Appendix A -- Questions and Answers

Appendix A

Questions and Answers

Chapter 1: Introduction to Windows XP Professional

Lesson 1: Exploring New Features and Improvements

Lesson Review

  1. Which of the following statements about Automatic Updates (AU) are correct? (Choose all that apply.)
    1. AU is a proactive service that runs in the background and automatically detects, downloads, and installs Windows updates on a computer.
    2. AU allows multiple administrative users to run the AU client concurrently.
    3. AU allows users with administrative privileges to automatically download and install Windows updates on a computer.
    4. AU uses only idle bandwidth so that downloads do not interrupt or slow down other network activity.

    c and d

  2. What is ClearType support?

    Windows XP Professional supports ClearType, a new text display technology that triples the horizontal resolution available for rendering text through software. This feature provides a clearer text display on an LCD screen with digital interface.

  3. The Desktop Cleanup Wizard helps you keep your desktop free of ________________ that you don't use regularly. By default, it runs every _______ days.

    Shortcuts, 60 days

  4. What does the Fast User Switching for Multiple Users of a Computer feature provide on computers running Windows XP Professional?

    The Fast User Switching feature allows multiple users to share a computer without requiring each user to close all running applications and log off before another user can log on to the computer.

  5. Internet Explorer version _________________ comes included with Windows XP Professional.

    6.0

Lesson 2: Troubleshooting Using Help and Support Center

Lesson Review

  1. How can Windows XP Professional help you in making a recommendation about how to upgrade the equipment in your office?

    The Compatible Hardware and Software feature provides you with current and comprehensive hardware and software compatibility information so that you can feel confident that your upgrade recommendation will be correct.

  2. If you are talking with a support engineer about a problem you are having with your computer and the engineer asks you for the BIOS level on your computer, how can you use Help and Support Center to find this information?

    Use My Computer Properties. Click Start, and then click Help And Support. In the Help And Support Center window, under Pick A Task, click Use Tools To View Your Computer Information And Diagnose Problems. Under Tools, click My Computer Information, and then click View General System Information About This Computer. Under Specifications the BIOS version is listed.

    The Windows Help system uses HTML to format and display information, so with an Internet connection, you can search for every occurrence of a word or phrase across all Windows compiled HTML Help files.

  3. If you have administrative responsibility for your company's workgroup and have administrative control over all computers in the workgroup, how can you easily determine the model and driver for each network adapter in the workgroup?

    In the Help And Support Center window, under Pick A Task, click Use Tools To View Your Computer Information And Diagnose Problems. Under Tools, click My Computer Information, and then click View Advanced System Information. Under What Do You Want To Do, click View Computer Information For Another Computer. The View Remote Computer - Web Page dialog box appears, which allows you to specify the path to the remote computer for which you want to view information. When you are viewing the information on the remote computer, click Find Information About The Hardware Installed On This Computer to determine the model and driver for the network adapter. Repeat this process for all computers in the workgroup.

Lesson 3: Understanding Workgroups and Domains

Lesson Review

  1. Which of the following statements about a Windows XP Professional workgroup are correct? (Choose all that apply.)
    1. A workgroup is also called a peer-to-peer network.
    2. A workgroup is a logical grouping of network computers that share a central directory database.
    3. A workgroup becomes impractical in environments with more than 100 computers.
    4. A workgroup can contain computers running Microsoft Windows 2000 Server as long as the server is not configured as a domain controller.

    a and d

  2. What is a domain controller?

    A domain controller is a computer running Windows 2000 Server that is configured as a domain controller so that it can manage all security-related aspects of user and domain interactions.

  3. A directory database contains user accounts and security information for the domain and is known as the __________________. This directory database is the database portion of ______________________________, which is the Windows 2000 directory service.

    Directory, Active Directory service

  4. A ____________ provides a single logon for users to gain access to network resources that they have permissions to access, such as file, print, and application resources.

    Domain

Lesson 4: Logging On and Off Windows XP Professional

Lesson Review

  1. What can you do when you log on locally to a computer, and what determines what you can do when you log on locally to a computer?

    When you log on locally to a computer, you can access the appropriate resources on that computer and you can perform specific system tasks. What you can do when logged on locally to a computer is determined by the access token assigned to the user account you used to log on. The access token is your identification for that local computer; it contains your security settings. These security settings allow you to access specific resources on that computer and to perform specific system tasks.

  2. What is the main difference in the authentication process for logging on locally to a computer and logging on to a domain?

    When you log on locally to a computer, its security subsystem uses the local security database to authenticate the user name and password you entered. When you log on to a domain, a domain controller uses the directory to authenticate the user name and password you entered.

  3. How can you configure Windows XP Professional to use the Log On To Windows dialog box instead of the Welcome screen to allow users to log on locally to the computer?

    You use the User Accounts program located in Control Panel to configure Windows XP Professional to display the Log On To Windows dialog box. The User Accounts program contains the Change The Way Users Log On Or Off task that you use.

  4. Which of the following computers can a user log on to locally? (Choose all that apply.)
    1. A computer running Windows XP Professional that is in a workgroup
    2. A computer running Windows XP Professional that is in a domain
    3. A computer running Windows 2000 Server that is configured as a domain controller
    4. A computer running Windows 2000 Server that is a member server in a domain

    a, b, and d

  5. Which of the following statements about the Windows Security dialog box are correct? (Choose all that apply.)
    1. It is accessed by pressing Ctrl+Alt+Delete.
    2. It tells how long the current user has been logged on.
    3. It allows you to log off the computer or domain.
    4. It allows a user with administrative permissions to change other users' passwords.

    a and c

Chapter 2: Installing Windows XP Professional

Lesson 1: Getting Started

Lesson Review

  1. What are the minimum and recommended memory requirements for installing Windows XP Professional?

    The minimum amount of memory required to install Windows XP Professional is 64 MB, and the recommended amount of memory is 128 MB.

  2. The minimum hard disk space required for installing Windows XP Professional is
    1. 1.5 GB on a 2-GB hard disk
    2. 1 GB on a 2-GB hard disk
    3. 500 MB on a 1-GB hard disk
    4. 750 MB on a 2-GB hard disk

    a

  3. Where can you find the most recent versions of the HCL for released operating systems?

    On the Microsoft Web site at http://www.microsoft.com/hcl/

  4. Joining a domain during Windows XP Professional installation requires which of the following? (Choose all that apply.)
    1. You must know the DNS name for the domain the computer will join.
    2. You must have a user account in the domain.
    3. At least one domain controller in the domain must be online when you install a computer in the domain.
    4. At least one DNS server must be online when you install a computer in the domain.

    a, c, and d

  5. Which of the following statements about file systems are correct? (Choose all that apply.)
    1. File- and folder-level security are available only with NTFS.
    2. Disk compression is available with FAT, FAT32, and NTFS.
    3. Dual booting between Microsoft Windows 98 and Windows XP Professional is available only with NTFS.
    4. Encryption is available only with NTFS.

    a and d

Lesson 2: Installing Windows XP Professional from a CD-ROM

Lesson Review

  1. If TCP/IP is installed on your computer, what is the maximum length for the computer name you specify during installation?

    63 characters

  2. Can you change the computer name after installation without having to reinstall Windows XP Professional? If you can change the name, how do you do it? If you cannot change the name, why not?

    Yes. To change the computer name after installation is complete, click Start, click My Computer, click View System Information, click the Computer Name tab, and then click Change.

  3. Which of the following statements about joining a workgroup or a domain are correct? (Choose all that apply.)
    1. You cannot add your computer to a workgroup or a domain during installation.
    2. If you add your computer to a workgroup during installation, you can join the computer to a domain later.
    3. If you add your computer to a domain during installation, you can join the computer to a workgroup later.
    4. You cannot add your computer to a workgroup or a domain during installation.

    b and c

  4. Which of the following configurations can you change after installing Windows XP Professional? (Choose all that apply.)
    1. Language
    2. Locale
    3. Keyboard settings
    4. Network protocol

    a, b, c, and d

  5. When you install networking components with typical settings, what components are installed? What does each component do?

    There are four components. The Client for Microsoft Networks allows your computer to access network resources. File and Printer Sharing for Microsoft Networks allows other computers to access file and print resources on your computer. The QoS Packet Scheduler helps provide a guaranteed delivery system for network traffic, such as TCP/IP packets. The TCP/IP is the default networking protocol that allows your computer to communicate over LANs and WANs.

Lesson 3: Installing Windows XP Professional over the Network

Lesson Review

  1. On which of the following operating systems running on the client computer do you use WINNT32.EXE to install Windows XP Professional? (Choose all that apply.)
    1. Windows 3.0 or later
    2. Windows 95
    3. Windows 98
    4. Windows NT 4

    b, c, and d

  2. On which of the following operating systems running on the client computer do you use WINNT.EXE to install Windows XP Professional? (Choose all that apply.)
    1. Windows 3.0 or later
    2. Windows 95
    3. Windows Me
    4. Windows NT 4

    a

  3. What Windows XP Professional command allows you to verify that your computer is compatible with Windows XP Professional before you begin installing it?

    WINNT32.EXE with the /checkupgradeonly switch

  4. You use the ____________________________ switch with WINNT32.EXE to prevent Setup from restarting the computer after completing the file-copy phase.

    /noreboot

  5. You use the ____________________________ switch with WINNT32.EXE to tell Setup to copy all installation source files to your local hard disk.

    /makelocalsource

Lesson 4: Upgrading Earlier Versions of Windows to Windows XP Professional

Lesson Review

  1. Which of the following operating systems can be upgraded directly to Windows XP Professional? (Choose all that apply.)
    1. Windows NT Workstation 4.0
    2. Windows NT 3.51
    3. Windows 2000 Professional
    4. Windows NT Server 4.0

    a and c

  2. How can you upgrade a computer running Windows 95 to Windows XP Professional?

    Upgrade your computer to Windows 98 first, and then upgrade to Windows XP Professional.

  3. Before you upgrade a computer running Windows NT 4, which of the following actions should you perform? (Choose all that apply.)
    1. Create a 2-GB partition on which to install Windows XP Professional.
    2. Verify that the computer meets the minimum hardware requirements.
    3. Generate a hardware and software compatibility report.
    4. Format the partition containing Windows NT 4 so that you can install Windows XP Professional.

    b and c

  4. How can you verify that your computer is compatible with Windows XP Professional and therefore can be upgraded?

    Use the Windows XP Professional Compatibility tool.

Lesson 5: Troubleshooting Windows XP Professional Setup

Lesson Review

  1. If you encounter an error during setup, which of the following log files should you check? (Choose all that apply.)
    1. SETUPERR.LOG
    2. NETSETUP.LOG
    3. SETUP.LOG
    4. SETUPACT.LOG

    a and d

  2. If your computer cannot connect to the domain controller during installation, what should you do?

    First, verify that a domain controller is running and online, and then verify that the server running the DNS service is running and online. If both servers are online, verify that the network adapter card and protocol settings are correctly set and that the network cable is plugged into the network adapter card.

  3. If your computer cannot connect to read the CD-ROM during installation, what should you do?

    Use a different CD-ROM. (To request a replacement CD-ROM, contact Microsoft or your vendor.) You can also try using a different computer and CD-ROM drive. If you can read the CD-ROM on a different computer, you can do an over-the-network installation.

Chapter 3: Setting Up and Managing User Accounts

Lesson 1: Understanding User Accounts

Lesson Review

  1. Where do local user accounts allow users to log on and gain access to resources?

    Only on the computer on which the local user account is created.

  2. Where should you create user accounts for computers running Windows XP Professional that are part of a domain?

    You should create it on one of the domain controllers. You should not use local user accounts on Windows XP Professional computers that are part of a domain.

  3. Which of the following statements about domain user accounts are correct? (Choose all that apply.)
    1. Domain user accounts allow users to log on to the domain and gain access to resources anywhere on the network, as long as the users have the required access permissions.
    2. If at least one computer running one of the Windows 2000 Server products is configured as a domain controller, you should use domain user accounts only.
    3. The domain controller replicates the new user account information to all other computers in the domain.
    4. A new domain user account is established in the local security database on the domain controller on which you created the account.

    a and b

  4. Which of the following statements about built-in accounts are correct? (Choose all that apply.)
    1. You can delete the Guest account.
    2. You cannot delete the Administrator account.
    3. You cannot rename the Guest account.
    4. You can rename the Administrator account.

    b and d

  5. How do you disable the Guest account?

    Click Start, click Control Panel, and then click User Accounts. In the User Accounts window, click the Guest icon. In the What Do You Want To Change About The Guest Account window, click Turn Off The Guest Account. The Guest Account is now disabled.

Lesson 2: Planning New User Accounts

Lesson Review

  1. The maximum number of characters that Windows XP Professional recognizes in a local user account name is __________.

    20

  2. When are duplicate local user accounts valid in a network of computers running Windows XP Professional?

    They are valid as long as they are not on the same computer. In fact, in a workgroup, you must create the same user account on each computer in the workgroup that you want the user to be able to access.

  3. Passwords can be up to ______ characters long with a minimum length of ______ characters recommended.

    128, 8

  4. Which of the following sets of characters are valid to use in a local user account name on a computer running Windows XP Professional? (Choose all that apply.)
    1. 0 ( ) 9
    2. - + = >
    3. A through Z; a through z
    4. [ ] _ |

    a and c

  5. When users create their own passwords, which of the following guidelines should they observe? (Choose all that apply.)
    1. Use the maximum number of characters allowed in a password.
    2. Use a password that is hard for others to guess.
    3. Use at least one uppercase letter, one lowercase letter, one numeral, and one valid nonalphanumeric character.
    4. Use the name of your spouse, child, cat, or dog so that you can easily remember it.

    b and c

Lesson 3: Creating, Modifying, and Deleting User Accounts

Practice: Creating, Modifying, and Deleting Local User Accounts

Exercise 4: Creating a New Local User Account Using the Computer Management Snap-In

To create a local user account using the Computer Management snap-in

  1. Click Start, click Control Panel, and then click User Accounts.

    The User Accounts window appears.

    What type of account is User3?

    The account type for User3 is Limited Account.

  2. In the Password and Confirm Password text boxes, type User4.

    How does the password appear on the screen? Why?

    The password is displayed as asterisks as you type. This prevents others from viewing the password as you enter it.

Exercise 5: Testing a New Local User Account

To test a local user account

  1. On the Welcome screen, click User3.

    What happens?

    A Logon Message dialog box appears, informing you that you are required to change your password at first logon.

Lesson Review

  1. Which of the following statements about the Windows XP Professional User Accounts tool are correct? (Choose all that apply.)
    1. The User Accounts tool allows you to remotely create, modify, and delete user accounts on all computers in the network running Windows XP Professional.
    2. The User Accounts tool allows you to view and modify all accounts on the computer.
    3. The tasks you can perform with the User Accounts tool depend on the type of account you use to log on to the local computer.
    4. The User Accounts tool allows users to delete, create, or remove their individual passwords.

    c and d

  2. Which of the following tasks can both account types perform? (Choose all that apply.)
    1. Change your picture
    2. Change your account type
    3. Create, change, or remove your password
    4. Change your account name

    a and c

  3. Which of the following statements about logging on or logging off a computer running Windows XP Professional are true? (Choose all that apply.)
    1. You can quickly switch to another user account without logging off and closing all programs that you are running.
    2. The User Accounts tool allows you to disable a local user account to prevent users from using the disabled account to log on.
    3. When you use the Welcome screen to log on the local computer, you can only log on using one of the accounts displayed on the Welcome screen.
    4. The User Accounts tool allows you to replace the Welcome screen with a logon prompt that requires users to type their individual user names and passwords.

    a and d

  4. When you use the Computer Management snap-in to create a new user account, which check box do you select to prevent a new employee from using the new account until the employee starts working for the company?

    Account Disabled

Lesson 4: Setting Properties for User Accounts

Practice: Modifying User Account Properties

Exercise 2: Testing User Account Properties

To test User Account properties

  1. Click Change Password.

    What happens? Why?

    A User Accounts dialog box appears with the message Windows Cannot Change The Password. You set the User Cannot Change Password option for User1.

