies a program or file. ___e____ 9. This software restriction policy rule will allow or prevent applications from running that are located within a particular folder or subfolder. ___b____ 10. This GPO software installation method can be used to automatically install an application when a computer starts up or a user logs in.

Multiple Choice
1. Which of the following rule types apply only to Windows Installer packages? a. Hash rules b. Certificate rules c. Internet zone rules d. Path rules 2. Which file type is used by Windows Installer?
a. . inf b. . bat c. . msf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Create a Policy whereby users cannot install new software to a machine without opening a ticket with the helpdesk or requesting administrator access (ICECC, 2009). The student computers should be preloaded with all required…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    9. Administrative Templates are a large repository of registry-based changes, by using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    moaclabsonline

    • 891 Words
    • 5 Pages

    7. Select the I accept the license terms check box and click Next. The Which type of installation do you want? page appears.…

    • 891 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Better Essays

    effective a baseline installation of the Operating System is required. With the use of In-…

    • 885 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Case 14 3

    • 1468 Words
    • 7 Pages

    In such arrangements, the guidance in this Subtopic applies to the software and software-related elements in the arrangement unless a scope exception in paragraph 985-605-15-4 is present. Software-related elements include software products and services such as those listed in paragraph 985-605-25-5.A service is within the scope of this Subtopic if software in the arrangement is essential to the functionality of that service”…

    • 1468 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 3 Flashcards

    • 519 Words
    • 3 Pages

    What is the graphical utility that installers can use to create distribution shares and answer files that automate and customize Windows 7 installations?…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    2. What tools do you use to create domain and ADS? Group policy management console…

    • 1304 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Bus311

    • 2336 Words
    • 10 Pages

    Lomio, J. P. (1990, June). Intellectual Property Law and the Protection of Computer Programs. 13(3), p. 31. Retrieved May 2013, from http://search.proquest.com.prosxy.library.ashford.edu/docview/213823477?…

    • 2336 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Windows 7

    • 906 Words
    • 4 Pages

    Which of the following is NOT an objective when performing a large-scale Windows 7 deployment?…

    • 906 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    The Group Policy Object oversees these Group Policy settings that are displayed in definition below. These can be connected with designated Active Directory containers, such as organizational unit’s domains or sites. Group Policy Object can manage the Security options Registry-based policies, Scripts options Software installation Folder redirection options and maintenance options (Zinman, 2004).…

    • 433 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Aggggggggggggggggg

    • 3563 Words
    • 15 Pages

    IMPORTANT—READ CAREFULLY: This End-User License Agreement (“EULA”) is a legal agreement between you (either an individual or a single entity) and Microsoft Corporation (“Microsoft”) for the Microsoft software that accompanies this EULA, which includes computer software and may include associated media, printed materials, “online” or electronic documentation, and Internet-based services (“Software”). An amendment or addendum to this EULA may accompany the Software. YOU AGREE TO BE BOUND BY THE TERMS OF THIS EULA BY INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE. IF YOU DO NOT AGREE, DO NOT INSTALL, COPY, OR USE THE SOFTWARE; YOU MAY RETURN IT TO YOUR PLACE OF PURCHASE (IF APPLICABLE) FOR A FULL REFUND.…

    • 3563 Words
    • 15 Pages
    Powerful Essays