05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

27-14 Chapter 27 Configuring, Managing, and Troubleshooting Security<br />

3. Correct Answers: C<br />

A. Incorrect: The startup parameters field is located on the General tab in the Properties<br />

dialog box for each service. The parameters in this field are included in the<br />

command that launches the service when the service is started from this dialog<br />

box; there are no command-line parameters for configuring the logon message<br />

text.<br />

B. Incorrect: The Display program is used for configuring desktop appearance,<br />

screen saver options, display resolution, color depth, and other display-related<br />

options; you cannot configure a logon message from this tool.<br />

C. Correct: This is how you configure this setting on stand-alone and workgroup<br />

computers. There is a second setting usually configured with this one called Interactive<br />

Logon: Message Title For Users Attempting To Log On that is displayed in<br />

the title bar for the dialog box displaying the logon message. When you are configuring<br />

this setting on large numbers of Windows XP Professional computers, it is<br />

more efficient to apply this setting via a domain-based GPO.<br />

D. Incorrect: Windows XP Professional does not use a text file to determine<br />

whether it should display a text message when users attempt to log on interactively,<br />

nor does Windows XP store a logon message in a text file.<br />

4. Correct Answers: A and C<br />

A. Correct: The Resultant Set Of Policy snap-in is a very useful tool for determining<br />

what a computer’s effective security settings will be when security settings are<br />

defined by multiple layers of policy, such as both GPOs and local security policy.<br />

However, you cannot change a computer’s configuration settings by using this<br />

tool.<br />

B. Incorrect: You can use the Secedit command-line tool to apply a security template<br />

to a computer by using the /configure parameter.<br />

C. Correct: You can use the Security Templates snap-in to create and edit security<br />

templates. However, it cannot be used to apply a security template to a computer.<br />

D. Incorrect: You can use the Security Configuration And Analysis snap-in to apply<br />

a security template by first importing the security template into a database, rightclicking<br />

Security Configuration And Analysis, and then clicking Configure Computer<br />

Now.<br />

E. Incorrect: You can use the Local Security Policy console to apply a security template<br />

to a computer by right-clicking Security Settings and then clicking Import<br />

Policy.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!