Lesson Review

  1. When can you select the Account Is Locked Out check box for a user and why?

    Never, because the Account Is Locked Out check box is unavailable when the account is active and is not locked out of the system. The system locks out a user if the user exceeds the limit for the number of failed logon attempts.

  2. Which of the following statements about local user account properties are correct? (Choose all that apply.)
    1. You can configure all of the default properties associated with each local user account using the User Accounts tool located in the Control Panel.
    2. In Computer Management, the General tab in the account-name Properties dialog box for a user account allows you to disable the account.
    3. In Computer Management, the General tab in the account-name Properties dialog box for a user account allows you to select the Account Is Locked Out check box to prevent the user from logging on to the computer.
    4. You can use the Computer Management snap-in to configure all of the default properties associated with each local user account.

    b and d

  3. Which of the following statements about user profiles are correct? (Choose all that apply.)
    1. A user profile is a collection of folders and data that stores the user's current desktop environment, application settings, and personal data.
    2. A user profile contains all the network connections that are established when a user logs on to a computer.
    3. Windows XP Professional creates a user profile when you create a new local user account.
    4. You must create each user profile by copying and modifying an existing user profile.

    a and b

  4. Which of the following statements about user profiles are correct? (Choose all that apply.)
    1. Users should store their documents in home directories rather than in their My Documents folders.
    2. The Profile tab in the account-name Properties dialog box for a user account allows you to set a path for the user profile, logon script, and home folder.
    3. A user profile contains the My Documents folder, which provides a place for users to store personal files.
    4. When users change their desktop settings, the changes are reflected in their user profiles.

    c and d

  5. What three tasks must you perform to create a home folder on a network server?

    First, you must create and share a folder in which to store all home folders on a network server. Second, for the shared folder, remove the default Full Control permission from the Everyone group and assign Full Control to the Users group for users that will reside in this shared folder. Third, provide the path to the user's home folder in the shared home directory folder in the Profile tab of the Properties dialog box for the user account.

Lesson 5: Implementing Groups

Lesson Review

  1. What are groups, and why do you use them?

    A group is a collection of user accounts. A group simplifies administration by allowing you to assign permissions and rights to a group of users rather than to each individual user account.

  2. An administrator or owner of a resource uses __________________ to control what users can do with a resource such as a folder, file, or printer.

    Permissions

  3. You use local groups to assign permissions to resources residing __________________.

    On the computer on which the local group is created

  4. Which of the following statements about local groups are correct? (Choose all that apply.)
    1. If a computer running Windows XP Professional is part of a domain, the local groups for that computer are stored in the Directory rather than in the local security database on that computer.
    2. Local groups allow you to grant permission to the group to perform system tasks, such as changing the time on a computer and backing up or restoring files.
    3. A local group is a collection of user accounts on a computer that you can use to control access to resources residing on that computer.
    4. You can use the Computer Management snap-in to create groups, to add members to existing groups, and to delete groups from a computer running Windows XP Professional.

    c and d

  5. Which of the following statements about local groups are correct? (Choose all that apply.)
    1. You can use local groups only on the computer on which you create them.
    2. Local groups are available on member servers and domain computers running Windows 2000 Server.
    3. Local groups appear in Active Directory so you can administer them centrally.
    4. You must create each user profile by copying and modifying an existing user profile.

    a and b

  6. Which of the following statements about deleting local groups are correct? (Choose all that apply.)
    1. Each group that you create has a unique identifier that cannot be reused.
    2. You can restore access to resources by recreating the group.
    3. When you delete a group, you also remove the permissions and rights associated with it.
    4. Deleting a group deletes the user accounts that are members of the group.

    a and c

  7. What is the difference between built-in system groups and built-in local groups found on computers running Windows XP Professional? Give at least two examples of each type of group.

    Built-in local groups give rights to perform system tasks on a single computer, such as backing up and restoring files, changing the system time, and administering system resources. Some examples of built-in local groups are Administrators, Backup Operators, Guests, Power Users, Replicator, and Users.

    Built-in system groups do not have specific memberships that you can modify, but they can represent different users at different times, depending on how a user gains access to a computer or resource. You do not see system groups when you administer groups, but they are available for use when you assign rights and permissions to resources. Some examples of built-in system groups are Everyone, Authenticated Users, Creator Owner, Network, Interactive, Anonymous Logon, and Dialup.

Chapter 4: Installing, Configuring, and Troubleshooting Network Protocols

Lesson 1: Understanding the TCP/IP Protocol Suite

Lesson Review

  1. What are the four layers to which the TCP/IP suite of protocols maps? What are the functions of the protocols that map to each layer?

    Application, transport, Internet, and network interface. The protocols that map to the application layer allow applications to gain access to the network. The protocols that map to the transport layer provide communication sessions between computers. The protocols that map to the Internet layer encapsulate packets into Internet datagrams and run all the necessary routing algorithms. The protocols that map to the network interface layer put frames on the wire and pull frames off the wire.

  2. Which of the following statements correctly describes IP? (Choose all answers that are correct.)
    1. IP guarantees packet arrival and correct packet sequence.
    2. IP provides connection-oriented, reliable communications for applications that typically transfer large amounts of data at one time.
    3. IP is primarily responsible for addressing and routing packets between hosts.
    4. IP provides connectionless packet delivery for all other protocols in the suite.

    c and d

  3. Which of the following statements correctly describes TCP? (Choose all answers that are correct.)
    1. TCP provides connectionless communications but does not guarantee that packets will be delivered.
    2. TCP provides connection-oriented, reliable communications for applications that typically transfer large amounts of data at one time.
    3. TCP provides services that allow the application to bind to a particular port and IP address on a host.
    4. TCP provides and assigns a sequence number to each segment of data that is transmitted.

    b and d

  4. Which of the four layers to which the TCP/IP suite of protocols maps does IGMP map to and what is IGMP used for?

    IGMP maps to the Internet layer and provides multicasting.

  5. What is multicasting?

    Multicasting is the process of sending a message simultaneously to more than one destination. IP multicast traffic is sent to a single MAC address but is processed by multiple hosts.

  6. The two transport layer protocols are _____________ and _______________.

    TCP and UDP

  7. Which of the following statements correctly describes ARP? (Choose all answers that are correct.)
    1. ARP is a protocol included in the Internet layer.
    2. ARP is a protocol included in the transport layer.
    3. ARP provides IP address mapping to the MAC sublayer address to acquire the physical MAC control address of the destination.
    4. ARP is primarily responsible for addressing and routing packets between hosts.

    a and c

Lesson 2: Configuring and Troubleshooting TCP/IP

Practice: Configuring TCP/IP

Exercise 4: Obtaining an IP Address Using Automatic Private IP Addressing

To obtain an IP address by using Automatic Private IP Addressing

  1. At the command prompt, type ipconfig /renew and then press Enter.

    There is a pause while Windows XP Professional attempts to locate a DHCP server on the network.

    What message appears, and what does it indicate?

    The message is as follows: An error occurred while renewing interface Local Area Connection: The semaphore timeout period has expired. This error message indicates that Windows XP Professional could not renew the TCP/IP configuration.

To test the TCP/IP configuration

  1. Pressing Spacebar as necessary, record the current TCP/IP settings for your local area connection in the following table.

    Setting Value

    IP address

    Subnet mask

    Default gateway

    Is this the same IP address assigned to your computer in Exercise 3? Why or why not?

    No, this is not the same IP address assigned to the computer in Exercise 3. It is not the same address because this address is assigned by the Windows XP Professional Automatic Private IP Addressing.

  2. If you have a computer to test TCP/IP connectivity with your computer, type ping ip_address (where ip_address is the IP address of the computer that you are using to test connectivity) and then press Enter. If you do not have a computer to test connectivity, skip this step and proceed to Exercise 5.

    Were you successful? Why or why not?

    No, you would not be successful. Your computer has an address assigned by Automatic Private IP Addressing and the test computer is on a different subnet.

Lesson Review

  1. Why would you assign a computer a static IP address?

    You can assign static IP addresses if there are no DHCP servers on the network, or you can use the Automatic Private IP Addressing feature. You should assign a static IP address to selected network computers, such as the computer running the DHCP Service. The computer running the DHCP Service cannot be a DHCP client, so it must have a static IP address.

  2. Which of the following statements correctly describe IP addresses? (Choose all answers that are correct.)
    1. Logical 64-bit addresses that identify a TCP/IP host.
    2. Each network adapter card in a computer running TCP/IP requires a unique IP address.
    3. 192.168.0.108 is an example of a class C IP address.
    4. The host ID in an IP address is always the last two octets in the address.

    b and c

  3. What is the purpose of a subnet mask?

    A subnet mask blocks out part of the IP address so that TCP/IP can distinguish the network ID from the host ID.

  4. By default, client computers running Windows XP Professional, Windows 95, or Windows 98 obtain TCP/IP configuration information automatically from the DHCP Service: True or false?

    True

  5. Which of the following statements about obtaining an IP address automatically are true? (Choose all answers that are correct.)
    1. Windows XP Professional includes the DHCP Service.
    2. Windows XP Professional includes an Automatic Private IP Addressing feature, which provides DHCP clients with limited network functionality if a DHCP server is unavailable during startup.
    3. The Internet Assigned Numbers Authority (IANA) has reserved 169.254.0.0 through 169.254.255.255 for Automatic Private IP Addressing.
    4. You should always disable Automatic Private IP Addressing in small workgroups.

    b and c

  6. Your computer running Windows XP Professional was configured manually for TCP/IP. You can connect to any host on your own subnet, but you cannot connect to or even ping any host on a remote subnet. What is the likely cause of the problem and how would you fix it?

    The default gateway might be missing or incorrect. You specify the default gateway in the Internet Protocol (TCP/IP) Properties dialog box (in the Network And Internet Connections dialog box under Network Connections). Other possibilities are that the default gateway is offline or the subnet mask is incorrect.

  7. Your computer's Computer Name is Pro1 and you ping Pro1. The local address for Pro1 is returned as 169.254.x.y. What does this tell you?

    Automatic Private IP Addressing of Windows XP Professional has assigned your computer Pro1. This means that the local DHCP server is not configured properly or cannot be reached from your computer.

Lesson 3: Installing, Configuring, and Troubleshooting NWLink

Practice: Installing and Configuring NWLink

To install and configure NWLink

  1. Click Protocol, and then click Add.

    Windows XP Professional displays the Select Network Protocol dialog box.

    What protocols can you install?

    Network Monitor Driver and NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. Network Monitor Driver enables Network Monitor to receive frames (also called packets) from the local network adapter. You can use the frames to detect and troubleshoot problems on LANs.

  2. Select NWLink IPX/SPX/NetBIOS Compatible Transport Protocol, and then click Properties.

    What type of frame detection is selected by default?

    Auto Detect

  3. Click the arrow to view the Frame Type drop-down menu selections.

    What other frame types are listed?

    Ethernet 802.2, Ethernet 802.3, Ethernet II, and Ethernet SNAP

  4. Select one of the frame types listed, other than Auto Detect.

    Why is the Network Number option now active?

    Each frame type configured on a network adapter card requires a network number.

To determine the installed network number and frame type on the client

  1. At the command prompt, type ipxroute config and press Enter.

    What is the network number and frame type for the LAN?

    The network number is 00000000 and the frame type is 802.2. Answers may vary.

Lesson Review

  1. Your computer running Windows XP Professional can communicate with some but not all of the NetWare servers on your network. Some of the NetWare servers are running frame type 802.2 and some are running 802.3. What is the likely cause of the problem?

    Although the NWLink implementation in Windows XP Professional can automatically select a frame type for IPX/SPX-compatible protocols, it can automatically detect only one frame type. This network uses two frame types. To resolve the problem, you must manually configure the additional frame type (802.3).

  2. How can you verify that the network number and frame type are correct for your client computer running Windows XP Professional and attempting to access a NetWare server?

    On the client, start a command prompt. At the command prompt, type command and then click OK to open a command prompt. In the Run dialog box, type ipxroute config and then press Enter. Verify that the network number and frame type in the Network and Frame columns are correct for your installation.

  3. Which of the following statements about NWLink are true? (Choose all answers that are correct.)
    1. NWLink allows computers running Windows XP Professional to communicate with other network devices that are using IPX/SPX.
    2. NWLink provides NetWare clients with access to Microsoft SQL Server.
    3. NWLink provides NetWare clients access to file and print resources on a computer running Windows 2000 Server.
    4. NWLink provides NetWare clients with access to Microsoft SNA Server.

    a, b, and d

  4. Which of the following commands or tools do you type in a command prompt to determine information about the stack, including the current IPX status, network number, MAC address, interface name, and frame type?
    1. Ipcon fig
    2. Iproute config
    3. Ipxroute config
    4. Ipxroute ripout

    c

Lesson 4: Network Bindings

Practice: Working with Network Bindings

Exercise 1: Changing the Binding Order for a Protocol

To change the protocol binding order

  1. In the Network Connections window, on the Advanced menu, click Advanced Settings.

    The Advanced Settings dialog box appears.

    What is the order of the protocols listed under Client For Microsoft Networks?

    The NWLink IPX/SPX/NetBIOS Compatible Transport Protocol was the last protocol installed, so it is the first one listed. Internet Protocol (TCP/IP) is listed second.

Lesson Review

  1. What is binding?

    Binding is the process of linking network components on different levels to enable communication between those components.

  2. What is the significance of the binding order of network protocols?

    You specify the binding order to optimize network performance. For example, a computer running Windows XP Professional has both TCP/IP and NWLink IPX/SPX installed. However, most of the servers to which this computer connects are running only TCP/IP. You would adjust the binding order so that the workstation binding to TCP/IP is listed before the workstation bindings for NWLink IPX/SPX. In this way, when a user attempts to connect to a server, Client for Microsoft Networks first attempts to establish the connection using TCP/IP.

  3. Can a network component bind to more than one component above or below it? Why is that important?

    A network component can be bound to one or more network components above or below it. This is important because the services that each component provides can be shared by all other components that are bound to it. For example, a network adapter card can be bound to more than one network protocol at a time.

  4. What function does NDIS provide and what version is in Windows XP Professional?

    NDIS provides the capability to bind multiple protocols to multiple network adapter card drivers. The version in Windows XP Professional is 5.1.

Chapter 5: Using the DNS Service and Active Directory Service

Lesson 1: Understanding DNS

Lesson Review

  1. What is DNS and what is used for?

    DNS is a naming system that is used in TCP/IP networks to translate computer names to IP addresses. DNS makes it easy to locate computers and other resources on IP-based networks.

  2. Which of the following statements correctly describes DNS root domains? (Choose all answers that are correct.)
    1. The root domain is at the top of the hierarchy.
    2. The root domain is at the bottom of the hierarchy.
    3. The root domain is represented by a two- or three-character name code.
    4. The root domain is represented by a period (.).

    a and d

  3. Which of the following are second-level domain names? (Choose all answers that are correct.)
    1. gov
    2. Microsoft.com
    3. au
    4. ed.gov

    b and d

  4. ________________ provide a way to partition the domain namespace into manageable sections and each ________________ represents a discrete portion of the domain namespace.

    Zones; zone

Lesson 2: Understanding Name Resolution

Lesson Review

  1. What is a forward lookup query and how is it resolved?

    A forward lookup query is the resolving of a user-friendly DNS domain name to an IP address. To resolve a forward lookup query, a client passes a lookup query to its local name server. If the local name server can resolve the query, it returns the IP address for the name so the client can contact it. If the local name server cannot resolve the query, it passes the query on to one of the DNS root servers. The DNS root server sends back a referral to a name server that can resolve the request. The local name server sends the request to the name server it was referred to by the DNS root server. An IP address is returned to the local name server and the local name server sends the IP address to the client.

