26
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Quick Check Setting Up, Managing, and Troubleshooting Security Accounts and Policies 1. You’re a help desk technician for your company. Sarah is an executive at your company. Because Sarah travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Sarah asks you to configure her com- puter so that she can dial in to the company network when she is out of the office. The company security policy states that dial-in users must use smart cards when they connect to the network, and that the users must use the strongest form of encryption possible. The company security policy further states that client computers must disconnect if the routing and remote access server does not support both smart card authen- tication and the strongest possible authentication. You need to configure the dial-up connection properties on Sarah’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which of the following should you do? (Select all that apply.) A. Select the Advanced (Custom Settings) security option. B. Select the Maximum Strength Encryption item from the data encryption list. C. Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list. D. Select the Require Data Encryption check box. Quick Answer: 64 Detailed Answer: 65 03 078973107x CH03 2/26/04 1:24 PM Page 45

Setting Up, Managing, and Troubleshooting Security

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

3✓Quick CheckSetting Up, Managing, and

Troubleshooting Security Accounts and Policies

1. You’re a help desk technician for your company. Sarah is anexecutive at your company. Because Sarah travels frequently,she uses a Windows XP Professional portable computer thathas a smart card reader. Sarah asks you to configure her com-puter so that she can dial in to the company network when sheis out of the office. The company security policy states thatdial-in users must use smart cards when they connect to thenetwork, and that the users must use the strongest form ofencryption possible. The company security policy furtherstates that client computers must disconnect if the routing andremote access server does not support both smart card authen-tication and the strongest possible authentication.You need to configure the dial-up connection properties onSarah’s computer to dial in to the company network. Yoursolution must ensure that company security policies areenforced.Which of the following should you do? (Select all that apply.)❑ A. Select the Advanced (Custom Settings) security option.❑ B. Select the Maximum Strength Encryption item from the data

encryption list.❑ C. Select the Extensible Authentication Protocol (EAP) option,

and select Smart Card or other Certificate from the EAP list.❑ D. Select the Require Data Encryption check box.

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 45

Page 2: Setting Up, Managing, and Troubleshooting Security

✓Quick Check

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 346

2. You’re a help desk technician for your company. Mary is amember of your company’s sales department. Mary asks you to configure her XP portable computer so that she can dial into the company network when she is out of the office. Thecompany uses two servers for Routing and Remote Access:One is a Microsoft Windows 2000 Server, and the other is aWindows NT 4.0 Server. Each server contains four modems.Each modem connects to a dial-up telephone line, and a singletelephone number distributes incoming calls across the eighttelephone lines.Company security policy requires that dial-up logon creden-tials be encrypted and use the maximum possible security whenthey are transmitted. You need to ensure that Mary can dial inand log on by using her domain user account. You also need toensure that company security policy is enforced.How should you configure the security settings for the dial-upconnection?❑ A. Select the Typical (Recommended Settings) option. Select the

Require Secured Password list item from the validation list. ❑ B. Select the Typical (Recommended Settings) option. Select the

Require Data Encryption (Disconnect If None) check box.❑ C. Select the Advanced (Custom Settings) option. On the

Advanced Security Settings tab, clear all check boxes exceptthe MS-CHAP v2 check box.

❑ D. Select the Typical (Recommended Settings) option. Select theAutomatically Use My Windows Logon Name and Password(and Domain) check box.

3. You’re the desktop administrator for your organization. Allemployees have Windows XP Professional computers. Allemployees are members of the local Users group on their owncomputers. A user in the marketing department has a remov-able disk cartridge drive on his computer. The disk cartridgecontains an unsupported, third-party file system. When hetries to save data to the disk cartridge, the user is prompted toreformat the disk cartridge. However, he receives an AccessDenied error message when attempting to reformat.You need to enable the user to save data to the disk cartridge.What should you do?❑ A. Grant the user Allow-Full Control permission on the disk

cartridge.❑ B. Instruct the user to format the cartridge as FAT32.❑ C. Remove the Read-Only attribute from the disk cartridge.❑ D. Configure the local security settings to enable the user to

format and eject removable media.

Quick Answer: 64

Detailed Answer: 65

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 46

Page 3: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

4. You’re a help desk technician for Parker Research. All employ-ees use Windows XP Professional computers. A user namedAmy reports a problem browsing the Internet. She says thatshe cannot use a search to browse to www.parkerresearch.com.You use Remote Assistance to examine search engines onAmy’s computer. When you try to use the search engine, youreceive the following warning message: You cannot sendHTML forms. When you try to use other search engines onAmy’s computer, you receive the same message. Amy verifiesthat she is able to use the search engine to browse the compa-ny intranet without problems.You need to ensure that Amy can use any search engine tobrowse the Internet from her computer. What should you do?❑ A. On Amy’s computer, open the Security properties for

Microsoft Internet Explorer. Add www.parkerresearch.com tothe Trusted Sites list. Clear the Require Server Verificationfor All Sites in This Zone check box.

