Windows XP Professional 70-270 Chapters 13 - 14

20 Questions | Attempts: 789
Share

SettingsSettingsSettings
Windows XP Quizzes & Trivia

2nd Half of Windows XP Professional 70-270


Questions and Answers
  • 1. 

    You are configuring users and groups on a Windows XP system that is used as a file and print server. Using built-in groups, which group would you place users in to allow them to add users and install applications?

    • A.

      Administrators

    • B.

      Power Users

    • C.

      Users

    • D.

      Backup Operators

    Correct Answer
    B. Power Users
  • 2. 

    A user accessing files on your system across the network is a member of which implicit group(s)? (Choose all correct answers.)

    • A.

      Creator Owner

    • B.

      Everyone

    • C.

      Interactive

    • D.

      Network

    Correct Answer(s)
    B. Everyone
    D. Network
  • 3. 

    Which of the following command-line commands will change Andy Ruth’s password?

    • A.

      NET USER ARuth /Passwordchg:Brahman~234

    • B.

      NET USER ARuth Brahman~234

    • C.

      NET USER ARuth Brahman~234 /D

    • D.

      NET USER /U:ARuth /P:Brahman~234

    Correct Answer
    B. NET USER ARuth Brahman~234
  • 4. 

    Which of the following tools can you use to add, manage, and remove local user accounts in Windows XP? (Choose all correct answers.)

    • A.

      Computer Management

    • B.

      User Manager

    • C.

      NET USER

    • D.

      Active Directory Users and Computers

    Correct Answer(s)
    A. Computer Management
    C. NET USER
  • 5. 

    Which of the following Net.exe commands adds the users CGarcia, RWalters, and LMather to the Finance Local Group?

    • A.

      Net Group Finance CGarcia RWalters LMather /Add

    • B.

      Net Localgroup Finance CGarcia RWalters LMather

    • C.

      Net Group Finance CGarcia RWalters LMather

    • D.

      Net Localgroup Finance CGarcia RWalters LMather /Add

    Correct Answer
    D. Net Localgroup Finance CGarcia RWalters LMather /Add
  • 6. 

    Which of the following tasks can you perform with the User Accounts tool in Control Panel? (Choose all correct answers.)

    • A.

      Add users

    • B.

      Add groups

    • C.

      Rename users

    • D.

      Change users’ passwords

    Correct Answer(s)
    A. Add users
    C. Rename users
    D. Change users’ passwords
  • 7. 

    Which of the following user rights are required to allow a user to log on to a system and back up files and folders to tape? (Choose all correct answers.)

    • A.

      Access This Computer From A Network

    • B.

      Log On Locally

    • C.

      Backup Files And Directories

    • D.

      Restore Files And Directories

    Correct Answer(s)
    B. Log On Locally
    C. Backup Files And Directories
  • 8. 

    A notebook computer user calls you from a hotel room. Her notebook computer was assigned to her for this trip, and she didn’t have time to log on and check it before she left. She cannot log on, and she gets an error message that says a domain controller cannot be found. What could be causing her problem? (Choose all correct answers.)

    • A.

      Her user account was not added in Local Users and Groups.

    • B.

      Cached credentials are disabled for that computer.

    • C.

      She never completed a domain logon to cache her logon credentials.

    • D.

      Her notebook computer is not a domain controller.

    Correct Answer(s)
    B. Cached credentials are disabled for that computer.
    C. She never completed a domain logon to cache her logon credentials.
  • 9. 

    You are hired as a civilian contractor on a military installation. You are assigned to manage the commanding general’s computer. He wants to be sure that documents on the computer are accessible only by him, and not even by administrators. Administrators can use their ownership privileges to change permissions even when they do not have access, so how can you assure the general that the files can never be seen by administrators? (Choose the two answers that form the correct response.)

    • A.

      Remove the Administrators group’s privilege to take ownership of files on that computer.

    • B.

      Remove all users from the Administrators group.

    • C.

      Have the general take ownership of the folder.

    • D.

      Assign the Administrators group Deny Take Ownership on the folder.

    Correct Answer(s)
    A. Remove the Administrators group’s privilege to take ownership of files on that computer.
    C. Have the general take ownership of the folder.
  • 10. 

    Local Security Policy is a subset of __________.

    • A.