  2. In DNS name resolution, which of the following statements about Time to Live (TTL) are correct? (Choose all answers that are correct.)
    1. TTL is the length of time a query can exist before it is resolved or discarded.
    2. Shorter TTL values help ensure that data about the domain namespace is more current across the network.
    3. Longer TTL values increase the amount of DNS traffic.
    4. Longer TTL values cause the cached values to be retained longer.

    b and d

  3. Which of the following statements about DNS name and address resolution are correct? (Choose all answers that are correct.)
    1. The DNS distributed database is indexed by both names and IP addresses.
    2. The top-level domain in-addr.arpa is used for both forward and reverse queries.
    3. In the in-addr.arpa domain the order of the IP address octets is reversed.
    4. Troubleshooting tools, such as the nslookup command-line tool, use reverse lookup queries to report back host names.

    c and d

Lesson 3: Configuring a DNS Client

Lesson Review

  1. What is a HOSTS file and when would you create one?

    A HOSTS file is a manually maintained local file that contains host-to-IP address and NetBIOS-to-IP name resolution. You use a HOSTS file for networks without access to a DNS name server to provide host-to-IP address and NetBIOS-to-IP name resolution for applications and services.

  2. Which of the following statements about configuring a DNS client are correct? (Choose all answers that are correct.)
    1. If you select the Obtain DNS Server Address Automatically option, at least one of the available DNS servers must be configured to broadcast its IP address.
    2. If you select the Use The Following DNS Server Addresses, you are limiting your DNS client to being able to use only two DNS servers, the preferred DNS server and the alternate DNS server.
    3. To use the Obtain DNS Server Address Automatically option, you must have a DHCP server available on your network.
    4. To configure a DNS client, you use Network and Internet Connections, which is located in Control Panel.

    c and d

  3. Which of the following functions do you perform using the Advanced TCP/IP Settings dialog box? (Choose all answers that are correct.)
    1. Edit the IP address of a DNS server.
    2. Delete the IP address of a DNS server.
    3. Enter additional IP addresses for other available DNS servers.
    4. Edit the IP addresses of the DHCP servers on the network.

    a, b, and c

  4. What does selecting the Append These DNS Suffixes (In Order) option do?

    This option allows you to specify a list of domains to try when there is a query for an unqualified name. Queries are limited to the domains that you listed.

Lesson 4: Understanding Active Directory

Lesson Review

  1. ________________ is the directory service included in the Windows 2000 Server products.

    Active Directory

  2. What is a directory service?

    A directory service is a network service that identifies all resources on a network and makes them accessible to users and applications.

  3. What are two ways that Active Directory simplifies administration?

    Active Directory organizes resources hierarchically in domains. The domain is the basic unit of replication and security in a Windows 2000 network. All domain controllers in a domain are peers, so you can make changes to any domain controller, and the updates are replicated to all other domain controllers in the domain.

    Active Directory simplifies administration by providing a single point of administration for all objects on the network, so an administrator can log on to one computer and administer objects on any computer in the network.

  4. Active Directory uses ________________ as its domain naming and location service.

    DNS

Lesson 5: Understanding Active Directory Structure and Replication

Lesson Review

  1. In Active Directory, you organize resources in a logical structure. What advantage does this provide?

    Grouping resources logically enables you to find a resource by its name rather than its physical location. Because you group resources logically, Active Directory makes the network's physical structure transparent to users.

  2. A(n) _____________ is a distinct, named set of attributes that represents a network resource.

    object

  3. What component do you use to organize objects into logical administrative groups?
    1. Site
    2. Tree
    3. Domain
    4. OU

    d

  4. A(n) ____________ is a grouping or hierarchical arrangement of one or more ___________________ that form a disjointed namespace.

    Forest; domain trees

  5. A site is a combination of one or more IP subnets connected by a highly reliable and fast link to localize as much network traffic as possible. Fast network connections are at least ______________________________ and an available bandwidth of ____________________________________ is sufficient.
    1. 256 Kbps, 128 Kbps and higher
    2. 512 Kbps, 128 Kbps and higher
    3. 512 Kbps, 256 Kbps and higher
    4. 1024 Kbps, 512 Kbps and higher

    b

  6. The physical components of Active Directory are _________ and _________.

    Domain controllers; sites

Lesson 6: Understanding Active Directory Concepts

Lesson Review

  1. What is the Active Directory schema?

    The Active Directory schema defines objects that can be stored in Active Directory. The schema is a list of definitions that determines the kinds of objects and the type of information about those objects that can be stored in Active Directory.

  2. Which of the following statements are correct for Active Directory Global Catalogs?
    1. The Global Catalog is the central repository of information about objects in a tree or forest.
    2. By default, a Global Catalog is created automatically on the first domain controller in the first domain in the forest.
    3. The Global Catalog is a list of definitions that determines the kinds of objects and the type of information about those objects that can be stored in Active Directory.
    4. Only experienced developers or network administrators should dynamically extend the Global Catalog.

    a and b

  3. Every object in Active Directory has a ____________ that uniquely identifies an object and contains sufficient information for a client to retrieve the object from the Directory.

    DN

  4. A ___________________________ is a 128-bit number that is assigned to an object when it is created and is guaranteed to be unique.

    GUID

  5. What is the difference between a contiguous namespace and a disjointed namespace? Give an example of each type of namespace.

    In a contiguous namespace, the name of the child object in an object hierarchy always contains the name of the parent domain. A tree is a contiguous namespace. In a disjointed namespace, the names of a parent object and of a child of the same parent object are not directly related to one another. A forest is a disjointed namespace.

Chapter 6: Setting Up, Configuring, and Troubleshooting Common Setup and Configuration Problems for Network Printers

Lesson 1: Introduction to Windows XP Professional Printing

Lesson Review

  1. ________________ are connected to a physical port on the print server.

    Local printers

  2. Do you have to have a computer running one of the Windows Server products to have a print server on your network? Why?

    No. A print server is a computer that manages one or more printers on a network. The print server receives and processes documents from client computers. If you have a computer running Windows XP Professional and it has a shared printer attached to it, it is by definition a print server. However, if the print server will manage many heavily used printers, Microsoft recommends a dedicated print server and most dedicated print servers run one of the Windows Server products.

  3. Windows XP Professional can provide ____________ concurrent connections from other computers for file and print services.
    1. 20
    2. 10
    3. unlimited
    4. 30

    b

  4. A ______________________ is one file or a set of files containing information that Windows XP Professional requires to convert print commands into a specific printer language, such as PostScript.

    Printer driver

  5. Windows XP Professional printing supports which of the following software interfaces or printer ports? (Choose all answers that are correct.)
    1. LPT
    2. COM
    3. USB
    4. HP JetDirect

    a, b, c, and d

  6. Windows XP Professional printing supports which of the following types of computers? (Choose all answers that are correct.)
    1. Macintosh computers
    2. UNIX computers
    3. NetWare clients
    4. Windows 98 computers

    b and d

Lesson 2: Setting Up Network Printers

Lesson Review

  1. Which of the following tasks are done with the Add Printer Wizard? (Choose all answers that are correct.)
    1. Taking a local printer offline
    2. Printing multiple copies of a document
    3. Adding an LPR port
    4. Making a printer that is connected to your computer available to other network users

    c and d

  2. What is the default printer in Windows XP Professional?

    The default printer is the printer used for all Windows-based applications. You would select this option so that you do not have to set a printer for each application. The first time that you add a printer to the print server, this option does not appear because the printer is automatically selected as the default printer.

  3. After you get home from the store, you unpack your new computer and printer. You install Windows XP Professional, and you want to install your printer. You want to set up the printer as your default printer. During the installation you are not prompted to use the printer as your default printer for all Windows-based applications. You know you have seen this option at work when you install local printers. Why aren't you seeing it on your home computer?

    The first time that you add a printer to a computer, this option does not appear. The printer is automatically selected as the default printer.

  4. Which of the following statements about adding and using an LPR port are correct? (Choose all answers that are correct.)
    1. The LPR port is designed for computers that need to communicate with Macintosh computers in accordance with RFC 1179.
    2. A network-connected printer must have a card that supports the LPD for TCP/IP printing to work properly.
    3. When you are trying to add an LPR port, if the LPR Port option is not available, install the optional networking component, Print Services for UNIX.
    4. LPD is a service on the client computer that sends documents (print jobs) out the LPR port.

    b and c

  5. After you add and share a printer on a computer running Windows XP Professional, the tasks to set up client computers vary depending on which operating systems are running on the client computers. Which of the following operating systems running on client computers would require additional software or services to be installed before users on these computers can connect to the shared printer? (Choose all answers that are correct.)
    1. Windows 98
    2. NetWare
    3. Windows 2000 Professional
    4. UNIX

    b and d

Lesson 3: Connecting to Network Printers

Lesson Review

  1. When you add and share a printer, by default, who can connect to that printer?

    By default, all users can connect to that printer.

  2. Which of the following operating systems running on a client computer allow you to use the Net Use command to connect to a network printer? (Choose all answers that are correct.)
    1. Windows 2000
    2. Windows Me
    3. Windows NT 4
    4. Windows XP Professional

    a, b, c, and d

  3. Which of the following operating systems running on a client computer allow you to connect to a network printer by using Active Directory search capabilities? (Choose all answers that are correct.)
    1. Windows 2000
    2. Windows Me
    3. Windows NT 4
    4. Windows XP Professional

    a, b, and d

  4. Which of the following operating systems running on a client computer allow you to use a Web browser to connect to a network printer? (Choose all answers that are correct.)
    1. Windows 2000
    2. Windows 98
    3. Windows NT 4
    4. Windows XP Professional

    a and d

  5. You have a small workgroup consisting of five computers running Windows XP Professional at your house. You are giving your friend, who has never seen Windows XP Professional, a tour around the new operating system. You are demonstrating how the Search Assistant works, but the Find Printers feature is missing. Why?

    The Find Printers feature is not available in the Search Assistant unless you are logged on to a Windows 2000 domain. If you are using a stand-alone computer or one that is in a workgroup, the Find Printers component is not available.

Lesson 4: Configuring Network Printers

Lesson Review

  1. What are some advantages to sharing a printer?

    Sharing a printer allows other users on the network to use the printer. In a network with a high volume of printing, it decreases the time that documents wait on the print server. It simplifies administration because you can administer multiple printers simultaneously.

  2. How do you share a printer?

    In the Properties dialog box for the printer, in the Sharing tab, click Share Name and type in a share name.

  3. Which of the following statements about a printing pool in Windows XP Professional are correct? (Choose all answers that are correct.)
    1. All printers in a printing pool must be network interface printers.
    2. A printing pool consists of two or more identical printers that are connected to one print server and act as a single printer.
    3. If you use printers that are not identical, they must use the same printer driver.
    4. If you use printers that are not identical, you must install all the required printer drivers on the print server.

    b and c

  4. Why would you create virtual printers and vary the priorities on them?

    Creating virtual printers that print to the same physical printer and varying the printer priority allows you to set priorities among groups of documents that all print on the same physical printer. Users can send critical documents to a high-priority virtual printer and noncritical documents to a lower priority virtual printer. The critical documents always print first, even though there is only one physical printer.

Lesson 5: Troubleshooting Setup and Configuration Problems

Lesson Review

  1. How do you access and use the printing troubleshooter?

    Click Start, click Control Panel, and click Printers And Other Hardware. In the Printers And Other Hardware window, under Troubleshooters, click Printers. The Help And Support Services window appears with the printing troubleshooter displayed.

  2. What should you check if documents print correctly on some printers in a printing pool but not all of them?

    Verify that all print devices in the printer pool are identical or that they use the same printer driver.

  3. What should you check if printing is slow because the print server is taking a long time to render the job?

    Try defragmenting the print server's disk and check that there is adequate space for temporary files on the hard disk.

  4. What should you check if pages are only partially printing?

    There might not be enough memory to print the document, so consider adding memory to the print server. The printer might not have enough toner, so try replacing the printer's toner cartridge.

Chapter 7: Administering and Troubleshooting Common Administrative Problems for Network Printers

Lesson 1: Understanding Printer Administration

Lesson Review

  1. What are the four major types of tasks involved with administering network printers?

    Managing printers, managing documents, troubleshooting printers, and performing tasks that require the Manage Printers permission

  2. Microsoft Windows XP Professional allows you to control printer usage and administration by assigning _________________.

    Permissions

  3. Which level of printer permissions provided by Windows XP Professional grants users the ability to perform the most printing tasks?
    1. Manage Printers
    2. Manage Documents
    3. Print
    4. Full Control

    a

  4. Which of the following tabs do you use to assign printer permissions to users and groups?
    1. Security tab of the Properties dialog box for the printer
    2. Security tab of the Properties dialog box for the user or group
    3. Permissions tab of the Properties dialog box for the printer
    4. Permissions tab of the Properties dialog box for the user or group

    a

  5. Which Windows XP Professional printer permission allows users to pause, resume, restart, and cancel all other users' documents? (Choose all answers that are correct.)
    1. Print
    2. Manage Printers
    3. Full Control
    4. Manage Documents

    b and d

Lesson 2: Managing Printers

Lesson Review

  1. If a printer has multiple trays that regularly hold different paper sizes, you can assign a form to a specific tray. How do you assign a form to a paper tray?

    In the Properties dialog box for the printer, click the Device Settings tab. In the box next to each paper tray, select the form for the paper type you want to assign to that tray.

  2. A _______________________ is a file that contains print device commands that identify and separate printed documents.

    Separator page

  3. Which of the following tabs do you use to redirect documents to a different printer?
    1. Advanced tab of the Properties dialog box for the printer
    2. Security tab of the Properties dialog box for the printer
    3. Ports tab of the Properties dialog box for the printer
    4. Device Settings tab of the Properties dialog box for the printer

    c

  4. Which of the following tabs do you use to take ownership of a printer?
    1. Advanced tab of the Properties dialog box for the printer
    2. Security tab of the Properties dialog box for the printer
    3. Ports tab of the Properties dialog box for the printer
    4. Permissions tab of the Properties dialog box for the printer

    b

  5. Which of the following tabs do you use to set up a separator page?
    1. Advanced tab of the Properties dialog box for the printer
    2. Security tab of the Properties dialog box for the printer
    3. Ports tab of the Properties dialog box for the printer
    4. Permissions tab of the Properties dialog box for the printer

    a

Lesson 3: Managing Documents

Practice: Managing Documents

To set a notification

  1. In the Printer window, select BIG, and then, on the Document menu, click Properties.

    Windows XP Professional displays the BIG Document Properties dialog box with the General tab active.

    Which user is specified in the Notify text box? Why?

    The user account that you are logged on with is specified because that is who created the print job.

To increase the priority of a document

  1. In the BIG Document Properties dialog box, in the General tab, notice the default priority.

    What is the current priority? Is it the lowest or highest priority?

    The current priority is 1, which is the lowest priority.

Lesson Review

  1. What is the difference between resuming printing of a document and restarting printing of a document?

    When you restart a document, it begins printing again from the beginning of the document. When you resume printing a document, it continues from where it left off printing.

  2. Which of the following statements about the range of priorities for a document to be printed is correct?
    1. Priorities for a document range from 1 to 10, with 1 being the highest priority.
    2. Priorities for a document range from 1 to 10, with 10 being the highest priority.
    3. Priorities for a document range from 1 to 99, with 1 being the highest priority.
    4. Priorities for a document range from 1 to 99, with 99 being the highest priority.

    d

  3. You set the notification, priority, and printing time for a document in the ______________ tab of the Properties dialog box for the document.

    General

  4. By default, Windows XP Professional enters the ______________ logon name in the Notify text box of a document.
    1. Administrator's
    2. Owner of the printer's
    3. Owner of the document's
    4. Person who printed the document's

    d

Lesson 4: Administering Printers Using a Web Browser

Lesson Review

  1. If you are using a computer running Windows XP Professional as your print server, users can gain access to the printers on it by using a Web browser only if the print server has __________________________________ installed.

    Internet Information Services (IIS)

  2. How can you gain access to all printers on a print server?

    In a Web browser or any of the windows or folders within the Windows XP Professional interface that has an address bar, type http://print_server_name/printers

  3. Can you pause and resume operation of a printer that you have used Internet Explorer to connect to?

    Yes, if you have the Manage Printers permission for the printer, you can also pause or resume operation of a printer that you used Internet Explorer to connect to.