❑ B. Inform Amy to use https:// instead of http:// when typing theURLs for the search engines. Tell Amy to ensure thatInternet Explorer displays a lock icon in its status bar, beforeshe submits information in a form on a Web page.

❑ C. On Amy’s computer, open the Security properties for InternetExplorer. In the security settings for the Internet zone, selectthe Submit Non-Encrypted Form Data option.

❑ D. Tell Amy to click the Search button on the Internet Explorertoolbar and then type her search keywords in the Web formdisplayed by Internet Explorer.

47

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 47

Page 4: Setting Up, Managing, and Troubleshooting Security

5. You’re a help desk technician for Loftware, Inc. Loftware, Inc.maintains a secure intranet Web site atintranet.loftwareinc.com. All employees use Windows XPProfessional computers. A user named Kate reports that shecannot access the secure Web site by using Internet Explorer.When she types http://intranet.loftware.com into the InternetExplorer address bar, an error message reports that a digitalcertificate is not from a trusted source. You verify that theintranet Web server is using a digital certificate issued by yourcompany’s Enterprise CA (certificate authority). TheEnterprise CA is located on a server named certificates.loft-wareinc.com.You need to ensure that Kate can access the secure intranetWeb site without receiving an error message. What shouldyou do?❑ A. On Kate’s computer, open the Security properties for Internet

Explorer. Add intranet.loftwareinc.com to the Trusted Siteslist.

❑ B. Ask a network administrator to modify the properties for IIS(Internet Information Services) on intranet.loftwareinc.comand set the SSL port number to 443.

❑ C. On Kate’s computer, open the Security properties for InternetExplorer. Open the Trusted Sites dialog box and select theRequire Server Verification for All Sites in This Zone checkbox.

❑ D. On Kate’s computer, open Internet Explorer’s list of certifi-cates. Import a copy of the certificate used by theintranet.loftwareinc.com server into Kate’s Trusted PublishersCertificates store.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 348

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 48

Page 5: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

6. You’re a help desk technician for your company. Your compa-ny uses a custom database application to analyze revenueinformation. The database application saves data to files with a.dcp file extension. The .dcp files are stored in the same sharedfolder as many shared Microsoft Word 2002 documents. Yoursupervisor informs you that the application’s .dcp files arebecoming corrupted. Each time the files get corrupted, theymust be restored from a tape backup, which is time- andresource-consuming. Users with portable computers oftenselect the Word 2002 documents in the shared folder to bemade available offline. You find that several users also selectthe .dcp files to be made available offline.You need to ensure that users cannot make .dcp files availableoffline. Your solution must not affect user access to the otherfiles in the folder. What should you do?❑ A. Ask a network administrator to modify the file permissions on

the .dcp files to assign all users the Deny-Change permission.❑ B. Modify the file share that contains the .dcp files and disable

offline file caching.❑ C. Ask a network administrator to modify the domain security

policy by adding the .dcp file type to the File Not Cachingdomain group policy.

❑ D. Use Remote Assistance to disable offline files on the localcomputer policy of all portable computers.

49

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 49

Page 6: Setting Up, Managing, and Troubleshooting Security

7. You’re the administrator of your company’s network. The net-work includes an Active Directory domain. A new employeenamed Jane is hired to help deploy Windows XP Professionalto 150 new computers. You create a new domain user accountfor Jane and add the account to the Domain Users group. Janecan install Windows XP Professional on the new computers,but she cannot add the computers to the Active Directorydomain.You verify that the computers are connected to the networkand that they are receiving IP configuration information fromthe company’s DHCP server. You need to ensure that Jane canadd the new computers to the Active Directory domain. Youalso need to be sure Jane does not receive any unnecessarysecurity privileges on the network. What should you do?❑ A. Add Jane’s domain account to the Server Operators domain

user group.❑ B. On a domain controller, use the Local Computer Policy

MMC to add Jane’s domain user account to the AddWorkstations to Domain user right policy.

❑ C. Use the Delegation of Control Wizard to grant Jane’s domainuser account the right to create new objects in the computerscontainer.

❑ D. Install the Active Directory users and computers MMC onJane’s Windows XP Professional computer. Add Jane’sdomain user account to the domain Administrators domainuser group.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 350

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 50

Page 7: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

8. You’re a help desk technician for your company. All users haveWindows XP Professional computers. Eight users run a cus-tom application named Payroll on their computers. Payrollstores user passwords in a file named Secure.ini. By default,the Secure.ini file is stored in a folder namedC:\Winnt\PayrollApp. The actual location and name of thefile can be changed by an administrator. Each Secure.ini file isunique. Each computer contains a single logical drive C: for-matted as NTFS in order to comply with the company’s secu-rity policy.You need to be sure that the Secure.ini files get encrypted.What should you do?❑ A. Create a folder named C:\Files. Copy the Secure.ini file to

the C:\Files folder. In the properties of the C:\Files folder,select the option to encrypt the contents of the folder. Acceptthe default settings on the Confirm Attributes Changes dialogbox. Configure Payroll to use the C:\Files\Secure.ini file.

