
The following questions are intended to reinforce key information presented in the chapter. If you are unable to answer a question, review the appropriate lesson and then try the question again. Answers to the questions can be found in Appendix A, "Questions and Answers."
- On which computer do you set an audit policy to audit a folder that is located on a member server that belongs to a domain?
- What is the difference between what the audit policy settings track for directory service access and object access?
- When you view a security log, how do you determine if an event failed or was successful?
- How are user rights different from permissions?
- What is a security template and why is it useful?
- Where does the Security Configuration and Analysis console store information for performing configuration and analysis functions?
Answers