05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

27-20 Chapter 27 Configuring, Managing, and Troubleshooting Security<br />

B. Incorrect: This procedure would ensure that Scott’s profile settings match<br />

Dave’s, but Scott’s account would not have access to shared folders and printers,<br />

NTFS files and folders, and other resources that Dave’s account had access to.<br />

Also, if Dave were still able to connect to the network, perhaps via a dial-up or virtual<br />

private network (VPN) connection, he would still be able to gain access to<br />

data on the network—this is a significant security risk.<br />

C. Incorrect: These procedures would accomplish the desired goals, but there is a<br />

much simpler way to give Scott the appropriate access to resources on the network.<br />

D. Incorrect: These procedures would accomplish the desired goals, but there is a<br />

much simpler way to give Scott the appropriate access to resources on the network.<br />

4. Correct Answers: D<br />

A. Incorrect: This security setting would not prevent users from logging on if they<br />

previously had logged on to the computer, had their domain account removed,<br />

and disconnected the computer from the network. In this scenario, the user could<br />

authenticate by using locally cached credentials.<br />

B. Incorrect: Requiring users to press Ctrl+Alt+Del does improve the security of the<br />

system, but it might still allow users to log on without being authenticated by a<br />

domain controller if that domain controller is unavailable.<br />

C. Incorrect: The Interactive Logon: Require Domain Controller To Unlock Workstation<br />

security policy causes Windows XP to reauthenticate a user with a domain<br />

controller when he unlocks the workstation. The primary purpose of this security<br />

setting is to prevent an attacker from guessing a user’s password when the workstation<br />

has been locked by a screen saver. When this setting is disabled, authentication<br />

attempts made at a locked workstation do not count against failed logon<br />

attempts. Although enabling this security policy is an important security best practice,<br />

it does not accomplish the goal outlined in this scenario.<br />

D. Correct: Setting this security policy to 0 means that no user can log on unless a<br />

domain controller is available to authenticate the user.<br />

5. Correct Answers: B<br />

A. Incorrect: Although adding the account to that group ensures that it has access<br />

to all the local files, folders, and other resources that it might need, it probably<br />

already had sufficient access because it was added to the Power Users group. This<br />

step is unlikely to resolve the problem.<br />

B. Correct: Services that run on Windows XP must run in the context of accounts<br />

that have the user right called Log On As A Service. The account must also have<br />

access to files, folders, and other resources utilized by that service.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!