by gunnar


keywords:
Bookmark and Share



Front Back
The implementation phase of the software life cycle includes the elements that are required to keep the software running smoothly.
False
When repackaging an application is not an option and a Windows Installer file is not available, you can use a .zap file to publish an application.
True
The Assign option allows users to install the applications that they consider useful to them.
False
When configuring Software Restriction Policies, the Disallowed option allows all applications to run except those that are specifically excluded.
False
The Disallowed Default Security Level should be used cautiously because all applications will be restricted unless explicitly allowed.
True
What process takes place from the time an application is evaluated for deployment in an organization until the time when it is deemed old or not suitable for use?
software life cycle
Which of the following is not a phase of the software life cycle?
evaluation
Microsoft Windows Server 2008 uses the Windows Installer with Group Policy to install and manage software that is packaged into what type of file?
 .msi
Modifications to .msi files require transform files, which have the __________ extension.
 .mst
__________ files are used to apply service packs and hotfixes to installed software.
Patch
Before deploying software using Group Policy, what must you create?
distribution share
What option allows users to install the applications that they consider useful to them?
Publish
What option is helpful when you are deploying required applications to pertinent users and computers?
Assign
What allows published applications to be organized within specific groupings for easy navigation?
software categories
What policies are designed to identify software and control its execution?
 Software Restriction
When configuring Software Restriction policies, which option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Basic User
By default, the Software Restriction Policies area has what value in the Default Security Level setting?
Unrestricted
Which of the following is a software restriction rule that can be used to govern which programs can or cannot run on your network?
all of the above

hash rules, certificate rules, path rules, and network zone rules.
What is a series of bytes with a fixed length that uniquely identifies a program or file?
hash
What identifies software by specifying the directory path where the application is stored in the file system?
path rule
What type of rule can be applied to allow only Windows Installer packages to be installed if they come from a trusted area of the network?
network zone rules
When implementing multiple Software Restriction Policy rules, which rule is always applied last?
path rule
What Software Restriction Policy properties allow you to determine whether the policies apply to all files or whether library files, such as Dynamic Link Library (DLL), are excluded?
enforcement
What Software Restriction Policy properties allow an administrator to control how certificate rules are handled?
trusted publishers
What type of file can be written to allow non–Windows Installer–compliant applications to be deployed?
.zap
The software life cycle is a derivative of the System __________ Life Cycle.
Development
The __________ phase is the final phase before the software life cycle begins again with a new software deployment plan.
removal
A(n) __________ file is a relational database file that is copied to the target computer system with the program files it deploys.
.msi
Before deploying software using Group Policy, you must create a(n) __________ share.
distribution
If you use the __________ option, you must also decide whether you will assign the application to a computer or a user account.
Assign
Use the __________ option to provide all installation messages and screens for users during the installation of all packages in the GPO.
Maximum
When customizing software installation packages, use the __________ tab to specify the transform (.mst) files or patch (.msp) files that are to be applied to the package.
Modifications
The Software __________ Policies node is found in the Windows Settings\Security Settings\ node of the User Configuration or the Computer Configuration node of a Group Policy.
Restriction
A hash is computed by a hash __________, which in effect creates a fingerprint of the file.
algorithm
A(n) __________ rule identifies software by specifying the directory path where the application is stored in the file system.
path
What is the client-side component of Windows Installer?
Windows Installer Service
When repackaging an application is not an option and a Windows Installer file is not available, what type of file can be used to publish an application?
.zap file
What allows published applications to be organized within specific groupings for easy navigation?
software categories
What is designed to identify software and control its execution?
Software Restriction Policies
When configuring Software Restriction Policies, what option prevents any application from running that requires administrative rights, but allows programs to run that only require resources that are accessible by normal users?
Basic User
What is generated by a formula that makes it nearly impossible for another program to have the same hash?
hash value
What can be used to allow software from a trusted source to run or prevent software that does not come from a trusted source from running?
certificate rule
What rules apply only to Windows Installer packages that attempt to install from a specified zone such as a local computer, local intranet, trusted sites, restricted sites, or the Internet?
network zone rules
What are the four stages of the software life cycle?
planning, implementation, maintenance, and removal
What two methods can be used to install software with Group Policy when no .msi file exists?
You can repackage the original installation file or create a .zap file.
What is an .msi file?
An .msi file is a relational database file that is copied to the target computer system with the program files it deploys. In addition to providing installation information, this database file assists in the self-healing process for damaged applications and clean application removal.
What two options exist when choosing how to deploy software with Group Policy?
Assign and Publish.
  What are Software Restriction Policies?
Software Restriction Policies are designed to identify software and control its execution.
What are the three basic strategies for enforcing software restrictions?
Unrestricted, Disallowed, and Basic User
What four types of software restriction rules can be used to govern which programs can run on your network?
hash rule, certificate rule, path rule, and network zone rule
x of y cards Next >|