Windows XP Professional 70-270 Chapters 13 - 14

20 Questions | Attempts: 789
Share
Please wait...
Question 1 / 20
0 %
0/100
Score 0/100
1. You are configuring users and groups on a Windows XP system that is used as a file and print server. Using built-in groups, which group would you place users in to allow them to add users and install applications?
Submit
Please wait...
About This Quiz
Windows XP Quizzes & Trivia

2nd Half of Windows XP Professional 70-270

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Local Security Policy is a subset of __________.
Submit
3. Which command-line tool can be used to configure security policy?
Submit
4. You are concerned about a data folder that all users of your network have access to. Someone has been deleting files, and you want to find out who it is. Which audit policy and setting will detect this action?
Submit
5. Which of the following Net.exe commands adds the users CGarcia, RWalters, and LMather to the Finance Local Group?
Submit
6. Which of the following security templates can you use to restore security configuration settings in the event of a configuration problem?
Submit
7. You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.
You want to be sure your activity does not affect the operation of the registers. Which security log settings can you apply to keep the lowest profile?
(Choose all correct answers.)
Submit
8. Which of the following tasks can you perform with the User Accounts tool in Control Panel? (Choose all correct answers.)
Submit
9. You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure  auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.
The manager tells you she has never seen the administrator actually log on to any register, and that he spends a lot of time on his computer in the back office. You want to leave the administrator’s system untouched so he does not become suspicious. What audit policy can you configure to see if the administrator is accessing the registers over the store’s local area network, and on which systems should you configure it?
Submit
10. You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which utility can you use to create a security template for this configuration?
Submit
11. Which of the following command-line commands will change Andy Ruth’s password?
Submit
12. You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which of the following security options will fulfill the security requirements?
(Choose all correct answers.)
Submit
13. You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which security template should you use as a baseline for this configuration?
Submit
14. Which of the following audit policies do you enable to record attempts to access resources on your system from the network?
Submit
15. A user accessing files on your system across the network is a member of which implicit group(s)? (Choose all correct answers.)
Submit
16. Which of the following user rights are required to allow a user to log on to a system and back up files and folders to tape? (Choose all correct answers.)
Submit
17. A notebook computer user calls you from a hotel room. Her notebook computer was assigned to her for this trip, and she didn’t have time to log on and check it before she left. She cannot log on, and she gets an error message that says a domain controller cannot be found. What could be causing her problem? (Choose all correct answers.)
Submit
18. Which of the following tools can you use to add, manage, and remove local user accounts in Windows XP? (Choose all correct answers.)
Submit
19. You are hired as a civilian contractor on a military installation. You are assigned to manage the commanding general’s computer. He wants to be sure that documents on the computer are accessible only by him, and not even by administrators. Administrators can use their ownership privileges to change permissions even when they do not have access, so how can you assure the general that the files can never be seen by administrators?
(Choose the two answers that form the correct response.)
Submit
20. You are configuring a highly secure workstation and need to ensure that no potential attack is missed in the audit logs. What two settings must you configure to accomplish this?
Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 30, 2009
    Quiz Created by
    Ajeff
Cancel
  • All
    All (20)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
You are configuring users and groups on a Windows XP system that is...
Local Security Policy is a subset of __________.
Which command-line tool can be used to configure security policy?
You are concerned about a data folder that all users of your network...
Which of the following Net.exe commands adds the users CGarcia,...
Which of the following security templates can you use to restore...
You are hired by a small office supply shop to find out who has been...
Which of the following tasks can you perform with the User Accounts...
You are hired by a small office supply shop to find out who has been...
You are designing security for a group of workstations configured in...
Which of the following command-line commands will change Andy Ruth’s...
You are designing security for a group of workstations configured in a...
You are designing security for a group of workstations configured in...
Which of the following audit policies do you enable to record attempts...
A user accessing files on your system across the network is a member...
Which of the following user rights are required to allow a user to log...
A notebook computer user calls you from a hotel room. Her notebook...
Which of the following tools can you use to add, manage, and remove...
You are hired as a civilian contractor on a military installation. You...
You are configuring a highly secure workstation and need to ensure...
Alert!

Advertisement