❑ B. In the Properties of the C:\Winnt\PayrollApp folder, useWindows Explorer to select the option to encrypt the con-tents of the folder. Accept the default settings on the ConfirmAttributes Changes dialog box.

❑ C. Have a network administrator share a new encrypted foldernamed SecureFiles on a network server. Permit users to readthe files contained within the folder. Copy the Secure.ini filefrom each computer into the SecureFiles folder. On eachcomputer, configure Payroll to use the Passwords.ini file inthe SecureFiles folder.

❑ D. Create a folder named C:\Files. Move the Secure.ini file tothe C:\Files folder. Instruct the user of each computer toopen the properties of the C:\Files folder and select theoption to encrypt the contents of the folder. Accept thedefault settings on the Confirm Attributes Changes dialogbox. Configure Payroll to use the C:\Files\Secure.ini files.

51

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

03 078973107x CH03 2/26/04 1:24 PM Page 51

Page 8: Setting Up, Managing, and Troubleshooting Security

9. You’re a help desk technician for your company. Mike andValerie are users in your company’s sales department. Mikeand Valerie both use Windows XP Professional laptop com-puters. They also use Internet Explorer to connect to a Web-based Internet email service. Mike reports that he is requiredto provide a username and password each time he accesses thatWeb site. Valerie, however, is not required to log on each separate time she accesses the Web site because the siteremembers her username and password.You need to configure Mike’s computer so that the Web sitecan remember his username and password. How should youconfigure Internet Explorer on Mike’s computer?❑ A. Set the privacy configuration for first-party cookies to Accept.❑ B. Modify the security configuration on Mike’s laptop so that the

Internet email Web site is included in the Trusted Sites list.❑ C. Modify the privacy configuration so that the Always Allow

Session Cookies check box is selected.❑ D. Set the security level for the Internet zone to medium on

Mike’s computer.10. You and Steve are the desktop administrators for your compa-

ny. You install a printer on your Windows XP Professionalcomputer. You share this printer on the company network.You want to ensure that only members of the ITAdmins localgroup can use this printer, and that only you and Steve canmanage the printer and all print jobs. You also want to ensurethat members of the ITAdmins local group can manage onlytheir own print jobs. How should you configure security onthis printer?❑ A. Grant Allow-Print permission to the ITAdmins group. Grant

Allow-Manage Documents permission to your user accountand Steve’s user account.

❑ B. Grant Allow-Print permission to the ITAdmins group. GrantAllow-Manage Documents and Allow-Manage Printers per-missions to your user account and Steve’s user account.

❑ C. Grant Allow-Manage Documents permission to theITAdmins group. Grant Allow-Manage printers permission toyour user account and Steve’s user account.

❑ D. Grant Allow-Print permission to the ITAdmins group.Remove Allow-Manage Documents permission from theCreator Owner group. Grant Allow-Manage Printers permis-sion to your user account and Steve’s user account.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 352

✓Quick Check

Quick Answer: 64

Detailed Answer: 65

Quick Answer: 64

Detailed Answer: 66

03 078973107x CH03 2/26/04 1:24 PM Page 52

Page 9: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

11. You’re the desktop administrator for Computers, Ltd. Agraphics designer named Paul saves all his files in the MyDocuments folder on his Windows XP Professional computer.Paul now needs to work on several different computers eachday to complete his work. He needs to be able to access hisfiles at any time. You implement a roaming user profile andhome directory for Paul. However, Paul mentions that whenhe uses his roaming profile, it takes more than 10 minutes forhim to log on to other computers.You need to reduce the amount of time it takes for Paul to logon to other computers when using his roaming profile. Whatshould you do?❑ A. Log on as a local administrator on Paul’s computer. Edit the

local group policy to exclude directories in roaming profiles. ❑ B. Change the UNC path of Paul’s roaming profile to his home

directory folder.❑ C. Log on as a local administrator on Paul’s computer. Change

the roaming profile to a local profile.❑ D. Log on as a local administrator on Paul’s computer. In the

properties of the My Documents folder, change the targetfolder location to Paul’s home directory.

12. You’re the desktop administrator for your company’s researchdepartment. The IT manager for the research department cre-ates a custom policy that will apply to a custom applicationthat is loaded on the department’s Windows XP Professionalcomputers. He deploys this policy by using Group Policy.When you inspect the research department’s computers, youfind out that the application has not been modified by the policy.You want to examine the Windows XP Professional computersto find out whether the custom policy is affecting the correctlocation in the Registry. Which command should you run?❑ A. MSInfo32.exe ❑ B. GPEdit.exe❑ C. GPResult.exe❑ D. RGP.exe