Lesson 5: Troubleshooting Common Printing Problems

Lesson Review

  1. When you detect a printing problem, what three things should you always check before you start troubleshooting the problem?

    Always verify that the printer is plugged in, turned on, and connected to the print server.

  2. If a user reports to you that he or she cannot print, what are some of the areas you should check?

    Answers may vary. Suggested areas you should check include the following: Can other users print normally? Is the print server operational and is there enough disk space for spooling? Does the client computer have the correct printer driver?

  3. The ___________________________________ feature included in Windows XP Professional allows you to invite an expert to take full control of your computer over the Internet to resolve printing problems on your computer.

    Remote Assistance

Chapter 8: Securing Resources with NTFS Permissions

Lesson 1: Understanding and Applying NTFS Permissions

Lesson Review

  1. Which of the following statements correctly describe NTFS file and folder permissions? (Choose all answers that are correct.)
    1. NTFS security is effective only when a user gains access to the file or folder over the network.
    2. NTFS security is effective when a user gains access to the file or folder on the local computer.
    3. NTFS permissions specify which users and groups can gain access to files and folders and what they can do with the contents of the file or folder.
    4. NTFS permissions can be used on all file systems available with Windows XP Professional.

    b and c

  2. Which of the following NTFS folder permissions allow you to delete the folder?
    1. Read
    2. Read & Execute
    3. Modify
    4. Administer

    c

  3. Which of the NTFS file permissions should you assign to a file if you want to allow users to delete the file but do not want to allow users to take ownership of a file?

    Modify

  4. What is an access control list (ACL) and what is the difference between an ACL and an access control entry (ACE)?

    An ACL is stored with every file and folder on an NTFS volume and contains a list of all user accounts or groups that have been assigned permissions to that file or folder. An ACE is an entry in an ACL that contains the operations that a user or group is allowed or specifically denied to perform on that file or folder.

  5. What are a user's effective permissions for a resource?

    A user's effective permissions for a resource are the sum of the NTFS permissions assigned to the individual user account and to all of the groups to which the user belongs. If there are any Deny permissions set, they override all instances in which that permission is allowed and must be removed from the user's effective permissions.

  6. By default, what inherits the permissions that you assign to the parent folder?

    By default, the permissions that you assign to the parent folder are inherited by and propagated to the subfolders and files that are contained in the parent folder.

Lesson 2: Assigning NTFS Permissions and Special Permissions

Practice: Planning and Assigning NTFS Permissions

Exercise 1: Determining the Default NTFS Permissions for a Folder

To determine the default permissions on a folder

  1. Click the Security tab to display the permissions for the Public folder.

    If any of the users or groups have special permissions, click the user or group and then click Advanced to see which special permissions are set.

    Windows XP Professional displays the Public Properties dialog box with the Security tab active.

    What are the existing folder permissions?

    The Administrators group has Full Control. The CREATOR OWNER has special permissions, Full Control. The account that created the folder has special permissions, Full Control. SYSTEM has Full Control. The Users group has Read & Execute, List Folder Contents, Read, and special permissions of Create Files/Write Data and Create Folders/Append Data.

To test the folder permissions for the Public folder

  1. In the Public folder, create a text document named USER81 and type in the following text: The first four letters in the alphabet are a, b, c, and d.

    Were you successful? Why or why not?

    Yes, because the Users group is assigned the special permissions of Create Files/Write Data and Create Folders/Append Data for the Public folder.

  2. Attempt to perform the following tasks for the file that you just created:
    • Open the file
    • Modify the file
    • Delete the file

    Which tasks were you able to complete and why?

    You can open, modify, and delete the file because you created the file and are therefore the CREATOR OWNER. CREATOR OWNER has been assigned the NTFS Full Control permission for the Public folder.

  3. Attempt to perform the following tasks on the USER81 text document:
    • Open the file
    • Modify the file
    • Delete the file

    Which tasks were you able to complete and why?

    You can open the file because the Users group has Read permission in the Public folder.

    When you attempt to modify the file, you get an error message. You cannot modify the file because the Users group does not have either Full Control or Modify permissions for the Public folder. Users can create files and folders in the Public folders and they have Full Control permission for the file and folders that they created, but they cannot modify files and folders for which they are not the creator or owner.

    You cannot delete the file. You can only read files and folders for which you are not the owner.

Exercise 2: Assigning NTFS Permissions

Based on what you learned in Exercise 1, what changes in permission assignments do you need to make to meet each of these four criteria? Why?

The first three criteria are met by the default permission assignments. To allow User82 the ability to modify or delete all files in the Public folder. you could change the special permission assigned to User82 to Full Control.

You are currently logged on as User82. Can you change the permissions assigned to User82 while logged on as User82? Why or why not?

No, you cannot change the permissions assigned User82 while logged on as User82 because User82 is not a member of the Administrators group, is not the owner of the Public folder, and does not have the Full Control permission for the Public folder. Only Administrators, the owners of files or folders, and users with Full Control permission can assign NTFS permissions to users and groups to control access to files and folders.

To assign NTFS permissions for a folder

  1. Click OK to close the Select Users Or Groups dialog box.

    User82 now appears in the Group Or User Name box in the Public Properties dialog box.

    What permissions are assigned to User82?

    Read & Execute, List Folder Contents, and Read

To test NTFS permissions for a folder

  1. Attempt to perform the following tasks on the USER81 text document:
    • Open the file
    • Modify the file
    • Delete the file

    Which tasks were you able to record and why?

    User82 can open, modify, and delete the file because User82 has been assigned the Full Control permission for the Public folder.

Exercise 3: Testing NTFS Permissions

To test permissions for the Library folder while logged on as User82

  1. Attempt to perform the following tasks on USER81:
    • Open the file
    • Modify the file
    • Delete the file

    Which tasks were you able to record and why?

    User82 can open, modify, and delete the file because User82 has been assigned the Full Control permission for the Library folder. The Inherit From Parent The Permission Entries That Apply To Child Objects check box is selected by default. Therefore the Full Control permission was inherited by the Library folder from the Public folder.

Lesson Review

  1. By default, when you format a volume with NTFS, the ______________________ permission is assigned to the Everyone group.

    Full Control

  2. When you assign permissions for public data folders, it is recommended that you assign the ______________________ permission and the ____________________ permission to the Users group and the ______________________ permission to the CREATOR OWNER user.

    Read & Execute; Write; Full Control

  3. Which of the following users can assign permissions to user accounts and groups? (Choose all answers that are correct.)
    1. Administrators
    2. Power users
    3. Users with the Full Control permission
    4. Owners of files and folders

    a, c, and d

  4. Which of the following tabs in the Properties dialog box for the file or folder do you use to assign or modify NTFS permissions for a file or a folder?
    1. Advanced
    2. Permissions
    3. Security
    4. General

    c

  5. What is the purpose of the Traverse Folder/Execute File special permission?

    Traverse Folder allows or denies moving through folders to access other files or folders, even when the user has no permissions for the traversed folder. Execute File allows or denies running executable files (application files).

  6. What is the difference between the Delete permission and Delete Subfolder and Files permission?

    Delete allows or denies the deleting of a file or folder. Even if a user does not have the Delete permission for a file or folder, the user can still delete the file or folder if the Delete Subfolder and Files permission has been granted to the user on the parent folder.

Lesson 3: Solving Permissions Problems

Practice: Managing NTFS Permissions

Exercise 1: Taking Ownership of a File

To determine the permissions for a file

  1. Click the Owner tab.

    Who is the current owner of the OWNER file?

    The Administrators group

To take ownership of a file

  1. Under Change Owner To, select User81, and then click Apply.

    Who is now the owner of the OWNER file?

    User81

Exercise 2: Copying and Moving Folders

To create a folder while logged on as a user

  1. While you are logged on as User81, in Windows Explorer, in the root folder of drive C, create a folder named Temp1.

    What are the permissions that are assigned to the folder?

    User or group Permissions

    Administrators (PRO1\Administrators)

    Full Control

    Creator and owner

    Full Control

    System

    Full Control

    User81

    Full Control

    Users (PRO1\Users)

    Read & Execute, List Folder Contents, Read Special permissions - Create Files/Write Data and Create Folders/Append Data

    Who is the owner? Why?

    User81 is the owner because the person who creates a folder or file is the owner.

To create a folder while logged on as a member of the Administrators group

  1. In the root folder of drive C, create the folders Temp2 and Temp3.

    What are the permissions for the Temp2 and Temp3 folders that you just created?

    User or group Permissions

    Administrators (PRO1\Administrators)

    Full Control

    Creator and owner

    Full Control

    System

    Full Control

    Fred or the name of the user account you used to create Temp2

    Full Control

    Users (PRO1\Users)

    Read & Execute, List Folder Contents, Read Special permissions - Create Files/Write Data and Create Folders/Append Data

    Who is the owner of the Temp2 and Temp3 folders? Why?

    The Administrators group or Fred (the name of the user account you used to create Temp2 if you did not log on as Administrator) is the owner because the person who creates a folder or file is the owner. If the person is a member of the Administrators group, the Administrators group is the owner.

To copy a folder to another folder within a Windows XP Professional NTFS volume

  1. Select C:\Temp1\Temp2, and then compare the permissions and ownership with C:\Temp2.

    Who is the owner of C:\Temp1\Temp2 and what are the permissions? Why?

    The owner of C:\Temp1\Temp2 is the user account that performed the copy. The permissions for C:\Temp1\Temp2 are now the same as the permissions of Temp1. When you copy a folder or file into another folder, the permissions assigned to it are always the same as the permissions on the destination folder.

To move a folder within the same NTFS volume

  1. In Windows Explorer, select C:\Temp3, and then move it to C:\Temp1.

    What happens to the permissions and ownership for C:\Temp1\Temp3? Why?

    Nothing; they do not change.

Exercise 3: Deleting a File with All Permissions Denied

To view the result of the Full Control permission being denied for a folder

  1. In Windows Explorer, double-click the NOACCESS text document in the Temp3 folder to open it.

    Were you successful? Why or why not?

    No. The Users group has Full Control denied.

  2. Type Del NOACCESS.TXT and press Enter.

    Were you successful? Why or why not?

    Yes, because Full Control includes the Delete Subfolders and Files special permission for POSIX compliance. This special permission allows a user to delete files in the root of a folder to which the user has been assigned Full Control permission. This permission overrides the file permissions.

    How would you prevent users with Full Control permission for a folder from deleting a file in that folder for which they have been denied the Full Control permission?

    Allow users all of the individual permissions, and then deny users the Delete Subfolders and Files special permission.

Lesson Review

  1. Which of the following statements about copying a file or folder are correct? (Choose all answers that are correct.)
    1. When you copy a file from one folder to another folder on the same volume, the permissions on the file do not change.
    2. When you copy a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions on the file do not change.
    3. When you copy a file from a folder on an NTFS volume to a folder on another NTFS volume, the permissions on the file match those of the destination folder.
    4. When you copy a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions are lost.

    c and d

  2. Which of the following statements about moving a file or folder are correct? (Choose all answers that are correct.)
    1. When you move a file from one folder to another folder on the same volume, the permissions on the file do not change.
    2. When you move a file from a folder on an NTFS volume to a folder on a FAT volume, the permissions on the file do not change.
    3. When you move a file from a folder on an NTFS volume to a folder on another NTFS volume, the permissions on the file match those of the destination folder.
    4. When you move a file from a folder on an NTFS volume to a folder on the same volume, the permissions on the file match those of the destination folder.

    a and c

  3. When you assign NTFS permissions you should assign the _______________ (least/most) restrictive permissions.

    Most

  4. If you don't want a user or group to gain access to a particular folder or file, should you deny access permissions to that folder or file?

    You should not assign permissions to the folder or file rather than deny permission to access the folder or file. Denying permissions should be an exception, not common practice.

Chapter 9: Administering Shared Folders

Lesson 1: Understanding Shared Folders

Practice: Applied Permissions

  1. User101 is a member of Group1, Group2, and Group3. Group1 has Read permission. Group2 has Full Control permission for FolderA, and Group3 has change permissions assigned for FolderA. What are User101's effective permissions for FolderA?

    Because User101 is a member of Group1, Group2, and Group3, User101's effective permission is Full Control, which includes all capabilities of the Read permission and the Change permission.

  2. User102 has been granted the Full Control shared folder permission for FolderB as an individual user. User102 is a member of the Managers group, which has been granted Change permission for FolderB, and a member of the Sales group, which has been denied all access to FolderB. What are User102's effective permissions for FolderB?

    User102 has been granted Full Control to FolderB, but because User102 is a member of the Managers group and the Sales group, User102's effective permission is denied Full Control access to FolderB. Denied permission overrides all other permissions.

Lesson Review

  1. Because you use NTFS permissions to specify which users and groups can access files and folders and what these permissions allow users to do with the contents of the file or folder, why do you need to share a folder or use shared folder permissions?

    Although NTFS security is effective whether a user gains access to the file or folder at the computer or over the network, NTFS permissions do not make folders available over the network. Sharing folders is the only way to make folders and their contents available over the network. Shared folder permissions also provide another way to secure file resources. They can be used on FAT or FAT32 partitions, as well as NTFS partitions, whereas NTFS permissions are available only on NTFS volumes.

  2. Which of the following permissions are shared folder permissions? (Choose all answers that are correct.)
    1. Read
    2. Write
    3. Modify
    4. Full Control

    a and d

  3. ____________ (Denied /Allowed) permissions take precedence over ____________ (denied /allowed) permissions on a shared folder.

    Denied permissions take precedence over allowed permissions on a shared folder.

  4. When you copy a shared folder, the original folder is ___________ (no longer shared /still shared) and the copy is ____________ (not shared /shared).

    When you copy a folder, the original folder is still shared and the copy is not shared.

  5. When you move a shared folder, the folder is _______________ (no longer shared /still shared).

    When you move a shared folder, the folder is no longer shared.

  6. When you rename a shared folder, the folder is _____________ (no longer shared /still shared).

    When you rename a shared folder, the folder is no longer shared.

Lesson 2: Planning, Sharing, and Connecting to Shared Folders

Lesson Review

  1. What is a shared application folder? What is the main advantage of using shared applications?

    Shared application folders are used for applications that are installed on a network server and can be used from client computers. The main advantage of shared applications is that you don't need to install and maintain most components of the applications on each computer.

  2. In a Windows workgroup, the ____________________ group and the _______________________ group can share folders on the Windows 2000 stand-alone server or the computer running Windows XP Professional on which the group exists.

    Administrators group and Power Users group

  3. Windows XP Professional automatically shares folders for administrative purposes. These shares are marked with a __________________, which hides them from users who browse the computer.

    Dollar sign ($)

  4. The system root folder, which is C:\Windows by default, is shared as ____________. Administrators can access this shared folder to administer Windows XP Professional without knowing in which folder it is installed. Only members of the Administrators group have access to this share. Windows XP Professional assigns the Full Control permission to the Administrators group.

    Admin$

  5. To assign permissions to user accounts and groups for a shared folder, which of the following tabs do you use?
    1. The Permissions tab of the Properties dialog box of the shared folder
    2. The Sharing tab of the Properties dialog box of the shared folder
    3. The General tab of the Properties dialog box of the shared folder
    4. The Security tab of the Properties dialog box of the shared folder

    b

  6. Which of the following statements about size of the cache for making shared folders available offline is correct?
    1. By default, the cache size is set to 20 percent of the available disk space.
    2. By default, the cache size is set to 15 percent of the available disk space.
    3. By default, the cache size is set to 10 percent of the available disk space.
    4. By default, the cache size is set to 5 percent of the available disk space.

    c

Lesson 3: Combining Shared Folder Permissions and NTFS Permissions

Practice: Managing Shared Folders

Exercise 1: Combining Permissions

Figure 9.11 shows examples of shared folders on NTFS volumes. These shared folders contain subfolders that have also been assigned NTFS permissions. Determine a user's effective permissions for each example.

  1. In the first example, the Data folder is shared. The Sales group has the shared folder Read permission for the Data folder and the NTFS Full Control permission for the Sales subfolder.

