Group Policy Object (GPO) Targeting for Windows Server | Administering Windows Server Hybrid Core Infrastructure Exam | Microsoft

GPO Item Level Targeting for Domain Member Servers

Question

Your network contains an Active Directory Domain Services (AD DS) domain. The network also contains 20 domain controllers, 100 member servers, and 100 client computers.

You have a Group Policy Object (GPO) named GPO1 that contains Group Policy preferences.

You plan to link GPO1 to the domain.

You need to ensure that the preference in GPO1 apply only to domain member servers and NOT to domain controllers or client computers. All the other Group

Policy settings in GPO1 must apply to all the computers. The solution must minimize administrative effort.

Which type of item level targeting should you use?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B

https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/dn789189(v=ws.11)#operating-system-targeting

The correct answer to this question is B. Operating System.

Explanation:

Item-level targeting in Group Policy Preferences enables you to apply preference settings only to the computers that meet specified conditions. In this scenario, you need to apply the preference settings in GPO1 only to member servers and not to domain controllers or client computers.

To achieve this goal, you can use the "Item-level targeting" feature in GPO1 and configure it to apply the preference settings based on the operating system of the targeted computers. Specifically, you can set the targeting to include only the member servers, which typically run a server operating system such as Windows Server, and exclude the domain controllers and client computers, which typically run a client operating system such as Windows 10.

Therefore, the correct answer is B. Operating System.

Option A (Domain) is incorrect because it applies to the entire domain and cannot differentiate between member servers, domain controllers, and client computers.

Option C (Security Group) is incorrect because it requires creating and managing security groups, which is an unnecessary administrative effort in this scenario.

Option D (Environment Variable) is incorrect because it applies to the environment variables of the targeted computers and is not relevant to the requirements of the scenario.