53

✓Quick Check

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

03 078973107x CH03 2/26/04 1:24 PM Page 53

Page 10: Setting Up, Managing, and Troubleshooting Security

13. You’re the desktop administrator for Compco, Ltd. The company’s network contains 800 Windows XP Professionalcomputers. All the computers are members of a single ActiveDirectory domain. The computers’ hard disks are formatted asNTFSv5. Compco’s software developers release a new customapplication. The application uses a .dll file namedAppLibrary.dll, which is installed in a folder named \ProgramFiles\Compco\CompcoApp. The company’s software helpdesk technicians complain that many users experience prob-lems when they use the application. You notice that theAppLibrary.dll file was deleted on the client computers.Compco’s software developers recommend that you modifythe file permissions on AppLibrary.dll so that users have onlyRead permission on the file.You need to ensure that all users have only Read permissionon the AppLibrary.dll file on all 800 Windows XP Professionalcomputers. What should you do?❑ A. Write a logon script that moves the AppLibrary.dll file into

the Windows\System32 folder. Ensure that Windows fileprotection is enabled on all 800 Windows XP Professionalcomputers. Apply that logon script to all domain useraccounts.

❑ B. Use the Security Configuration and Analysis console to createa new security template that modifies file permissions onAppLibrary.dll. Use the Active Directory group policy toimport and then apply the template to all 800 Windows XPProfessional computers.

❑ C. Repackage the customer application in a Windows Installerpackage. Have a domain administrator create a GPO thatadvertises the package to all domain user accounts.

❑ D. Write a VBScript file named Fix.vbs that modifies the filepermissions on AppLibrary.dll.

14. What component of the Active Directory Structure used withMicrosoft Windows XP is a distinct named set of attributesthat represent a network resource, such as a user or computeraccount?❑ A. OU❑ B. Class❑ C. Object❑ D. Domain❑ E. Tree

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 354

✓Quick Check

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

03 078973107x CH03 2/26/04 1:24 PM Page 54

Page 11: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

15. What component of the Active Directory structure used withMicrosoft Windows XP is a logical grouping of objects, suchas computers, accounts, domains, or OUs?❑ A. Object❑ B. Class❑ C. OU❑ D. Domain❑ E. Site

16. What component of the Active Directory structure used withMicrosoft Windows XP is a container used to organize objectsof a domain into logical administrative groups?❑ A. Object❑ B. Class❑ C. OU❑ D. Domain❑ E. Tree

17. What component of the Active Directory structure used withMicrosoft Windows XP holds all network objects and infor-mation about only all objects it contains, and acts as a securityboundary?❑ A. Object❑ B. Class❑ C. OU❑ D. Domain❑ E. Tree

18. What component of the Active Directory structure used withMicrosoft Windows XP is a hierarchical grouping of one ormore domains that share a contiguous namespace?❑ A. Object❑ B. Class❑ C. Tree❑ D. Domain❑ E. Forest

55

✓Quick Check

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

03 078973107x CH03 2/26/04 1:24 PM Page 55

Page 12: Setting Up, Managing, and Troubleshooting Security

19. What component of the Active Directory structure used withMicrosoft Windows XP is a hierarchical grouping of one ormore domain trees that have different namespaces?❑ A. Site❑ B. Class❑ C. OU❑ D. Forest❑ E. Domain

20. What component of the Active Directory structure used withMicrosoft Windows XP is a geographical grouping of one ormore IP subnets connected by high-speed links?❑ A. Site❑ B. Class❑ C. OU❑ D. Tree

21. What item in Active Directory used with Microsoft WindowsXP contains a formal definition of contents and structure ofActive Directory, such as classes, class properties, and attrib-utes?❑ A. Schema❑ B. Global Catalog❑ C. DN❑ D. RDN❑ E. GUID

22. What item in Active Directory used with Microsoft WindowsXP is a central repository of information about all objects inan entire forest?❑ A. Schema❑ B. Global Catalog❑ C. DN❑ D. RDN❑ E. GUID

23. What item in Active Directory used with Microsoft WindowsXP uniquely identifies an object within the entire ActiveDirectory forest?❑ A. Schema❑ B. Global Catalog❑ C. DN❑ D. RDN❑ E. UPN

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 356

✓Quick Check

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 66

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

03 078973107x CH03 2/26/04 1:24 PM Page 56

Page 13: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

24. What item in Active Directory used with Microsoft WindowsXP identifies an object only within a single domain?❑ A. Schema❑ B. Global Catalog❑ C. DN❑ D. RDN❑ E. UPN

25. What item in Active Directory used with Microsoft WindowsXP is a unique 128-bit character string assigned to objectswhen they’re created?❑ A. Schema❑ B. Global Catalog❑ C. UPN❑ D. RDN❑ E. GUID

26. What item in Active Directory used with Microsoft WindowsXP is the common, friendly name given to a user account?❑ A. Schema❑ B. Global Catalog❑ C. DN❑ D. UPN❑ E. GUID

27. What Microsoft Windows XP built-in local group can perform all administrative tasks on the local system?❑ A. Administrators❑ B. Backup Operators❑ C. Guests❑ D. Power Users❑ E. Remote Desktop Users

28. What Microsoft Windows XP built-in local group can useBackup to back up and restore data on the local computer?❑ A. Administrators❑ B. Backup Operators❑ C. Guests❑ D. Power Users❑ E. Users

