Review terms and
definitions Focus your studying with a path Get faster at matching termsHow do you want to study today?
8. Which of the following
represents the correct order in which GPOs are applied to an object that falls within the GPO's scope?
a. Site, domain, OU, local GPOs
b. Local GPOs, domain, site, OU
c. Domain, site, OU, local GPOs
d. Local GPOs, site, domain, OU
9. Your network consists of three sites and two domains, with some computers from both domains at each site. Each site has certain security settings that should apply to all computers from both domains when they're
located at the site. What's the best way to ensure that the correct security settings are applied to the computers at each site?
a. Create three OUs in each domain, one for each site. In both domains, place the computer accounts in the OU corresponding to the site where the computer is located. Apply a GPO with the appropriate security settings to each OU in both domains.
b. Create three GPOs, one for each site, with the appropriate security settings. Apply the GPOs to the corresponding
site, and enforce the GPO.
c. Create three GPOs, one for each site. Apply the GPOs to the domain object in both domains. Create three groups, one for each site, and place the computer accounts in the appropriate groups. Use GPO filtering to make sure the policy configured for each site affects only the corresponding group of computers.
d. On each computer in each site, configure the local GPO in GPOE with the appropriate security settings. In the Group Policy Object Editor, right-click the
Computer Configuration node and click Block Inheritance.
Right click on the group policy results node in GPMC and select group policy result wizards.
This wizard will walk me through generating a Resultant Set of Policy report for the computer and user my choice.
The computer that I'm using to run this report will make a remote connection to that computer and ask it to run the report.
The report would then be visible in my local GPMC.
I'd like to see that RSoP when Emmett is logged into his computer which is EMMETPC01.
Let me go and do that, so I'm going to hit next. I want to search for his computer. So, I hit another computer, hit browse and type in EMMETPC01 and hit okay.
The group policy results in wizard it's super simple.
First, I enter EMMETPC01 as a computer that I want to run the report on.
By default, the wizard will only run an RSoP report for computer configuration.
Since I want to see the user configuration for EMMET2, I will select display policy setting for him which is actually always selected by default.
So, what we going to do is we going to hit next and it's going to take us to the summary of selections.
And then we going to hit next and to generate the report, we hit Finish.
I will hit close.
You can only select users from this list who've already logged onto this computer in the past.
I review my selection in the summary dialog then finish the wizard.
I'm left with a new item under the Group Policy resultant node in GPMC and it contains a Resultant Set of Policy report that I just requested.
t. This RSoP report contains everything that we need to understand what policies apply to a computer or user.
It includes a whole lot of detail about where the computer and user are located in AD, what their security group memberships are and more.