      Security Configuration and Analysis

    • B.

      Domain Security Policy

    • C.

      Group Policy

    • D.

      Audit policy

    Correct Answer
    C. Group Policy
  • 11. 

    Which of the following audit policies do you enable to record attempts to access resources on your system from the network?

    • A.

      Logon events

    • B.

      Account logon events

    • C.

      Object access events

    • D.

      System events

    Correct Answer
    B. Account logon events
  • 12. 

    You are configuring a highly secure workstation and need to ensure that no potential attack is missed in the audit logs. What two settings must you configure to accomplish this?

    • A.

      Set up security log archiving

    • B.

      Configure audit policy to shut down the system if the security log becomes full

    • C.

      Configure the security log to not overwrite events

    • D.

      Store event logs on a secure data storage unit

    Correct Answer(s)
    B. Configure audit policy to shut down the system if the security log becomes full
    C. Configure the security log to not overwrite events
  • 13. 

    Which command-line tool can be used to configure security policy?

    • A.

      Secpol.msc

    • B.

      Eventvwr.msc

    • C.

      Secedit.exe

    • D.

      Gpedit.msc

    Correct Answer
    C. Secedit.exe
  • 14. 

    Which of the following security templates can you use to restore security configuration settings in the event of a configuration problem?

    • A.

      Compatws.inf

    • B.

      Hisecws.inf

    • C.

      Setup security.inf

    • D.

      Rootsec.inf

    Correct Answer
    C. Setup security.inf
  • 15. 

    You are concerned about a data folder that all users of your network have access to. Someone has been deleting files, and you want to find out who it is. Which audit policy and setting will detect this action?

    • A.

      Logon events (successful)

    • B.

      Logon events (failed)

    • C.

      Object access (successful)

    • D.

      Object access (failed)

    Correct Answer
    C. Object access (successful)
  • 16. 

    You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.■ You want to clear the username entered in the Log On To Windows dialog box after each logon.Which of the following security options will fulfill the security requirements? (Choose all correct answers.)

    • A.

      Accounts: Rename Guest Account

    • B.

      Interactive Logon: Do Not Display Last User Name

    • C.

      Interactive Logon: Do Not Require CTRL+ALT+DEL

    • D.

      Interactive Logon: Message Text For Users Attempting To Log On

    Correct Answer(s)
    B. Interactive Logon: Do Not Display Last User Name
    D. Interactive Logon: Message Text For Users Attempting To Log On
  • 17. 

    You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include: ■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users. ■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security. ■ You want to clear the username entered in the Log On To Windows dialog box after each logon.Which security template should you use as a baseline for this configuration?

    • A.

      Setup Security.inf

    • B.

      Compatws.inf

    • C.

      Securews.inf

    • D.

      Rootsec.inf

    Correct Answer
    B. Compatws.inf
  • 18. 

    You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include: ■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users. ■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security. ■ You want to clear the username entered in the Log On To Windows dialog box after each logon.Which utility can you use to create a security template for this configuration?

    • A.

      Notepad.exe

    • B.

      Local Security Policy

    • C.

      The Security Configuration and Analysis snap-in

    • D.

      The Security Templates snap-in

    Correct Answer
    D. The Security Templates snap-in
  • 19. 

    You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure  auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.The manager tells you she has never seen the administrator actually log on to any register, and that he spends a lot of time on his computer in the back office. You want to leave the administrator’s system untouched so he does not become suspicious. What audit policy can you configure to see if the administrator is accessing the registers over the store’s local area network, and on which systems should you configure it?

    • A.

      Account logon events on each register

    • B.

      Account logon events on the administrator’s computer

    • C.

      Logon events on the administrator’s computer

    • D.

      Logon events on each register

    Correct Answer
    D. Logon events on each register
  • 20. 

    You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.You want to be sure your activity does not affect the operation of the registers. Which security log settings can you apply to keep the lowest profile? (Choose all correct answers.)

    • A.

      Configure The Log To Overwrite The Oldest Events First

    • B.

      Configure The Log To Overwrite Events Over 7 Days Old

    • C.

      Manually Clear Logs

    • D.

      Shut Down The System When The Log File Gets Full

    Correct Answer
    A. Configure The Log To Overwrite The Oldest Events First

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2009
    Quiz Created by
    Ajeff
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.