Preview

Lesson 9

Good Essays
Open Document
Open Document
673 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lesson 9
Matching
a) zap file
b) Assign
c) Basic User
d) hash
e) path rule
f) Publish
g) self- healing
h) distribution share
i) msi file
j) hash rul
___g____ 1. This feature of Group Policy software installation will automatically reinstall critical application files if they are accidentally or maliciously deleted. ___i____ 2. Group Policy software installations rely on this file type to create an installation package that can be cleanly Assigned and Published and that has self- healing capabilities. ___c____ 3. This Default Security Level in Software Restriction Policies will disallow any executable that requires administrative rights to run. ___f____ 4. This Group Policy software installation option is not available in the Computer Configuration node. ___h____ 5. When deploying software with Group Policy, you need to create one or more of these to house the installation files for the applications that you wish to deploy. ___j____ 6. This software restriction policy rule will prevent executables from running if they have been modified in any way by a user, virus, or piece of malware. ___a____ 7. If you need to deploy a software installation package that does not have an msi file available, you can create one of these as an alternate
___d____ 8. This describes a series of bytes with a fixed length that uniquely identifies a program or file. ___e____ 9. This software restriction policy rule will allow or prevent applications from running that are located within a particular folder or subfolder. ___b____ 10. This GPO software installation method can be used to automatically install an application when a computer starts up or a user logs in.

Multiple Choice
1. Which of the following rule types apply only to Windows Installer packages? a. Hash rules b. Certificate rules c. Internet zone rules d. Path rules 2. Which file type is used by Windows Installer?
a. . inf b. . bat c. . msf

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1) As a student explain what the Tenable Security INC software license permits you to do and what it does not permit you to do?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Create a Policy whereby users cannot install new software to a machine without opening a ticket with the helpdesk or requesting administrator access (ICECC, 2009). The student computers should be preloaded with all required…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2460

    • 271 Words
    • 2 Pages

    Installs and removes roles, role services and features. Also displays the list of all roles, role services, and features available, and shows which are installed on this computer. For additional information about the roles, roles services, and features that you can specify using this tool, refer to the Help for Server Manager.…

    • 271 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Hollis IS3230 Lab1

    • 278 Words
    • 2 Pages

    9. Administrative Templates are a large repository of registry-based changes, by using the Administrative Template sections of the GPO you can deploy modifications to machine (called HKEY_LOCAL_MACHINE in the registry) and user (called HKEY_CURRENT_USER in the registry) portions of the Registry of computers that are influenced by the GPO.…

    • 278 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This lab walks the student through the steps required to define Active Directory Group Policy Objects (GPO) as well as to deploy GPOs to domain computers. It also demonstrates how to use MBSA to profile a Windows system. Group…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Sunica Music

    • 697 Words
    • 3 Pages

    A programme-level policy would be the security policy used. This policy is the best for Sunica Music and Movies due to the fact that not every user will need access to all data be handled. This policy will provide Sunica Music and Movies the with a written an established purpose as well as well as a resources scope, responsibilities of key…

    • 697 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    During operation, the system uses the access control rules to decide whether access requests consumers shall be approved or disapproved. Resources include individual files or items data, computer programs, computer devices and functionality provided by computer applications. Examples of consumers are computer users, computer programs and other devices on the…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    moaclabsonline

    • 891 Words
    • 5 Pages

    7. Select the I accept the license terms check box and click Next. The Which type of installation do you want? page appears.…

    • 891 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 244 Ap C

    • 466 Words
    • 2 Pages

    Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 3 Flashcards

    • 519 Words
    • 3 Pages

    What is the graphical utility that installers can use to create distribution shares and answer files that automate and customize Windows 7 installations?…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    2. What tools do you use to create domain and ADS? Group policy management console…

    • 1304 Words
    • 6 Pages
    Powerful Essays
  • Best Essays

    Bus311

    • 2336 Words
    • 10 Pages

    Lomio, J. P. (1990, June). Intellectual Property Law and the Protection of Computer Programs. 13(3), p. 31. Retrieved May 2013, from http://search.proquest.com.prosxy.library.ashford.edu/docview/213823477?…

    • 2336 Words
    • 10 Pages
    Best Essays
  • Good Essays

    Windows 7

    • 906 Words
    • 4 Pages

    Which of the following is NOT an objective when performing a large-scale Windows 7 deployment?…

    • 906 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Aggggggggggggggggg

    • 3563 Words
    • 15 Pages

    IMPORTANT—READ CAREFULLY: This End-User License Agreement (“EULA”) is a legal agreement between you (either an individual or a single entity) and Microsoft Corporation (“Microsoft”) for the Microsoft software that accompanies this EULA, which includes computer software and may include associated media, printed materials, “online” or electronic documentation, and Internet-based services (“Software”). An amendment or addendum to this EULA may accompany the Software. YOU AGREE TO BE BOUND BY THE TERMS OF THIS EULA BY INSTALLING, COPYING, OR OTHERWISE USING THE SOFTWARE. IF YOU DO NOT AGREE, DO NOT INSTALL, COPY, OR USE THE SOFTWARE; YOU MAY RETURN IT TO YOUR PLACE OF PURCHASE (IF APPLICABLE) FOR A FULL REFUND.…

    • 3563 Words
    • 15 Pages
    Powerful Essays