05.03.2013 Views

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

7-56 Chapter 7 Setting Up and Managing User Accounts<br />

Page<br />

7-46<br />

4. Which of the following statements about deleting local groups are correct?<br />

(Choose all that apply.)<br />

a. Each group that you create has a unique identifier that cannot be reused.<br />

b. You can restore access to resources by re-creating the group.<br />

c. When you delete a group, you also remove the permissions and rights associated<br />

with it.<br />

d. Deleting a group deletes the user accounts that are members of the group.<br />

The correct answers are A and C. B is not correct because re-creating a group does not re-create<br />

the membership of that group or any of the rights or permissions associated with that<br />

group. D is not correct because deleting a group does not delete the user accounts that are<br />

members of the group. Deleting a group does remove any rights and permissions that were<br />

extended to the members of the group by virtue of their membership.<br />

5. What is the difference between built-in system groups and built-in local groups<br />

found on computers running Windows XP Professional? Give at least two examples<br />

of each type of group.<br />

Built-in local groups give rights to perform system tasks on a single computer, such as backing<br />

up and restoring files, changing the system time, and administering system resources. Some<br />

examples of built-in local groups are Administrators, Backup Operators, Guests, Power Users,<br />

Replicator, and Users. Built-in system groups do not have specific memberships that you can<br />

modify, but they can represent different users at different times, depending on how a user<br />

gains access to a computer or resource. You do not see system groups when you administer<br />

groups, but they are available for use when you assign rights and permissions to resources.<br />

Some examples of built-in system groups are Everyone, Authenticated Users, Creator Owner,<br />

Network, Interactive, Anonymous Logon, and Dialup.<br />

Case Scenario Exercise<br />

1. Your first task is to create a naming convention for these workers. The museum<br />

management would like the user names to reflect that these are temporary workers,<br />

but not require too complicated a user name for the workers to type. Use the<br />

following table to create names for the workers.<br />

Full Name User Account Name<br />

Cat Francis<br />

David Jaffe<br />

Mary North<br />

Jeff Teper<br />

Bernhard Tham

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!