57

✓Quick Check

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

03 078973107x CH03 2/26/04 1:24 PM Page 57

Page 14: Setting Up, Managing, and Troubleshooting Security

29. What Microsoft Windows XP built-in local group can be usedfor granting temporary access to resources?❑ A. Administrators❑ B. Backup Operators❑ C. Guests❑ D. Power Users❑ E. Remote Desktop Users

30. What Microsoft Windows XP built-in local group can onlycreate and modify local user accounts on the local computer,share resources, install programs, and install device drivers,among other simple tasks?❑ A. Administrators❑ B. Backup Operators❑ C. Guests❑ D. Power Users❑ E. Users

31. What Microsoft Windows XP built-in local group can log onlocally through the Remote Desktop Connection?❑ A. Administrators❑ B. Backup Operators❑ C. Guests❑ D. Power Users❑ E. Remote Desktop Users

32. What Microsoft Windows XP built-in local group can per-form only everyday tasks for which it has been assigned per-missions?❑ A. Administrators❑ B. Backup Operators❑ C. Users❑ D. Power Users❑ E. Remote Desktop Users

33. Which Microsoft Windows XP built-in local group includesall users and computers that have been authenticated?❑ A. Authenticated Users❑ B. Administrators❑ C. Guest❑ D. Power Users

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 358

✓Quick Check

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

Quick Answer: 64

Detailed Answer: 67

03 078973107x CH03 2/26/04 1:24 PM Page 58

Page 15: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

34. Which Microsoft Windows XP built-in system group includesall users that have logged on through Task Scheduler?❑ A. Everyone❑ B. Batch❑ C. Creator❑ D. Dialup

35. What Microsoft Windows XP built-in system group is bestdescribed as a placeholder in an inheritable ACE?❑ A. Authenticated Users❑ B. Batch❑ C. Creator Group❑ D. Dialup❑ E. Everyone

36. Which Microsoft Windows XP built-in system group includesall users that have logged in using a standard 56Kbps phoneconnection?❑ A. Everyone❑ B. Batch❑ C. Creator❑ D. Dialup

37. What Microsoft Windows XP built-in system group is bestdescribed as including authenticated users and guests?❑ A. Authenticated Users❑ B. Batch❑ C. Creator Group❑ D. Dialup❑ E. Everyone

38. What Microsoft Windows XP built-in system group is bestdescribed as including all users logging on locally or through aremote desktop connection?❑ A. Everyone❑ B. Interactive❑ C. Local System❑ D. Text Service❑ E. Text Terminal Server Users

59

✓Quick Check

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

03 078973107x CH03 2/26/04 1:24 PM Page 59

Page 16: Setting Up, Managing, and Troubleshooting Security

39. What Microsoft Windows XP built-in system group is bestdescribed as a service account that’s used by the operating system?❑ A. Everyone❑ B. Interactive❑ C. Local System❑ D. Text Service❑ E. Text Terminal Server Users

40. What Microsoft Windows XP built-in system group is bestdescribed as including all security principals that have loggedon as a service, with membership in this group controlled bythe operating system?❑ A. Everyone❑ B. Interactive❑ C. Local System❑ D. Text Service❑ E. Text Terminal Server Users

41. What Microsoft Windows XP built-in system group is bestdescribed as including all users who have logged on to aTerminal Services server that uses Terminal Services version4.0 application compatibility mode?❑ A. Everyone❑ B. Interactive❑ C. Local System❑ D. Text Service❑ E. Text Terminal Server Users

42. What items are true of group policies in Microsoft WindowsXP? (Select all that apply.)❑ A. GPedit.msc is the replacement for the POLEdit.exe used in

earlier Windows versions.❑ B. Group policies can be stored locally.❑ C. Group policies are more flexible than system policies.❑ D. System policies are more flexible than group policies.❑ E. Group policies can be stored in Active Directory.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 360

✓Quick Check

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

03 078973107x CH03 2/26/04 1:24 PM Page 60

Page 17: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

43. Which security template for Microsoft Windows XP is a compatibility template, and is also referred to as the Basictemplate?❑ A. Compatws.inf❑ B. Securews.inf❑ C. Hisecws.inf❑ D. Rootsec.inf

44. Which security template for Microsoft Windows XP is a moresecure template in regard to account policy and auditing?❑ A. Compatws.inf❑ B. Securews.inf❑ C. Hisecws.inf❑ D. Rootsec.inf

45. Which security template for Microsoft Windows XP is a high-ly secure template provided for Microsoft Windows XP work-stations running in native mode only?❑ A. Compatws.inf❑ B. Securews.inf❑ C. Hisecws.inf❑ D. Rootsec.inf

46. Which security template for Microsoft Windows XP appliesthe default settings to the root of the system drive thatWindows XP was originally installed with?❑ A. Compatws.inf❑ B. Securews.inf❑ C. Hisecws.inf❑ D. Rootsec.inf

47. Which of the following are true in Microsoft Windows XPwith regard to EFS? (Select all that apply.)❑ A. EFS is available only on NTFSv5 partitions.❑ B. EFS is transparent to the end user.❑ C. EFS uses public key encryption.❑ D. EFS uses shared key encryption.❑ E. An appointed recovery system agent can open the files as

well.