    What are the Sales group's effective permissions for the Sales subfolder when they gain access to the Sales subfolder by making a connection to the Data shared folder?

    The Sales group has the Read permission for the Sales subfolder because when shared folder permissions are combined with NTFS permissions, the more restrictive permission applies.

  2. In the second example, the Users folder contains user home folders. Each user home folder contains data accessible only to the user for whom the folder is named. The Users folder has been shared, and the Users group has the shared folder Full Control permission for the Users folder. User1 and User2 have the NTFS Full Control permission for their home folder only and no NTFS permissions for other folders. These users are all members of the Users group.

    What permissions does User1 have when he or she accesses the User1 subfolder by making a connection to the Users shared folder? What are User1's permissions for the User2 subfolder?

    User1 has the Full Control permission for the User1 subfolder because both the shared folder permission and the NTFS permission allow Full Control. User1 can't access the User2 subfolder because she or he has no NTFS permission to gain access to it.

Exercise 2: Planning Shared Folders

In this exercise, you plan how to share resources on servers in the main office of a manufacturing company. Record your decisions in the table at the end of this exercise.

You have two choices for permissions: you can rely entirely on NTFS permissions and assign Full Control for all shared folders to the Everyone group, or you can use shared folder permissions according to resource needs. The following suggested shared folders include required permissions if you decide to assign shared folder permissions.

Share Management Guidelines as MgmtGd. Assign the Full Control permission to the Managers group.

Share Data as Data. Assign the Full Control permission to the Administrators built-in group.

Share Data\Customer Service as CustServ. Assign the Change permission to the Customer Service group.

Share Data\Public as Public. Assign the Change permission to the Users built-in group.

Share Applications as Apps. Assign the Read permission to the Users built-in group and the Full Control permission to the Administrators built-in group.

Share Project Management as ProjMan. Assign the Change permission to the Managers group and the Full Control permission to the Administrators built-in group.

Share Database\Customers as CustDB. Assign the Change permission to the CustomerDBFull group, the Read permission to the CustomerDBRead group, and the Full Control permission to the Administrators built-in group.

Share Users as Users. Create a folder for every employee below this folder. Assign the Full Control permission to each employee for his or her own folder. Preferably, have Windows XP Professional create the folder and assign permission automatically when you create each user account.

Exercise 4: Assigning Shared Folder Permissions

To assign permissions to a group

  1. In the Name text box, type administrators and then click OK.

    Windows XP Professional adds Administrators to the list of names with permissions.

    Which type of access does Windows XP Professional assign to the Administrators group by default?

    The Read permission

  2. In the Permissions For Administrators dialog box, under Allow, select the Full Control check box.

    Why did Windows Explorer also select the Change permission for you?

    Full Control includes both the Change permission and the Read permission.

Exercise 8 (Optional): Testing NTFS and Shared Folder Permissions

In this exercise, you use different user accounts to test how NTFS permissions and shared folder permissions combine. To answer the questions in this exercise, refer to the tables in Exercise 7.

To test permissions for the Manuals folder when a user logs on locally

  1. In the Manuals folder, attempt to create a test document.

    Were you successful? Why or why not?

    No, Windows XP Professional displays an Unable To Create Folder dialog box. Only Administrators have the NTFS permission to create and modify files in the Manuals folder.

To test permissions for the Manuals folder when a user makes a connectionover the network

  1. In the Manuals window, attempt to create a file.

    Were you successful? Why or why not?

    No. Although the Users group has the Full Control shared folder permission for \\PRO1\MktApps, only Administrators have the NTFS permission to create and modify files in the Manuals folder.

To test permissions for the Manuals folder when a user logs on over the network as Administrator

  1. In the Manuals window, attempt to create a file.

    Were you successful? Why or why not?

    Yes. The Administrators group has the Full Control NTFS permission and Full Control shared folder permission for \\PRO1\MktApps\Manuals.

To test permissions for the Public folder when a user makes a connection over the network

  1. In the Public window, attempt to create a file.

    Were you successful? Why or why not?

    Yes. User1 has the Full Control NTFS permission for the folder and Full Control shared folder permission for \\PRO1\MktApps\Public.

Lesson Review

  1. If you are using both shared folder and NTFS permissions, the ______________ (least/most) restrictive permission is always the overriding permission.

    Most

  2. Which of the following statements about combining shared folder permissions and NTFS permissions are true? (Choose all answers that are correct.)
    1. You can use shared folder permissions on all shared folders.
    2. The Change shared folder permission is more restrictive than the Read NTFS permission.
    3. You can use NTFS permissions on all shared folders.
    4. The Read NTFS permission is more restrictive than the Change shared folder permission.

    a and d

  3. Which of the following statements about shared folder permissions and NTFS permissions are true? (Choose all answers that are correct.)
    1. NTFS permissions apply only when the resource is accessed over the network.
    2. NTFS permissions apply whether the resource is accessed locally or over the network.
    3. Shared folder permissions apply only when the resource is accessed over the network.
    4. Shared folder permissions apply whether the resource is accessed locally or over the network.

    b and c

  4. If needed, you can apply different ______________________ permissions to each folder, file, and subfolder.

    NTFS

Chapter 10: Configuring Windows XP Professional

Lesson 1: Configuring and Troubleshooting the Display

Lesson Review

  1. You can enable ________________________________ to restrict access to Display options.

    Group Policy settings

  2. Which of the following items does the Desktop Items dialog box allow you to choose to include or exclude an icon on your desktop? (Choose all answers that are correct.)
    1. My Documents
    2. Control Panel
    3. My Network Places
    4. Recycle Bin

    a, c, and d

  3. Windows XP Professional supports extension of your display across a maximum of ______________ monitors.

    10

  4. You must use __________________________ or ______________________ video adapters when configuring multiple displays.

    PCI or AGP video adapters

  5. If one of the display adapters is built into the motherboard, the motherboard adapter always becomes the _____________ (primary/secondary) adapter.

    Secondary

Lesson 2: Configuring Power Management

Lesson Review

  1. What is a power scheme and why would you use one?

    Power schemes allow you to configure Windows XP Professional to turn off the power to your monitor and your hard disk to conserve energy.

  2. Which of the following statements about Windows XP Professional power schemes are true? (Choose all answers that are correct.)
    1. Windows XP Professional ships with six built-in power schemes.
    2. Windows XP Professional allows you to create you own power schemes.
    3. Windows XP Professional allows you to modify existing power schemes, but you cannot create new ones.
    4. Windows XP Professional does not ship with any built-in power schemes.

    a and b

  3. A _____________________________ is a device that connects between a computer and a power source to ensure that the electrical flow to the computer is not abruptly stopped because of a blackout.

    UPS

  4. What does hibernate mode do?

    When your computer hibernates, it saves the current system state to your hard disk, and then your computer shuts down. When you start the computer after it has been hibernating, it returns to its previous state, restarts any programs that were running, and restores any active network connections.

  5. ___________________ means that you can remove or exchange devices such as floppy drives, DVD/CD drives, and hard drives without shutting down your system or restarting your system. Windows XP Professional automatically detects and configures these devices.

    Hot swapping

Lesson 3: Configuring Operating System Settings

Lesson Review

  1. What performance options can you control with the tabs of the Performance Options dialog box?

    The Visual Effects tab of the Performance Options dialog box provides a number of options that allow you to manually control the visual effects on your computer. The Advanced tab of the Performance Options dialog box allows you to adjust the application response, which is the priority of foreground applications versus background applications, and virtual memory.

  2. Which of the following statements about the use of virtual memory in Windows XP Professional are correct? (Choose all answers that are correct.)
    1. When you install Windows XP Professional, Setup creates a virtual memory paging file, PAGEFILE.SYS, on the partition where you installed Windows XP Professional.
    2. In some environments, you might find it advantageous to use multiple paging files.
    3. If the entire paging file is not in use, it can decrease below the initial size that was set during installation.
    4. Unused space in the paging file remains unavailable to all programs, even the internal Windows XP Professional VMM.

    a and b

  3. When you first turn on the computer, the system displays a Please Select The Operating System To Start screen, which lists the available operating systems. What happens if a user does not select an operating system before the countdown timer reaches zero?

    If a user doesn't choose an operating system, the system starts the preselected operating system when the countdown timer reaches zero.

  4. What requirements must be met for the Write Debugging Information recovery option to work?

    A paging file must be on the system partition (the partition that contains the %systemroot% folder). You must have enough disk space to write the file to the location you specify. A small memory dump requires a paging file of at least 2 MB on the boot volume. A kernel memory dump requires 50 MB to 800 MB available in the paging file on the boot volume. A complete memory dump requires a paging file on the boot volume large enough to hold all the RAM on your computer plus 1 MB. With a small memory dump, a new dump file will be created every time the system stops unexpectedly. For a complete memory dump or kernel memory dump, if you want the new dump file to overwrite an existing file, select the Overwrite Any Existing File check box.

  5. What is the Windows XP Professional Remote Assistance feature?

    If you have a computer problem, the Remote Assistance feature allows you to invite a remote assistant to help you over the Internet. The remote assistant can chat with you about the problem and view your desktop. He or she can also transfer any files required to fix the problem. With your permission, the remote assistant can get full control of your computer to perform any complex steps needed to fix the problem.

  6. To join a domain, you use the ____________________ tab of the _____________________ dialog box.

    Computer Name; System Properties.

Lesson 4: Configuring and Troubleshooting the Desktop Environment

Lesson Review

  1. How can you configure Windows XP Professional to use multiple languages?

    To configure multiple languages, in Control Panel, click Date, Time, Language, And Regional Options. In the Date, Time, Language, And Regional Options window, click Regional And Language Options to open the Regional And Language Options dialog box. In the Languages tab of the Regional And Languages Options dialog box, click Details. Windows XP Professional displays the Text Services And Input Languages dialog box. Click Add. Click the down-pointing arrow at the end of the Input Language list box. Scroll through the list of languages and select the ones you want to add. If you added at least one language to the one already installed on your computer, your computer is now supporting multiple languages.

  2. Turning on ________________________ allows you to press a multiple key combination, like Ctrl+Alt+Delete, one key at a time. (Choose all answers that are correct.)
    1. FilterKeys
    2. StickyKeys
    3. ToggleKeys
    4. MultiKeys

    b

  3. Turning on ________________________ causes the keyboard to ignore brief or repeated keystrokes. This option also allows you to configure the keyboard repeat rate, which is the rate at which a key continuously held down repeats the keystroke.

    FilterKeys

  4. When using MouseKeys, to speed up the mouse pointer movement, hold down the ________ key while you press the numeric keypad directional keys. To slow down the mouse pointer movement, hold down the ________ key while you press the numeric keypad directional keys.

    Ctrl; Shift

  5. The ______________ tab in the Accessibility Options dialog box includes the Notification feature, which allows you to configure Windows XP Professional to give a warning message when a feature is activated and to make a sound when turning a feature on or off.

    General tab

Lesson 5: Managing Windows Components

Lesson Review

  1. How do you add Windows components to your Windows XP Professional installation?

    In Control Panel, click Add Or Remove Programs. In the Add or Remove Windows Programs window, click Add/Remove Windows Components to start the Windows Components Wizard. You use the Windows Components Wizard to select the Windows components that you want to add to or remove from your Windows XP Professional installation.

  2. What service does Internet Information Services (IIS) provide?

    Internet Information Services (IIS) allows you to publish information on the Internet or on your intranet. You place your files in directories on your server and IIS allows users establish HTTP connections and view the files with their Web browsers.

  3. How many simultaneous client connections can you have using Internet Information Services for Windows XP Professional?
    1. 8
    2. 10
    3. 20
    4. 32

    b

  4. How do you administer Internet Information Services (IIS) for Windows XP Professional?

    You use the Internet Information Services snap-in to manage IIS and the content of and access to your Web and FTP sites.

Chapter 11: Installing, Managing, and Troubleshooting Hardware Devices and Drivers

Lesson 1: Understanding Automatic and Manual Hardware Installation

Lesson Review

  1. When you initiate automatic hardware installation by starting the Add Hardware Wizard, what does Windows XP Professional query the hardware about?

    The resources the hardware requires and the settings for those resources.

  2. ______________ are channels that allow a hardware device, such as a floppy disk drive, to access memory directly, without interrupting the microprocessor.

    DMAs

  3. Why would you install a hardware device manually?

    If Windows XP Professional fails to automatically detect a hardware device.

Lesson 2: Configuring and Troubleshooting Hardware Devices

Lesson Review

  1. Windows XP Professional automatically identifies Plug and Play devices and arbitrates their resource requests; the resource allocation among these devices is ___________________________ (permanent/not permanent).

    Not permanent

  2. How can you free any resource settings that you manually assigned to a Plug and Play device?

    To free the resource settings you manually assigned and allow Windows XP Professional to again arbitrate the resources, in Device Manager select the Use Automatic Settings check box in the Resources tab of the Properties dialog box for the device.

  3. Which of the following devices are not shown by default in Device Manager? (Choose all that apply.)
    1. Devices sharing an IRQ
    2. Phantom devices
    3. Plug and Play devices
    4. Non-Plug and Play devices

    b and d

  4. You get a call on the help desk from a user upset because he cannot send faxes from Outlook Express. What should you tell the user?

    Tell the user that Outlook Express is not compliant with a MAPI client interface and cannot be used to send faxes. Tell him to use Outlook 2000 to send faxes.

  5. You get a call on the help desk from a user wondering why there is no Wireless Link icon in Control Panel on her desktop computer like the one on her laptop computer. What should you tell the user?

    Tell the user that the Wireless Link icon appears in Control Panel only if she has already installed an infrared device on her computer. There must not be any infrared devices installed on her desktop computer.

Lesson 3: Viewing and Configuring Hardware Profiles

Lesson Review

  1. What is the minimum number of hardware profiles you can have on your computer?

    Windows XP Professional creates an initial profile during installation, which is listed as Profile 1 (Current), so one is the minimum number of hardware profiles you can have on a computer.

  2. Computer hardware profiles are an especially important feature for what type of computers?
    1. Computers in a network environment
    2. Computers in a domain
    3. Stand-alone computers
    4. Portable computers

    d

  3. Windows XP Professional creates an initial profile during installation and assigns it the name of _______________________ in the list of hardware profiles available on the computer.

    Profile 1 (Current)

  4. Which of the following statements are true about hardware profiles in Windows XP Professional? (Choose all that apply.)
    1. Windows XP Professional only prompts the user to select a hardware profile during startup if there are two or more profiles in the Available Hardware Profiles list.
    2. It is a good idea to delete the default profile when you create a new profile to avoid confusion.
    3. You can configure Windows XP Professional to always start the default profile by selecting the Do Not Display The Select Hardware Profile check box.
    4. You can select the Wait Until I Select A Hardware Profile option to have Windows XP Professional wait for you to select a profile at startup.

    a and d

Lesson 4: Configuring, Monitoring, and Troubleshooting Driver Signing

Lesson Review

  1. Why does Microsoft digitally sign the files in Windows XP Professional?

    Windows XP Professional drivers and operating system files have been digitally signed by Microsoft to ensure their quality and to simplify troubleshooting of altered files. Some applications overwrite existing operating files as part of their installation process, which might cause system errors that are difficult to troubleshoot.

  2. Which of the following tools would you use to block the installation of unsigned files?
    1. File Signature Verification
    2. Driver Signing Options in the System Control Panel
    3. System File Checker
    4. Sigverif

    b

  3. How can you view the file signature verification log file?

    By default, the Windows File Signature Verification tool saves the file signature verification to a log file. To view the log file, click Start, click Run, type sigverif, and then press Enter. Click Advanced, click the Logging tab, and then click View Log.

Lesson 5: Configuring Computers with Multiple Processors

Lesson Review

  1. Adding processors to your system to improve performance is called ___________________________.

    Scaling

  2. How can you manually update a driver on your computer?

    You open Device Manager, right-click the appropriate device, and then click Properties. In the Driver tab, click Update Driver. The Welcome To The Hardware Update Wizard page appears and guides you through the rest of the update process.

