Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Computer
Windows XP Professional 70-270 Chapters 13 - 14
20 Questions
|
By Ajeff | Updated: Mar 20, 2022
| Attempts: 789
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 20
0 %
0/100
Score
0/100
1.
You are configuring users and groups on a Windows XP system that is used as a file and print server. Using built-in groups, which group would you place users in to allow them to add users and install applications?
Administrators
Power Users
Users
Backup Operators
Submit
Start Quiz
About This Quiz
2nd Half of Windows XP Professional 70-270
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
Local Security Policy is a subset of __________.
Security Configuration and Analysis
Domain Security Policy
Group Policy
Audit policy
Submit
3.
Which command-line tool can be used to configure security policy?
Secpol.msc
Eventvwr.msc
Secedit.exe
Gpedit.msc
Submit
4.
You are concerned about a data folder that all users of your network have access to. Someone has been deleting files, and you want to find out who it is. Which audit policy and setting will detect this action?
Logon events (successful)
Logon events (failed)
Object access (successful)
Object access (failed)
Submit
5.
Which of the following Net.exe commands adds the users CGarcia, RWalters, and LMather to the Finance Local Group?
Net Group Finance CGarcia RWalters LMather /Add
Net Localgroup Finance CGarcia RWalters LMather
Net Group Finance CGarcia RWalters LMather
Net Localgroup Finance CGarcia RWalters LMather /Add
Submit
6.
Which of the following security templates can you use to restore security configuration settings in the event of a configuration problem?
Compatws.inf
Hisecws.inf
Setup security.inf
Rootsec.inf
Submit
7.
You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.
You want to be sure your activity does not affect the operation of the registers. Which security log settings can you apply to keep the lowest profile?
(Choose all correct answers.)
Configure The Log To Overwrite The Oldest Events First
Configure The Log To Overwrite Events Over 7 Days Old
Manually Clear Logs
Shut Down The System When The Log File Gets Full
Submit
8.
Which of the following tasks can you perform with the User Accounts tool in Control Panel? (Choose all correct answers.)
Add users
Add groups
Rename users
Change users’ passwords
Submit
9.
You are hired by a small office supply shop to find out who has been stealing money from its computerized cash register system, which runs Windows XP. The manager suspects that the system administrator is colluding with several cashiers to falsify the register journals. She has sent the administrator to a training course for a few days, and she wants you to configure auditing to track his activities. You soon discover that no security auditing is being done and no Local Security Policy has been configured on any of the registers.
The manager tells you she has never seen the administrator actually log on to any register, and that he spends a lot of time on his computer in the back office. You want to leave the administrator’s system untouched so he does not become suspicious. What audit policy can you configure to see if the administrator is accessing the registers over the store’s local area network, and on which systems should you configure it?
Account logon events on each register
Account logon events on the administrator’s computer
Logon events on the administrator’s computer
Logon events on each register
Submit
10.
You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which utility can you use to create a security template for this configuration?
Notepad.exe
Local Security Policy
The Security Configuration and Analysis snap-in
The Security Templates snap-in
Submit
11.
Which of the following command-line commands will change Andy Ruth’s password?
NET USER ARuth /Passwordchg:Brahman~234
NET USER ARuth Brahman~234
NET USER ARuth Brahman~234 /D
NET USER /U:ARuth /P:Brahman~234
Submit
12.
You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which of the following security options will fulfill the security requirements?
(Choose all correct answers.)
Accounts: Rename Guest Account
Interactive Logon: Do Not Display Last User Name
Interactive Logon: Do Not Require CTRL+ALT+DEL
Interactive Logon: Message Text For Users Attempting To Log On
Submit
13.
You are designing security for a group of workstations configured in a workgroup network environment. All the systems run identical applications and have similar requirements for security. These security requirements include:
■ Users need to run a legacy application that does not run well unless the users are placed in the Power Users group. You want to find a way to allow the application to run for non–Power Users.
■ You want to implement a logon banner to warn potential hackers that your organization pursues legal action against anyone who attempts to defeat system security.
■ You want to clear the username entered in the Log On To Windows dialog box after each logon.
Which security template should you use as a baseline for this configuration?
Setup Security.inf
Compatws.inf
Securews.inf
Rootsec.inf
Submit
14.
Which of the following audit policies do you enable to record attempts to access resources on your system from the network?
Logon events
Account logon events
Object access events
System events
Submit
15.
A user accessing files on your system across the network is a member of which implicit group(s)? (Choose all correct answers.)
Creator Owner
Everyone
Interactive
Network
Submit
16.
Which of the following user rights are required to allow a user to log on to a system and back up files and folders to tape? (Choose all correct answers.)
Access This Computer From A Network
Log On Locally
Backup Files And Directories
Restore Files And Directories
Submit
17.
A notebook computer user calls you from a hotel room. Her notebook computer was assigned to her for this trip, and she didn’t have time to log on and check it before she left. She cannot log on, and she gets an error message that says a domain controller cannot be found. What could be causing her problem? (Choose all correct answers.)
Her user account was not added in Local Users and Groups.
Cached credentials are disabled for that computer.
She never completed a domain logon to cache her logon credentials.
Her notebook computer is not a domain controller.
Submit
18.
Which of the following tools can you use to add, manage, and remove local user accounts in Windows XP? (Choose all correct answers.)
Computer Management
User Manager
NET USER
Active Directory Users and Computers
Submit
19.
You are hired as a civilian contractor on a military installation. You are assigned to manage the commanding general’s computer. He wants to be sure that documents on the computer are accessible only by him, and not even by administrators. Administrators can use their ownership privileges to change permissions even when they do not have access, so how can you assure the general that the files can never be seen by administrators?
(Choose the
two
answers that form the correct response.)
Remove the Administrators group’s privilege to take ownership of files on that computer.
Remove all users from the Administrators group.
Have the general take ownership of the folder.
Assign the Administrators group Deny Take Ownership on the folder.
Submit
20.
You are configuring a highly secure workstation and need to ensure that no potential attack is missed in the audit logs. What
two
settings must you configure to accomplish this?
Set up security log archiving
Configure audit policy to shut down the system if the security log becomes full
Configure the security log to not overwrite events
Store event logs on a secure data storage unit
Submit
View My Results
Related Quizzes
Tablet Quiz: What Tablet Should I Buy Quiz
Tablet Quiz: What Tablet Should I Buy Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (20)
Unanswered (
)
Answered (
)
You are configuring users and groups on a Windows XP system that is...
Local Security Policy is a subset of __________.
Which command-line tool can be used to configure security policy?
You are concerned about a data folder that all users of your network...
Which of the following Net.exe commands adds the users CGarcia,...
Which of the following security templates can you use to restore...
You are hired by a small office supply shop to find out who has been...
Which of the following tasks can you perform with the User Accounts...
You are hired by a small office supply shop to find out who has been...
You are designing security for a group of workstations configured in...
Which of the following command-line commands will change Andy Ruth’s...
You are designing security for a group of workstations configured in a...
You are designing security for a group of workstations configured in...
Which of the following audit policies do you enable to record attempts...
A user accessing files on your system across the network is a member...
Which of the following user rights are required to allow a user to log...
A notebook computer user calls you from a hotel room. Her notebook...
Which of the following tools can you use to add, manage, and remove...
You are hired as a civilian contractor on a military installation. You...
You are configuring a highly secure workstation and need to ensure...
X
OK
X
OK
Cancel
X
OK
Cancel
Back to top
Back to top
Advertisement