61

✓Quick Check

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 68

Quick Answer: 64

Detailed Answer: 69

Quick Answer: 64

Detailed Answer: 69

03 078973107x CH03 2/26/04 1:24 PM Page 61

Page 18: Setting Up, Managing, and Troubleshooting Security

48. When working with a file encrypted with EFS in MicrosoftWindows XP from one NTFS partition to another computer’sFAT partition, which of the following are true? (Select all thatapply.)❑ A. Copy the file as normal and it will remain encrypted. ❑ B. Copy the file as normal and it will become unencrypted.❑ C. Move the file as normal and it will become unencrypted.❑ D. Move the file as normal and it will remain encrypted.

49. When working with a file encrypted with EFS in MicrosoftWindows XP from an NTFS partition to a FAT partition,including floppy disks, which of the following are true? (Selectall that apply.)❑ A. Move the file as normal and it will remain encrypted.❑ B. Copy the file as normal and it will remain encrypted.❑ C. Move the file as normal and it will become unencrypted.❑ D. Copy the file as normal and it will become unencrypted.

50. When working with a file encrypted with EFS in MicrosoftWindows XP from one NTFS partition to another computer’sNTFS partition, which of the following are true? (Select allthat apply.)❑ A. Copy the file as normal and it will remain encrypted.❑ B. Copy the file as normal and it will become unencrypted.❑ C. Move the file as normal and it will remain encrypted.❑ D. Move the file as normal and it will become unencrypted.

51. When working with a file encrypted with EFS in MicrosoftWindows XP from one NTFS partition to another NTFSpartition on the same computer, which of the following aretrue? (Select all that apply.)❑ A. Move the file as normal and it will remain encrypted.❑ B. Copy the file as normal and it will become unencrypted.❑ C. Copy the file as normal and it will remain encrypted.❑ D. Move the file as normal and it will become unencrypted.

52. When working with a Microsoft Windows XP computer in aworkgroup, which of the following are true regarding userpassword hints? (Select all that apply.)❑ A. They dramatically lower security.❑ B. They dramatically increase security.❑ C. They are visible to the administrator only.❑ D. They are visible to all users.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 362

✓Quick Check

Quick Answer: 64

Detailed Answer: 69

Quick Answer: 64

Detailed Answer: 69

Quick Answer: 64

Detailed Answer: 69

Quick Answer: 64

Detailed Answer: 69

Quick Answer: 64

Detailed Answer: 69

03 078973107x CH03 2/26/04 1:24 PM Page 62

Page 19: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies

53. You’re the desktop administrator for your company. The company’s network consists of 20 Microsoft Windows XPcomputers. All hardware and installed applications are thesame on each computer. A user named Steve in the marketingdepartment forgets his password on a regular basis, causingyou much concern and administrative effort regarding security.What should you do?❑ A. Create a password reset disk for Steve, and instruct him in its

use.❑ B. Assign Steve the password of password, and click the setting

for User Cannot Change Password.❑ C. Assign Steve the password of noexpire, and click the setting

for Password Never Expires.❑ D. Assign Steve the password of logon, and click the setting for

User Must Change Password at Next Logon.

63

✓Quick Check

Quick Answer: 64

Detailed Answer: 70

03 078973107x CH03 2/26/04 1:24 PM Page 63

Page 20: Setting Up, Managing, and Troubleshooting Security

1. A, B, and C

2. C

3. D

4. A

5. D

6. C

7. B

8. D

9. A

10. B

11. D

12. C

13. B

14. C

15. B

16. C

17. D

18. C

19. D

20. A

21. A

22. B

23. C

24. D

25. E

26. D

27. A

28. B

29. C

30. D

31. E

32. C

33. A

34. B

35. C

36. D

37. E

38. B

39. C

40. D

41. E

42. A, B, and E

43. A

44. B

45. C

46. D

47. A, B, C, and E

48. B and C

49. C and D

50. A and C

51. A and C

52. A and D

53. A

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 364

Quick Check Answer Key

03 078973107x CH03 2/26/04 1:24 PM Page 64

Page 21: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies 65

Answers and Explanations1. Answers: A, B, and C.

Explanation A. You need to select the Advanced (Custom Settings) securityoption to get things started.

Explanation B. Select the Maximum Strength Encryption item from the dataencryption list. This is required in this situation.

Explanation C. Smart Cards require you to select the ExtensibleAuthentication Protocol (EAP) option, and select Smart Card or otherCertificate from the EAP list. Remember Smart Cards means EAP.

2. Answer: C. Select the Advanced (Custom Settings) option. On the AdvancedSecurity Settings tab, clear all check boxes except the MS-CHAP v2 (MicrosoftChallenge Handshake Authentication Protocol Version 2) check box.