Chapter 12: Auditing Resources and Events

Lesson 1: Planning an Audit Policy

Lesson Review

  1. What is auditing?

    Auditing is a process that tracks both user activities and Windows XP Professional activities on a computer and records these events in the security log.

  2. What is an audit policy?

    An audit policy defines the types of security events that Windows XP Professional records in the security log on each computer.

  3. On a computer running Windows XP Professional, auditing is turned ______ (on/off) by default.

    Off

  4. When you are auditing events on a computer running Windows XP Professional, where are the audited events being recorded?

    Windows XP Professional writes events to the security log on the computer on which the event occurs.

  5. When you are auditing events on a computer running Windows XP Professional, why would you track failed events?

    Tracking failed events can alert you to potential security breaches.

Lesson 2: Implementing an Audit Policy

Lesson Review

  1. What are the requirements to set up and administer auditing?

    You must have the Manage Auditing And Security Log user right for the computer for which you want to configure an audit policy or review an audit log. The files and folders you want to audit must be on an NTFS volume.

  2. What are the two steps in setting up auditing?

    Setting the audit policy and enabling auditing of specific resources

  3. How do you set audit policies for a local computer?

    In the console pane of an MMC console containing the Group Policy snap-in that is pointed at the Local Computer, click Local Computer Policy\Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy. Next, in the details pane, select the event to audit. On the Action menu, click Properties. In the Properties dialog box for the event, select the Success check box or the Failure check box, or both, depending on whether you want to set the audit policy to track successful attempts, failed attempts, or both.

  4. What are some reasons for auditing system events?

    Auditing system events allows you to determine if a user restarted or shut down the computer or if any event occurred that affects Windows XP Professional security or the security log. Auditing system events allows you to detect if the audit log is full and Windows XP Professional is discarding entries.

  5. By default, any auditing changes that you make to a parent folder ________________ (are inherited/are not inherited) by all child folders and all files in the parent and child folders.

    Are inherited

Lesson 3: Using Event Viewer

Practice: Auditing Resources and Events

Exercise 1: Planning an Audit Policy

In this exercise, you plan an audit policy for your computer. You need to determine the following:

  • Which types of events to audit
  • Whether to audit the success or failure of an event, or both

Record your decisions to audit successful events, failed events, or both for the actions listed in the following table:

Record unsuccessful attempts to gain access to the computer: Audit Failed Logon Events

Record unauthorized access to the files that make up the customer database: Audit Successful Object Access

For billing purposes, track color printer use: Audit Successful Object Access

Track whenever someone tries to tamper with the computer's hardware: Audit Failed System Events

Keep a record of actions that an administrator performs to track unauthorized changes: Audit Successful System Events

Track backup procedures to prevent data theft: Audit Successful Privilege Use

Track unauthorized access to sensitive Active Directory objects: Audit Successful and Failed Directory Service Access

Action to audit Successful Failed

Account Logon Events

Account Management

Directory Service Access

X

X

Logon Events

X

Object Access

X

Policy Change

Privilege Use

X

Process Tracking

System Events

X

X

Exercise 5: Testing the Auditing Policy Set Up on the AUDIT File

To test the auditing policy

  1. Save the file.

    Were you able to save the file? Why or why not?

    No, because User2 is a member of the Users group and only has permission to read the file.

Lesson Review

  1. What are the three Windows XP Professional logs you can view with Event Viewer and what is the purpose of each log?

    The application log contains errors, warnings, or information that programs, such as a database program or an e-mail program, generate. The program developer presets which events to record.

    The security log contains information about the success or failure of audited events. The events that Windows XP Professional records are a result of your audit policy.

    The system log contains errors, warnings, and information that Windows XP Professional generates. Windows XP Professional presets which events to record.

  2. How can you view the security log on a remote computer?

    You can view the security log on a remote computer by opening the MMC console and pointing Event Viewer to the remote computer. You must also have administrative privileges for the computer at which the events occurred.

  3. The two ways that Event Viewer provides for locating specific events are the _____________ command and the _____________ command. What do each of the commands allow you to do?

    Filter; Find

    The Filter command allows you to change what appears in the log.

    The Find command allows you to search for specific events.

  4. The size of each log can be from ____ KB to ____ GB, and the default size is ____ KB.

    64 KB, 4 GB, 512 KB

  5. If you select the Do Not Overwrite Events option, what happens when the log becomes full?

    If you select the Do Not Overwrite Events option, you must clear the log manually. When the log becomes full, Windows XP Professional stops. However, no security log entries are overwritten.

Chapter 13: Configuring Security Settings and Internet Options

Lesson 1: Configuring Account Policies

Practice: Configuring Account Policy

Exercise 2: Configuring and Testing Additional Account Policy Settings

To configure Account Policy settings

  1. Use the Local Group Policy custom MMC console you created to configure the following Account Policy settings:
    • A user should have at least five different passwords before using a previously used password.
    • After changing a password, a user must wait 24 hours before he or she can change it again.
    • A user should change his or her password every 3 weeks.

    What settings did you use for each of the three listed items?

    Set Enforce Password History to 5 so that users must have at least five different passwords before they use a previously used password.

    Set Minimum Password Age to 1 day so that a user must wait 24 hours before he or she can change it again.

    Set Maximum Password Age to 21 days so that a user must change his or her password every three weeks.

To test Account Policy settings

  1. Click Change Password.

    Were you successful? Why or why not?

    No, because you must wait 24 hours (one day) before you can change your password a second time. A Change Password dialog box appears, indicating that you cannot change the password at this time.

Exercise 3: Configuring Account Lockout Policy

To configure Account Lockout Policy settings

  1. Use Account Lockout Policy settings to do the following:
    • Lock out a user account after four failed logon attempts.
    • Lock out user accounts until an administrator unlocks the user account.

    What Account Lockout Policy settings did you use for each of the two conditions?

    Set the account lockout threshold to 4 to lock out a user account after four failed logon attempts. When you set one of the three Account Lockout options and the other two options have not been set, a dialog box appears indicating that the other two options will be set to default values.

    Set the account lockout duration to 0 to have locked accounts remain locked until an administrator unlocks them.

Lesson Review

  1. What tool does Microsoft Windows XP Professional provide for you to configure Password Policy?

    The Microsoft Windows XP Professional Group Policy snap-in.

  2. What is the range of values Windows XP Professional allows you to set for the Enforce Password History setting and what do those values mean?

    You can set the value from 0 to 24. A value of 0 indicates that no password history is being kept. All values indicate the number of new passwords that a user must use before he or she can reuse an old password.

  3. The range of values Windows XP Professional allows you to set for the Maximum Password Age setting is ______ to ______ days. The default value is ______ days.

    0 to 999 days; 42 days

  4. Which of the following selections are requirements for a password if the Passwords Must Meet Complexity Requirements setting is enabled? (Choose all that apply.)
    1. All passwords must exceed the specified minimum password length.
    2. All passwords must comply with the password history settings.
    3. No passwords can contain capitals or punctuation.
    4. No passwords can contain the user's account or full name.

    b and d

  5. What is Account Lockout Duration and what is the range of values?

    This value indicates the number of minutes that the system will prevent the user account from logging on to Windows XP Professional. You can set the value from 0 to 99,999 minutes.

Lesson 2: Configuring User Rights

Lesson Review

  1. Which of the following statements about user rights are correct? (Choose all that apply.)
    1. Microsoft recommends that you assign user rights to individual user accounts.
    2. Microsoft recommends that you assign user rights to groups rather than individual user accounts.
    3. User rights allow users assigned the right to perform a specific action, such as backing up files and directories.
    4. There are two types of user rights: privileges and logon rights.

    b, c, and d

  2. If your computer running Windows XP Professional is part of a Windows 2000 domain environment and you configure the Local Security Policies on your computer so that you assign yourself the Add Workstation To A Domain user right, can you add additional workstations to the domain? Why or why not?

    For the Add Workstation To A Domain privilege to be effective, it must be assigned as part of the default domain controller policy for the domain, not the Local Security Policy on your computer running Windows XP Professional.

  3. What benefit does the Back Up Files And Directories user right provide?

    The Back Up Files And Directories user right improves the security on your system. It allows a user to back up the system without being assigned file and folder permissions to access all files and folders on the system. In other words, the person backing up the files can back up secure files without being able to read them.

  4. What are logon rights and what do they do?

    A logon right is a user right assigned to a group or individual user account. Logon rights control the way users can log on to a system.

Lesson 3: Configuring Security Options

Lesson Review

  1. How can you require a user to be logged on to the computer to shut it down? (Discuss using the Welcome screen and using Ctrl+Alt+Delete to log on.)

    If Windows XP Professional is configured to use the Welcome screen or Ctrl+Alt+Delete to log on, by default you do not have to log on to shut down the computer. In the Group Policy snap-in's console tree, click Local Computer Policy, Computer Configuration, Windows Settings, Security Settings, Local Policies, and Security Options. In the details pane, right-click Shutdown: Allow System To Be Shut Down Without Having To Log On, and then click Properties and click Disabled.

  2. By default Windows XP Professional does not clear the virtual memory pagefile when the system is shut down. Why can this be considered a security breach and what can you do to resolve it?

    The data in the pagefile might be accessible to users who are not authorized to view that information. To clear the pagefile each time the system is shut down, start the Group Policy snap-in, expand Local Policies, and select Security Options. Right-click Shutdown: Clear Virtual Memory Pagefile and then click Properties. Select Enabled.

  3. Why does forcing users to press Ctrl+Alt+Delete improve security on your computer?

    Requiring users to press Ctrl+Alt+Delete to log on to the computer increases security on your computer because you are forcing users to use a key combination recognized only by Windows. Using this key combination ensures that users are giving the password only to Windows and not to a program waiting to capture user passwords.

  4. By default, Windows XP Professional displays the last user name to log on to the computer in the Windows Security dialog box. Why is this considered a security risk and what can you do to resolve it?

    In some situations this is considered a security risk because an unauthorized user can see a valid user account displayed on the screen. This makes it much easier to break into the computer. To resolve this security problem, in the Group Policy snap-in, click the Local Policies node in the console pane, and then click Security Options. In the details pane, right-click Interactive Logon: Do Not Display Last User Name, click Properties, and select Enabled.

  5. How can you disable the Welcome screen in Windows XP Professional?

    In the User Accounts tool, click Change The Way Users Log On Or Off and then clear the Use The Welcome Screen check box.

Lesson 4: Configuring Internet Explorer Security Options

Lesson Review

  1. What is a cookie? How can you delete all the cookies that are stored on your computer?

    A cookie is a file created by a Web site; the cookie stores information about you on your computer. In the Temporary Internet Files section in the General tab, click Delete Cookies to delete all cookies now.

  2. How can you control which cookies are stored on your computer?

    The Privacy tab of the Internet Properties dialog box allows you to determine how cookies will be handled on your computer.

  3. As a concerned parent, how can you help protect your children from adult material found on the Internet?

    The Content tab gives you access to the Content Advisor, which allows you to control what can be viewed on the Internet. You can control access to Web sites based on language, nudity, sex, and violence. You can also create a list of Web sites that are never viewable, no matter how they are rated.

  4. How can you speed up the downloading of pages?

    In the Multimedia section of the Advanced tab in the Internet Properties dialog box, you can clear the Play Animations In Web Pages, Play Sounds In Web Pages, and Show Pictures check boxes to speed up the downloading of pages containing animations, sounds, and graphical images.

  5. How can you have the Internet Temporary Files folder emptied each time you close your browser?

    In the Security section of the Advanced tab in the Internet Properties dialog box, you can select the Empty Internet Temporary Files Folder When Browser Is Closed check box. Selecting this check box specifies that you want to empty the Internet Temporary Files folder when the browser is closed. This option is not selected by default.

Chapter 14: Managing Data Storage

Lesson 1: Managing Compression

Practice: Managing Compression

Exercise 1: Compressing Files in an NTFS Partition

To view the capacity and free space for drive C

  1. Right-click drive C, and then click Properties.

    Windows XP Professional displays the Local Disk (C:) Properties dialog box with the General tab active.

    What is the capacity of drive C?

    Answers will vary.

    What is the free space on drive C?

    Answers will vary.

To uncompress a folder

  1. Click OK to close the Compressed2 Properties dialog box.

    Because the Compressed2 folder is empty, Windows XP Professional does not display the Confirm Attributes Changes dialog box asking you to specify whether to uncompress only this folder or this folder and all subfolders.

    What indication do you have that the Compressed2 folder is no longer compressed?

    The folder name is now displayed in the original color (typically black).

Exercise 2: Copying and Moving Files

To create a compressed file

  1. Type Text1 and then press Enter.

    How can you verify that Text1 is compressed?

    The folder name is displayed in the alternate color (typically blue).

To copy a compressed file to an uncompressed folder

  1. Examine the properties for Text1 in the Compressed2 folder.

    Is the Text1 file in the Compressed\Compressed2 folder compressed or uncompressed? Why?

    Uncompressed. A new file inherits the compression attribute of the folder in which it is created.

To move a compressed file to an uncompressed folder

  1. Examine the properties of the Text1 file in the Compressed folder.

    Is Text1 compressed or uncompressed?

    Compressed.

  2. Examine the properties of Text1 in the Compressed2 folder.

    Is Text1 compressed or uncompressed? Why?

    Uncompressed. When a file is moved to a new folder on the same partition its compression attribute doesn't change.

Lesson Review

  1. When Bob tried to copy a compressed file from one NTFS volume to another, the file was not copied and he got an error message stating that there was not enough disk space for the file. Before he attempted to copy the file, Bob verified that there was enough room for the compressed bitmap on the destination volume. Why did he get the error message?

    If you copy a compressed file to an NTFS volume with enough space for the compressed file, but not enough space for the uncompressed file, you might get an error message stating that there is not enough disk space for the file. The file will not be copied to the volume.

  2. Which of the following will Windows XP Professional allow you to compress using NTFS compression? (Choose all answers that are correct.)
    1. A FAT volume
    2. An NTFS volume
    3. A bitmap stored on a floppy
    4. A folder on an NTFS volume

    b and d

  3. When you move a file between NTFS volumes, does the file retain the compression state of the source folder or does the file inherit the compression state of the target folder? Why?

    When you move a file or folder between NTFS volumes, the file or folder inherits the compression state of the target folder. Windows XP Professional treats a move as a copy and then a delete, so the files inherit the compression state of the target folder.

  4. What does Windows XP Professional do when you try to copy a compressed file to a floppy disk? Why?

    When you copy a compressed file to a floppy disk, Windows XP Professional automatically uncompresses the file because floppy disks cannot be formatted with NTFS and cannot use NTFS compression.

  5. Which of the following types of files or data are good candidates for NTFS compression? (Choose all statements that are correct.)
    1. Encrypted data
    2. Frequently updated data
    3. Bitmaps
    4. Static data

    c and d

Lesson 2: Managing Disk Quotas

Practice: Enabling and Disabling Disk Quotas

Exercise 1: Configuring Quota Management Settings

To configure default quota management settings

  1. Click Limit Disk Usage To.

    What is the default disk space limit for new users?

    1 KB

To configure quota management settings for a user

  1. In the Quota tab of the Local Disk (C:) Properties dialog box, click Quota Entries.

    Windows XP Professional displays the Quota Entries For Local Disk (C:) dialog box.

    Are any user accounts listed? Why or why not?

    Yes. The accounts listed are those that have logged on and gained access to drive C.

  2. In the Name text box, type User5, and then click OK.

    Windows XP Professional displays the Add New Quota Entry dialog box.

    What are the default settings for the user you just set a quota limit for?

    Limit Disk Space To 1 KB and Set The Warning Level To 1 KB are the default settings that are set for drive C.

To test quota management settings

  1. Copy the i386 folder from your CD-ROM to the User5 folder.

    Windows XP Professional begins copying files from the i386 folder on the CD-ROM to a new i386 folder in the User5 folder on drive C. After copying some files, Windows XP Professional displays the Error Copying File Or Folder dialog box indicating that there is not enough room on the disk.

    Why did you get this error message?