3. Answer: D. You should configure the local security settings to enable the userto format and eject removable media.

4. Answer: A. You must open the security properties for Microsoft InternetExplorer on Amy’s computer. Add www.parkerresearch.com to the TrustedSites list. Finally, clear the Require Server Verification for All Sites in ThisZone check box.

5. Answer: D. On Kate’s computer, you need to add a trusted certificate. OpenInternet Explorer’s list of certificates. Import a copy of the certificate used bythe intranet.loftwareinc.com server into Kate’s Trusted Publishers certificatesstore.

6. Answer: C. A configuration adjustment by a network admin is needed. Ask anetwork administrator to modify the Domain Security Policy by adding the.dcp file type to the File Not Caching domain group policy.

7. Answer: B. On a domain controller, you must use the Local Computer PolicyMicrosoft Management Console (MMC) to add Jane’s domain user account tothe Add Workstations to Domain user right policy.

8. Answer: D. You should create a folder named C:\Files. Move the Secure.inifile to the C:\Files folder. Instruct the user of each computer to open the prop-erties of the C:\Files folder and select the option to encrypt the contents of thefolder. Accept the default settings on the Confirm Attributes Changes dialogbox. Configure Payroll to use the C:\Files\Secure.ini files.

9. Answer: A. You need to set the privacy configuration for first-party cookies toAccept.

03 078973107x CH03 2/26/04 1:24 PM Page 65

Page 22: Setting Up, Managing, and Troubleshooting Security

10. Answer: B. You should grant Allow-Print permission to the ITAdmins group.Also, grant the Allow-Manage Documents and Allow-Manage Printers permis-sions to your and Steve’s user accounts.

11. Answer: D. You should log on as a local administrator on Paul’s computer. Inthe properties of the My Documents folder, change the Target folder locationto Paul’s home directory.

12. Answer: C. To examine a Windows XP Professional PC to find out whether acustom policy is affecting the correct location in the Registry, run theGPResult.exe command.

13. Answer: B. Use the Security Configuration and Analysis console to create anew security template that modifies file permissions on AppLibrary.dll. Use theActive Directory group policy to import and then apply the template to all 800Windows XP Professional computers.

14. Answer: C. An object is a distinct named set of attributes that represent a net-work resource, such as a user or computer account. An example would beJSmith or Printer05.

15. Answer: B. A class is a logical grouping of objects, such as computers,accounts, domains, or OUs (organizational units).

16. Answer: C. OU stands for organizational unit, which is a container used toorganize objects of a domain into logical administrative groups. An examplewould be the SalesOU, which would be functionally equivalent to a salesdepartment, having users, computers, and printers.

17. Answer: D. A domain holds all network objects and information only about allobjects it contains. A domain is considered a security boundary. In MicrosoftWindows XP, security settings do not cross from one domain to another.

18. Answer: C. A tree is a hierarchical grouping, like a pyramid structure, of oneor more Microsoft Windows XP domains that share a contiguous (similar,touching) namespace. An example would be eITprep.com, sales.eITprep.com,and products.eITprep.com.

19. Answer: D. A forest is a hierarchical grouping, like a pyramid structure, of oneor more Microsoft Windows XP domain trees that have different namespaces.An example would be eITprep.com and sales.eITprep.com, connected over toAudioWhiz.com and products.AudioWhiz.com.

20. Answer: A. A site is a geographical grouping of one or more IP (InternetProtocol) subnets connected by high-speed links. An example would be aMicrosoft Windows XP single domain with sites in Sacramento, San Francisco,and Los Angeles, California.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 366

03 078973107x CH03 2/26/04 1:24 PM Page 66

Page 23: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies 67

21. Answer: A. The schema contains a formal definition of contents and structureof Active Directory, such as classes, class properties, and attributes. Examples ofeach of these items would be User, Firstname, and John.

22. Answer: B. The Global Catalog is a central repository of information about allobjects in an entire forest. The Global Catalog maintains a subset of attributesfor each and every single object in the entire forest to help with searches.

23. Answer: C. DN stands for distinguished name. The distinguished name of anobject uniquely identifies it within the entire Active Directory forest.

24. Answer: D. RDN stands for relative distinguished name. The relative distin-guished name is a portion of the full distinguished name. The RDN identifiesan object only within a single domain.

25. Answer: E. GUID stands for globally unique identifier. The globally uniqueidentifier is a unique 128-bit character string assigned to objects when they arecreated in Active Directory. The GUID of an object never changes, even if theobject is renamed or moved.

26. Answer: D. UPN stands for user principal name. The user principal name isthe common, friendly name given to a user account that looks like an emailaddress. An example would be [email protected].

27. Answer: A. The Administrators built-in local group can perform all adminis-trative tasks on the local system. The built-in Administrator account is a mem-ber of this group by default.

28. Answer: B. The Backup Operators built-in local group can use MicrosoftWindows XP Backup to back up and restore data on the local computer.

29. Answer: C. The Guests built-in local group can be used for granting tempo-rary access to resources. This is a very limited account.

30. Answer: D. The Power Users built-in local group can create and modify localuser accounts on the local computer, share resources, install programs, andinstall device drivers.

31. Answer: E. The Remote Desktop Users built-in local group can log on locallythrough the Remote Desktop Connection.

32. Answer: C. The Users built-in local group can perform everyday tasks forwhich they have been assigned permissions. All new accounts added to aMicrosoft Windows XP computer are added to this account.

33. Answer: A. The Authenticated Users Microsoft Windows XP built-in systemgroup includes all users and computers whose identities have been authenticat-ed. Authenticated Users does not include the Guest account.

03 078973107x CH03 2/26/04 1:24 PM Page 67

Page 24: Setting Up, Managing, and Troubleshooting Security

34. Answer: B. The Batch Microsoft Windows XP built-in system group includesall users who have logged on through a batch facility such as Task Scheduler.

35. Answer: C. The Creator Group Microsoft Windows XP built-in system groupis a placeholder in an inheritable ACE (access control entry).

36. Answer: D. The Dialup Microsoft Windows XP built-in system groupincludes all users who are logged in through a dial-up connection.

37. Answer: E. The Everyone Microsoft Windows XP built-in system groupincludes authenticated users and guests.

38. Answer: B. The Interactive Microsoft Windows XP built-in system groupincludes all users logging on locally or through a remote desktop connection.

39. Answer: C. The Local System Microsoft Windows XP built-in system group isa service account that is used by the operating system.

40. Answer: D. The Service Microsoft Windows XP built-in system groupincludes all security principals that have logged on as a service. Membership inthe Service group is controlled by the operating system.

41. Answer: E. The Terminal Server Users Microsoft Windows XP built-in sys-tem group includes all users who have logged on to a Terminal Services serverthat uses Terminal Services version 4.0 application compatibility mode.

42. Answers: A, B, and E.

Explanation A. GPedit.msc is the replacement for the POLEdit.exe used inearlier Windows versions. GPedit.msc is the snap-in for the Microsoft console.

Explanation B. Group policies can be stored locally.

Explanation E. Group policies can be stored in Active Directory.

43. Answer: A. Compatws.inf is a compatibility template, also referred to as theBasic template. It sets up permissions for local users group so that legacy pro-grams are more likely to run. Compatws.inf is not considered secure.

44. Answer: B. Securews.inf is a more secure template in regards to account policyand auditing. It removes all members from the Power Users group, but ACLs(access control lists) are not modified. Securews.inf is considered somewhatsecure.

45. Answer: C. Hisecws.inf is a highly secure template provided for MicrosoftWindows XP workstations running in native mode only. It requires all networkcommunications to be digitally signed and encrypted. Hisecws.inf changes theACLs (access control lists) to give Power Users the ability to create shares andchange the system time.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 368

03 078973107x CH03 2/26/04 1:24 PM Page 68

Page 25: Setting Up, Managing, and Troubleshooting Security

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Setting Up, Managing, and Troubleshooting Security Accounts and Policies 69

46. Answer: D. Rootsec.inf applies the default settings to the root of the systemdrive that Microsoft Windows XP was originally installed with. Rootsec.infdoes not override settings that have been changed, and is therefore considerednot secure.

47. Answers: A, B, C, and E.

Explanation A. EFS (Encrypting File System) is only available on NTFSv5(New Technology File System version 5) partitions.

Explanation B. EFS is transparent to the end user.

Explanation C. EFS uses public key encryption.

Explanation E. EFS has an appointed recovery system agent who can open thefiles as well.

48. Answers: B and C.

Explanation B. EFS stands for Encrypting File System. Copy the file as nor-mal and it will become unencrypted.

Explanation C. Move the file as normal and it will become unencrypted.

49. Answers: C and D.

Explanation C. Move the file as normal and it will become unencrypted.

Explanation D. EFS stands for Encrypting File System. Copy the file as nor-mal and it will become unencrypted.

50. Answers: A and C.

Explanation A. EFS stands for Encrypting File System. Copy the file as nor-mal and it will remain encrypted.

Explanation C. Move the file as normal and it will remain encrypted.

51. Answers: A and C.

Explanation A. Move the file as normal and it will remain encrypted.

Explanation C. EFS stands for Encrypting File System. Copy the file as nor-mal and it will remain encrypted.

52. Answers: A and D.

Explanation A. When working with a Microsoft Windows XP computer in aworkgroup, user password hints dramatically lower security.

Explanation D. When working with a Microsoft Windows XP computer in aworkgroup, user password hints are visible to all users.

03 078973107x CH03 2/26/04 1:24 PM Page 69

Page 26: Setting Up, Managing, and Troubleshooting Security

53. Answer: A. You should create a password reset disk for Steve. Click Start,Settings, Control Panel, User Accounts, Related Tasks, Prevent a ForgottenPassword. This will start the Forgotten Password Wizard. Any newly createdpassword reset disk will invalidate older disks.

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Chapter 370

03 078973107x CH03 2/26/04 1:24 PM Page 70