    You have exceeded your quota limit and because the Deny Disk Space To Users Exceeding Quota Limit check box is selected, once you exceed your quota limit, you can't use more disk space.

Lesson Review

  1. What is the purpose of disk quotas?

    Disk quotas allow you to allocate disk space to users and monitor the amount of hard disk space that users have used and the amount that they have left against their quota.

  2. Which of the following statements about disk quotas in Windows XP Professional is correct?
    1. Disk quotas track and control disk usage on a per-user, per-disk basis.
    2. Disk quotas track and control disk usage on a per-group, per-volume basis.
    3. Disk quotas track and control disk usage on a per-user, per-volume basis.
    4. Disk quotas track and control disk usage on a per-group, per-disk basis.

    c

  3. Which of the following statements about disk quotas in Windows XP Professional is correct? (Choose all answers that are correct.)
    1. Disk quotas can only be applied to Windows XP Professional NTFS volumes.
    2. Disk quotas can be applied to any Windows XP Professional volume.
    3. You must be logged on with the Administrator user account to configure default quota management settings.
    4. Members of the Administrators and Power Users groups can configure default quota management settings.

    a and c

  4. You get a call from an administrator who cannot delete a quota entry for a user account. What would you tell the administrator to check?

    Tell the administrator to verify that all files owned by the user are removed or that another user has taken ownership of the files. You cannot delete a quota entry for a user account if there are files owned by that user on the volume.

Lesson 3: Increasing Security with EFS

Practice: Encrypting Files

Exercise 2: Testing the Encrypted Files

To test an encrypted file

  1. Start Windows Explorer and open C:\Secret\File1.

    What happens?

    A Notepad dialog box appears indicating that access is denied.

Lesson Review

  1. What is encryption and what is the Microsoft EFS?

    Encryption makes information indecipherable to protect it from unauthorized viewing or use. Microsoft EFS provides encryption for data in NTFS files stored on disk. This encryption is public key-based and runs as an integrated system service, making it easy to manage, difficult to attack, and transparent to the file owner.

  2. Which of the following files and folders will Windows XP Professional allow you to encrypt? (Choose all answers that are correct.)
    1. A file on an NTFS volume
    2. A folder on a FAT volume
    3. A file stored on a floppy
    4. A folder on an NTFS volume

    a and d

  3. How do you encrypt a folder? Is the folder actually encrypted?

    To encrypt a folder, in the Properties dialog box for the folder, click the General tab. In the General tab, click Advanced, and then select the Encrypt Contents To Secure Data check box. All files placed in the folder are encrypted and the folder is now marked for encryption. Folders that are marked for encryption are not actually encrypted; only the files within the folder are encrypted.

  4. If the private key belonging to the owner of an encrypted file is not available, how can you decrypt the file?

    If the owner's private key is unavailable, a recovery agent can open the file using his or her own private key.

  5. By default, the recovery agent for a computer running Windows XP Professional in a workgroup is ________ and the recovery agent for a computer running Windows XP Professional in a domain environment is _____________.

    The administrator of the local computer; the domain administrator

Lesson 4: Using Disk Defragmenter, Check Disk, and Disk Cleanup

Practice: Managing NTFS Compression

Exercise 3: Running Disk Cleanup

To use Disk Cleanup on a hard drive

  1. Click the More Options tab.

    When would you use the options available in the More Options tab?

    When running Disk Cleanup did not free up enough space on your hard drive and you need to find some additional space. The More Options tab allows you to delete Windows components, installed programs, and saved system restore points to free up additional space.

Lesson Review

  1. What is fragmentation and what problems does it cause?

    Fragmentation is the scattering of the parts of a file over the disk rather than having all parts of the file located in contiguous space. Over time a hard disk will contain fragmented files and folders that cause Windows XP Professional to take longer to access the files. Creating new files and folders also takes longer because the available free space on the hard disk is scattered.

  2. The process of finding and consolidating fragmented files and folders is called _________________. The Windows XP Professional system tool that locates fragmented files and folders and arranges them in contiguous space is _________________________.

    Defragmenting or defragmentation; Disk Defragmenter

  3. Windows XP Professional provides a tool to locate fragmented files and folders and arrange them in contiguous space on volumes formatted with which file systems?

    NTFS, FAT, and FAT32

  4. Which of the following functions does Check Disk perform? (Choose all answers that are correct.)
    1. Locate fragmented files and folders and arrange contiguously
    2. Locate and attempt to repair file system errors
    3. Locate bad sectors and recover readable information from those bad sectors
    4. Delete temporary files and offline files

    b and c

  5. Why do you need to empty the Recycle Bin?

    When you delete a file from a computer, it is not permanently removed from the computer until you empty the Recycle Bin (by deleting the files contained in the Recycle Bin).

Chapter 15: Monitoring, Managing, and Maintaining Network Resources

Lesson 1: Monitoring Access to Shared Folders

Lesson Review

  1. Why is it important to manage network resources?

    You need to know which users access a network resource so that you can notify them if a resource becomes temporarily or permanently unavailable. You monitor confidential resources to verify that only authorized users are accessing them. You determine how much all resources are being used to help you plan for future system growth.

  2. On a computer running Windows XP Professional, members of the ___________________________ and _________________________ groups can use the Shared Folders snap-in to monitor network resources.

    Administrators and Power Users

  3. How can you determine what files are open on a computer running Windows XP Professional?

    Use the Open Files folder in the Shared Folders snap-in to view a list of open files and the users who have a current connection to each file.

  4. Which of the following statements about monitoring network resources are correct? (Choose all answers that are correct.)
    1. You can use the Shared Folders snap-in to disconnect all users from all open files.
    2. You can use the Shared Folders snap-in to disconnect one user from one file.
    3. If you change the NTFS permissions for an open file, the changes affect all users who have the file open immediately.
    4. If you make changes to the NTFS permissions for an open file, the changes do not affect the user who has that file opened until he or she closes and reopens the file.

    a and d

Lesson 2: Creating and Sharing Local and Remote Folders

Lesson Review

  1. Which of the following tools can you use to create a shared folder on a remote computer? (Choose all answers that are correct.)
    1. Windows Explorer
    2. Computer Management snap-in
    3. Domain Management snap-in
    4. Shared Folders snap-in

    b and d

  2. How can you create and share a folder on a remote computer?

    You can create and share a folder on a remote computer by creating a custom MMC console, adding either the Computer Management snap-in or the Shared Folders snap-in, and pointing it to the remote computer that you want to manage shares on.

  3. Can you create a custom tool that will allow you to administer more than one specific remote computer? How?

    Yes. When you add the Computer Management snap-in or Shared Folders snap-in to a custom MMC console, select the Allow The Selected Computer To Be Changed When Launching From The Command Line check box. You can then specify the remote computer that you want to administer when you launch the command.

Lesson 3: Monitoring Network Users

Lesson Review

  1. How can you determine which users have a connection to open files on a computer and the files to which they have a connection?

    The Sessions folder in the Computer Management snap-in or Shared Folders snap-in shows you a list of all users with a connection to an open file and the files to which they have a connection.

  2. How can you disconnect a specific user from a file?

    In the Computer Management console or Shared Folders console, click Sessions. Select the user that you want to disconnect in the details pane. On the Action menu, click Close Session.

  3. Why would you send an administrative message to users with current connections?

    To inform the users that you are about to disconnect them from the resource they are connected to so that you can perform a backup or restore operation, upgrade software or hardware, or shut down the computer.

  4. What can you do to prevent a user from reestablishing a network connection after you have disconnected that user from a shared folder?

    To prevent all users from reconnecting, stop sharing the folder. To prevent only one user from reestablishing a connection, change the permissions for the folder so that the user no longer has access, and then disconnect the user from the shared folder.

Lesson 4: Using Offline Folders and Files

Lesson Review

  1. How do you configure your computer to use offline folders and files?

    To configure your computer to use offline folders and files, on the Tools menu of My Computer, click Folder Options. In the Offline Files tab of Folder Options, you enable the Enable Offline Files and the Synchronize All Offline Files Before Logging Off check boxes.

  2. What tools does Windows XP Professional provide for you to configure your computer to provide offline files? What must you do to allow others to access files on your computer?

    Windows Explorer and My Computer. You must share the folder containing the file.

  3. What does Synchronization Manager do?

    Synchronization Manager allows you to manually synchronize or schedule the synchronization of the files on your computer with the ones on the network resource.

Lesson 5: Using Scheduled Tasks

Lesson Review

  1. How can Scheduled Tasks help you monitor, manage, and maintain network resources?

    Scheduled Tasks can be used to automatically launch any script, program, or document to start at a specified time and interval or when certain operating system events occur. You can use Scheduled Tasks to complete many administrative tasks for you, run maintenance programs at specific intervals on the local or remote computers, and run programs when there is less demand for computer resources.

  2. Which of the following are valid choices for the frequency with which Scheduled Tasks schedules programs to run? (Choose all answers that are correct.)
    1. Daily
    2. One time only
    3. When the computer shuts down
    4. When a user logs off

    a and b

  3. Why do you have to assign a user account and password for each task that you schedule using the Scheduled Task Wizard?

    You enter a user name and password to have the task run under the security settings for that user account. For example, you can run a scheduled backup by using a user account that has the required rights to back up data but does not have other administrative privileges. The default is to use the user name of the person scheduling the task.

  4. If none of your scheduled tasks are starting, what is one thing that you need to check?

    If none of your scheduled tasks are starting, open the Task Scheduler, and click Advanced to make sure that the Task Scheduler Service is running. If it is not running, you can use the Advanced menu to start it.

Lesson 6: Using Task Manager

Practice: Using Task Manager

To monitor programs, processes, and system performance

  1. Press CTRL+SHIFT+ESC to launch Task Manager.

    What programs are currently running on your system?

    Answers will vary, but there might not be any programs running.

  2. Click the Processes tab.

    How many processes are running?

    Answers will vary.

  3. Click the Performance tab.

    What percentage of your CPU's capacity is being used?

    Answers will vary, but should be low.

    Do you think that your CPU could be slowing down the performance on your system?

    Answers could vary, but if the CPU is barely being utilized then the CPU would not be slowing down the performance of the computer.

Lesson Review

  1. Which of the following methods can you use to start Task Manager? (Choose all answers that are correct.)
    1. Press Ctrl+Alt+Esc
    2. Right-click the Desktop and click Task Manager
    3. Press Ctrl+Shift+Esc
    4. Press Ctrl+Alt+Delete and, if necessary, click Task Manager

    c and d

  2. Which of the following tabs can be found in Task Manager? (Choose all answers that are correct.)
    1. Networking tab
    2. Programs tab
    3. Processes tab
    4. General tab

    a and c

  3. What are page faults? Do you think a larger or smaller number of page faults indicate better system performance? Why?

    Each time data has to be retrieved from the pagefile on the hard disk for a process, the data has been paged out of physical memory. This is known as a page fault. A smaller number of page faults indicates better system performance because it is faster to retrieve data from RAM than from a paging file on the hard drive.

  4. What does CPU usage represent? In general, is system performance better with a high CPU usage value or a low value?

    CPU usage is the percentage of time that the processor is running a thread other than the idle thread. You don't want the CPU to be a bottleneck to the system. If the CPU usage is too high, it could indicate that the CPU is slowing down system performance.

Lesson 7: Using Performance Console

Practice: Using System Monitor

To monitor system resources

  1. Click Administrative Tools, and then double-click the Performance shortcut.

    Windows XP Professional starts the Performance console with the System Monitor selected.

    What objects and counters are selected by default?

    Memory with the Pages/Sec counter

    PhysicalDisk with the Average Disk Queue Length counter

    Processor with the Processor Time counter

  2. Under the graph, right-click Counter and then click Add Counters.

    Windows XP Professional displays the Add Counters dialog box.

    What performance object is selected by default?

    Processor

Lesson Review

  1. Which of the following monitoring tools are included in the Performance console? (Choose all answers that are correct.)
    1. System Monitor snap-in
    2. Task Manager snap-in
    3. Performance Logs and Alerts snap-in
    4. Task Scheduler

    a and c

  2. Why should you monitor resources and overall system performance?

    Monitoring resources and overall system performance helps you determine how well your system is currently performing, detect and eliminate bottlenecks, recognize trends so that you can plan for future growth and upgrades, and evaluate the effects of tuning and configuration changes on your system.

  3. What is a baseline and what is a bottleneck?

    A baseline is a measurement derived from collecting data over an extended period of time that represents resource usage under normal conditions. A bottleneck is any component that slows down the performance of the entire system.

  4. Why do you need to determine a baseline when you monitor system resources and system performance?

    When you monitor system performance, you compare the current performance of the system to the baseline. If the current system performance is worse than the baseline, then you need to check for bottlenecks. After you have resolved the problem, you again monitor system performance so that you can verify that the action you took actually resolved the bottleneck and improved system performance.

Chapter 16: Backing Up and Restoring Data

Lesson 1: Using the Backup Utility

Lesson Review

  1. How do you access the Backup or Restore Wizard?

    To access the Backup or Restore Wizard, on the Start menu, point to All Programs, point to Accessories, point to System Tools, and then click Backup; or, on the Start menu, click Run, type ntbackup, and then click OK.

  2. What two operations can you perform using the Backup or Restore Wizard?

    You use the Backup or Restore Wizard to back up all or a portion of the files on your computer or network (using the Back Up Files And Settings option) and to restore data that you have backed up (using the Restore Files And Settings option).

  3. What is the primary goal of backing up data?

    The primary goal of backing up data is to be able to restore that data if necessary.

  4. If you want to perform a backup but do not want to clear markers or affect other backup types, you should perform a ____________ backup.

    Copy

  5. During a ____________ backup, only selected files and folders that have a marker are backed up, but the backup does not clear markers. If you performed two of these backups in a row on a file and nothing changed in the file, the entire file would be backed up each time.

    Differential

  6. How can you change the default settings for backup and restores for all backup and restore operations using the Backup Utility?

    You can change the default settings for the Backup Utility for all backup and restore jobs by changing the settings in the tabs in the Options dialog box. To access the Options dialog box, in the Welcome To The Backup Or Restore Wizard page, click Advanced Mode. On the Tools menu, click Options.

  7. You performed a normal backup on Monday. For the remaining days of the week, you only want to back up files and folders that have changed since the previous day. What backup type do you select? Why?

    Incremental. The incremental backup type backs up changes since the last markers were set and then clears the markers. Thus, for Tuesday through Friday, you back up only changes since the previous day.

Lesson 2: Backing Up Data

Lesson Review

  1. What are the four choices in the What To Back Up page of the Backup or Restore Wizard and what does each choice allow you to do?

    The first choice is My Documents And Settings. Selecting this option backs up certain areas that pertain to the currently logged on user. All of the files located in the My Documents folder, your Favorites folder, desktop items, and cookies are backed up in this option.

    The second choice is Everyone's Documents And Settings. Selecting this option backs up each user's My Documents folder, Favorites folder, desktop items, and cookies.

    The third choice is All Information On This Computer. Selecting this option backs up all files on the computer, except those files that the Backup Utility excludes by default, such as certain power management files.

    The fourth choice is Let Me Choose What To Back Up. Selecting this option allows you to select the files and folders you want to back up, including files and folders on the computer where you run the Backup Utility and any shared file or folder on the network.

  2. When should you select the Allow Only The Owner And The Administrator Access To The Backup Data And Any Backups Appended To This Media check box?

    You should select this check box when you want to minimize the risk of unauthorized access to your data.

  3. If your boss wants daily backups to occur at 1:00 A.M., what could you do to save yourself the trouble of having to go to the office each morning at 1:00 A.M. to do the backups?

    You can use the Backup or Restore Wizard to schedule the backup to occur automatically by clicking Later on the When To Back Up page of the Backup or Restore Wizard and specifying that the backup should occur daily at 1:00 A.M.

  4. If you don't have a tape drive, can you still perform backups? How?

    Yes. You can use a tape or file as the target medium for the backup and a file can be located on any disk-based media, including a hard disk, a shared network folder, or a removable disk, such as an Iomega Zip drive.

  5. Why should you e-mail or send a console message to users before you begin a backup?

    You should notify users to close files before you begin backing up data because the backup will not contain the correct data if users are still editing files while you perform the backup. Rather than skip the files that are being written to, the Backup Utility will back up these files unless you select the Disable Volume Shadow Copy check box. It is best to have all users log off before doing a backup.

Lesson 3: Restoring Data

Lesson Review

  1. What is a trial restore and why is it important that you perform it?

    A trial restore involves restoring a backup to an alternate location and comparing the restored data to the data on the original hard disk. You should perform trial restores to verify that the Backup Utility is backing up your files correctly and that there are no hardware problems that do not show up with software verifications.

  2. A _____________ is an index of the files and folders from a backup job that Windows XP Professional automatically creates and stores with the backup job and on the computer running the Backup Utility.

    Catalog

  3. What is a backup set?

    A backup set is a collection of files or folders from one volume that you back up during a backup job.

  4. If you back up two volumes on a hard disk during a backup job, how many backup sets are created for the job?

    Two

  5. What are the three Advanced restore settings that allow you to specify how to restore files that already exist?

    Leave Existing Files (Recommended), Replace Existing Files If They Are Older Than The Backup Files, and Replace Existing Files

  6. When do you use the Advanced restore setting Restore Security and when is it available?

    The Restore Security setting applies the original permissions including access permissions, audit entries, and ownership, to files that you are restoring to an NTFS volume. The Restore Security option is only available if you have backed up data from an NTFS volume and are restoring to an NTFS volume.

Lesson 4: Using the Automated System Recovery Wizard

Lesson Review

  1. What four wizards does the Backup Utility provide access to?

    The Backup Utility provides access to the Backup And Restore Wizard, the Backup Wizard (Advanced), the Restore Wizard (Advanced), and the Automated System Recovery Wizard.

  2. What two things does the Automated System Recovery Wizard create during a backup?

    The Automated System Recovery Wizard creates a floppy disk containing your system settings and a backup of your local system partition.

  3. What two pieces of information do you have to supply to the Automated System Recovery Wizard?

    The appropriate media type and the backup media or filename

Chapter 17: Configuring Network and Internet Connections

Lesson 1: Configuring Inbound Connections

Lesson Review

  1. The Network Connection Type page of the New Connection Wizard has four selections. What are the four selections and which selection do you use to allow inbound dial-up connections?

    The four selections in the Network Connection Type page are Connect To The Internet, Connect To The Network At My Workplace, Set Up A Home Or Small Office Network, and Set Up An Advanced Connection.

    You use the Set Up An Advanced Connection option to configure an inbound connection.

  2. Other than allowing VPN connections, what does Windows XP Professional do when you configure a new connection to allow virtual private connections?

    If you choose to allow VPN connections, Windows XP Professional modifies the ICF so that your computer can send and receive VPN packets.

  3. What is callback and why would you enable it?

    Callback forces the remote server, in this case your computer, to disconnect from the client calling in, and then call the client computer back.

    You would use callback to have the bill for a phone call charged to your phone number rather than to the phone number of the user who called in. You could also use callback to increase security because you can specify the number that the system calls back. If an unauthorized user calls in, this prevents the unauthorized user from accessing the system.

Lesson 2: Configuring Outbound Connections

Lesson Review

  1. What are the three outbound connection selections that you can configure using the New Connection Wizard and what does each allow you to do?

    The first choice is Connect To The Internet. Selecting this option allows you to choose an ISP to establish a connection to the Internet, manually configure a connection to the Internet, or use a CD-ROM provided by an ISP to establish a connection to the Internet.

    The second choice is Connect To The Network At My Workplace. Selecting this option allows you to establish a connection to a private network either by using a dial-up modem and regular or ISDN phone line or by using a VPN connection.

    The third choice is Set Up An Advanced Connection. Selecting this option allows you to establish a connection directly to another computer using a serial, parallel, or infrared port or to set up this computer so that other computers can connect to it.

  2. How can you configure a direct connection to another computer?

    Use the New Connection Wizard. Click Start, click My Computer, click My Network Places, click View Network Connections, and then click Create A New Connection. In the Welcome To The New Connection Wizard page, click Next and, in the Network Connection Type page, click Set Up An Advanced Connection. In the Advanced Connections Options page, click Connect Directly To Another Computer.

  3. Using the New Connection Wizard to create an outgoing connection to the network at your office, how can you have a shortcut appear on your desktop for easy access to the connection?

    In the Completing The New Connection Wizard page, select the Add A Shortcut To The Connection To My Desktop check box.

Lesson 3: Enabling and Configuring Home and Small Business Components

Lesson Review

  1. What is ICF?

    Internet Connection Firewall (ICF) is firewall software that is used to set restrictions on what information is communicated from your home or small business network to and from the Internet.

  2. What happens if you configure ICF and enable any one of the ICMP options?

    If you enable any of the ICMP options, your network can become visible to the Internet and vulnerable to attack.

  3. By default the ICF Security Log file is named ____________________ and has a size limit of _____________.

    PFIREWALL.LOG; 4096 KB

  4. Which of the following statements about ICF are correct? (Choose all answers that are correct.)
    1. ICF is available in the Windows XP Professional 64-bit edition.
    2. ICF should not be enabled on VPN connections.
    3. ICF should be enabled on your shared Internet connection.
    4. ICF must be purchased as an add-on package and is not included in Windows XP Professional.

    b and c

  5. When do you use ICS?

    You use Internet Connection Sharing (ICS) so that only one of the computers on your network needs to be connected to the Internet. ICS allows the other computers on your network to connect to the Internet through this connection.

  6. How do you enable on-demand dialing for a shared ICS connection?

    Enable ICS by selecting the Establish A Dial-Up Connection Whenever A Computer On My Network Attempts To Access The Internet check box in the Advanced tab. This check box enables on-demand dialing for the shared connection.

  7. What is Network Bridge and what algorithm does it use?

    Network Bridge allows you to connect LAN segments, even if they are using different types of network media, without having to use routers to connect them. It uses the IEEE Spanning Tree Algorithm (STA) to ensure that there are no bridge loops.

  8. Which of the following types of adapters can you use in a Network Bridge? (Choose all answers that are correct.)
    1. Ethernet adapters
    2. IEEE-1394 adapters
    3. Token Ring adapters
    4. Adapters that have ICF or ICS enabled

    a and b

Chapter 18: Modifying and Troubleshooting the Boot Process

Lesson 1: Understanding the Boot Process

Lesson Review

  1. Windows XP Professional modifies the boot sector during installation so that __________ loads during system startup.

    NTLDR

  2. What is the purpose of the BOOT.INI file and what happens if it is not present?

    NTLDR reads BOOT.INI to determine the operating system selections to be loaded. If BOOT.INI is missing, NTLDR attempts to load Windows XP Professional from the Windows folder on the first partition of the first disk, typically C:\Windows.

  3. What does the BOOTSECT.DOS file contain and when it is used?

    BOOTSECT.DOS is a copy of the boot sector that was on the system partition at the time that Windows XP Professional was installed. BOOTSECT.DOS is used if you are booting more than one operating system and you choose to load an operating system other than Windows XP Professional.

  4. A user calls you and tells you that Windows XP Professional does not appear to be loading correctly. The Hardware Profile/Configuration Recovery menu does not appear when the computer is restarted, but it does appear on the computer of the person sitting in the next cubicle when that computer is restarted. What would you tell the user?

    The user probably has only one hardware profile. If there is a single hardware profile, NTLDR does not display the Hardware Profile/Configuration Recovery menu and instead loads Windows XP Professional using the default hardware profile configuration.

Lesson 2: Editing the Registry

Practice: Using the Registry Editor

Exercise 1: Exploring the Registry

To view information in the registry

  1. Expand DESCRIPTION and then double-click the System subkey.

    What are the SystemBIOSDate and SystemBIOSVersion of your computer?

    Answers will vary.

    What is the computer type of your local machine according to the Identifier entry?

    Answers will vary.

Exercise 3: Modifying the Registry

To verify the new registry value

  1. Click the Advanced tab, and then click Environment Variables.

    The Environment Variables dialog box appears.

    Does the test variable appear in the User Variables For Administrator list?

    Yes. You successfully edited the registry and added a User Environment variable.

Lesson Review

  1. What is the registry and what does it do?

    The registry is a hierarchical database in which Windows XP Professional stores hardware and software settings. The registry provides the appropriate initialization information to boot Windows XP Professional, to start applications, and to load components, such as device drivers and network protocols.

  2. What is the purpose of the BOOTSECT.DOS file and what happens if it is not present?

    BOOTSECT.DOS is a copy of the boot sector that was on the system partition at the time that Windows XP Professional was installed. BOOTSECT.DOS is only used if you are booting more than one operating system and you choose to load an operating system other than Windows XP Professional. If you do not have more than one operating system, you will not have a BOOTSECT.DOS file and Windows XP Professional will boot normally.

  3. What are some of the Windows XP Professional components that use the registry?

    Windows NT kernel, device drivers, user profiles, setup programs, hardware profiles, and NTDETECT.COM

  4. How do you access the Registry Editor?

    On the Start menu, click Run, type regedt32, and then click OK.

  5. Why should you make most of your configuration changes through either Control Panel or Administrative Tools rather than by editing the registry directly with the Registry Editor?

    Using the Registry Editor to modify the registry is dangerous because the Registry Editor saves data automatically as you make entries or corrections, so new registry data takes effect immediately. If you incorrectly edit the registry it can cause serious, system-wide problems that could require you to reinstall Windows XP Professional.

Lesson 3: Using Startup and Recovery Tools

Practice: Using the Windows XP Professional Recovery Console

Optional Exercise 1: Troubleshooting a Windows XP Professional Installation

To create a system boot failure

  1. Restart the computer.

    What error do you receive when attempting to restart the computer?

    NTLDR is missing.

    Press Ctrl+Alt+Del to restart.

Lesson Review

  1. What is safe mode and why do you use it?

    Starting Windows XP Professional in safe mode uses limited device drivers and system services and no network connections. Safe mode also ignores programs that automatically start up, user profiles, programs listed in the registry to automatically run, and all local group policies.

    You use safe mode because it provides access to Windows XP Professional configuration files so you can make configuration changes. You can disable or delete a system service, a device driver, or application that automatically starts that prevents the computer from starting normally.

  2. How do you start Windows XP Professional in safe mode?

    To start Windows XP Professional in safe mode, restart or boot the computer and press F8 during the operating system selection phase.

  3. When is the LastKnownGood configuration created?

    After you reboot the computer, the kernel copies the information in the Current control set to the Clone control set during the kernel initialization phase. When you successfully log on to Windows XP Professional, the information in the Clone control set is copied to the LastKnownGood control set.

  4. When do you use the LastKnownGood configuration?

    If you change the Windows XP Professional configuration to load a driver and have problems rebooting, you use the LastKnownGood process to recover your working configuration.

  5. How can you install the Windows XP Professional Recovery Console on your computer?

    To install the Recovery Console, insert the Microsoft Windows XP Professional CD-ROM into your CD-ROM drive. Open a Command Prompt window, change to the i386 folder on the Windows XP Professional CD, and then run the winnt32 command with the /cmdcoms switch.

Chapter 19: Deploying Windows XP Professional

Lesson 1: Automating Installations Using Windows Setup Manager

Lesson Review

  1. What is the purpose of the Windows Setup Manager?

    The Windows Setup Manager makes it easy to create the UNATTEND.TXT files and .udb files that you use to run unattended (scripted) installations.

  2. How could you apply an application update pack as part of the Windows XP Professional installation?

    If you were upgrading systems to Windows XP Professional, you would add the application update pack to the distribution folder so the necessary files are available. You would also need to add the commands to execute in the Additional Commands page of the Windows Setup Manager Wizard so that the update packs will be applied to the application as part of the Windows XP Professional installation (upgrade).

  3. What type of answer files does the Windows Setup Manager allow you to create?

    Windows Unattended Installation, Sysprep Install, and RIS

  4. Why would you use a UDB?

    A UDB allows you to specify per-computer parameters for an unattended installation. This file overrides values in the answer file.

Lesson 2: Using Disk Duplication to Deploy Windows XP Professional

Lesson Review

  1. What is disk duplication?

    Creating a disk image of a Windows XP Professional installation and copying that image to multiple computers with identical hardware configurations.

  2. What is the purpose of the System Preparation tool?

    The System Preparation tool was developed to prepare a master image for disk copying. Every computer must have a unique SID. The System Preparation tool adds a system service to the master image that will create a unique local domain SID the first time the computer to which the master image is copied is started. The System Preparation tool also adds a Mini-Setup Wizard to the master copy that runs the first time the computer to which the master image is copied is started and guides you through entering user-specific information.

  3. What does the /quiet switch do when you run SYSPREP.EXE?

    The /quiet switch causes SYSPREP.EXE to run without any user intervention.

Lesson 3: Performing Remote Installations

Lesson Review

  1. What is a RIS server and what is it used for?

    A RIS server is a computer running Windows 2000 Server and running the RIS. The RIS server is used to perform remote installations of Windows XP Professional. Remote installation enables administrators to install Windows XP Professional on client computers throughout a network from a central location.

  2. What network services are required for RIS?

    DNS Service, DHCP, and Active Directory

  3. What can you do if the network adapter card in a client is not equipped with a PXE boot ROM? Does this solution work for all network adapter cards? Why or why not?

    If the network adapter card in a client is not equipped with a PXE boot ROM, you can create a remote installation boot disk that simulates the PXE boot process.

    A remote installation boot disk will not work for all network adapter cards; it only works for those cards supported by the Windows 2000 Remote Boot Disk Generator.

  4. What user rights must be assigned to the user account that will be used to perform the remote installation?

    The user account that will be used to perform the installation must be assigned the user right Log On as a Batch Job.

Lesson 4: Using Tools to Simplify Deployment

Lesson Review

  1. When do you use the Files and Settings Transfer Wizard?

    The Files and Settings Transfer Wizard helps you to move data files and personal settings when you upgrade your hardware. The settings you can move include display settings, Internet Explorer and Outlook Express options, dial-up connections, and your folder and taskbar options. The wizard also helps you move specific files and folders to your new computer as well.

  2. Which of the following statements are true for the Files and Settings Transfer Wizard? (Choose all answers that are correct.)
    1. You run the Files and Settings Transfer Wizard only on your old computer.
    2. You must run the Files and Settings Transfer Wizard on both your old and your new computers.
    3. You can use a standard 25-pin cable to connect the parallel ports on your old and new computers to run the Files and Settings Transfer Wizard.
    4. You can use serial ports to directly connect your old and new computers to run the Files and Settings Transfer Wizard.

    b and d

  3. Which of the following statements are true for a disk that uses dynamic storage? (Choose all answers that are correct.)
    1. The system partition for Windows NT is never on a dynamic disk.
    2. A dynamic disk can be partitioned into four primary partitions or three primary partitions and one extended partition.
    3. The convert command allows you to convert a basic disk into a dynamic disk.
    4. A dynamic disk has a single partition that includes the entire disk.

    a and d

  4. How can Windows Installer help you minimize the amount of disk space taken up on a user's disk when you install a new application on that user's disk?

    Windows Installer allows you to install only the essential files required to run an application to reduce the amount of space used on a user's hard disk. The first time a user accesses any feature not included in the minimal installation, the necessary files are automatically installed.

  5. Which of the following statements about publishing and installing applications are correct? (Choose all answers that are correct.)
    1. Applications can be published to users or to computers.
    2. Publishing an application installs the application on the users' computers, but it does not place any shortcuts on the users' desktops or Start menus.
    3. Publishing an application does not install the application on the users' computers.
    4. Published applications are stored in Active Directory and the application is available to users to install using Add or Remove Programs in Control Panel.

    c and d



MCSE Microsoft Windows XP Professional
70-270: MCSE Guide to Microsoft Windows XP Professional (MCSE/MCSA Guides)
ISBN: 0619120312
EAN: 2147483647
Year: 2002
Pages: 128

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net