Win 7 Config Study Guide Chapter 6 Flashcards

1
Q
You have a user who has access to the Applications folder on your network server. This user belongs to the following groups:
	NTFS
o	Sales (Read)
o	Marketing (Full Control)
	Shared permissions
o	Sales (Read)
o	Marketing (Change)
When this user logs into the Applications folder from their Windows 7 machine, what are their effective permissions?
A.	Full Control
B.	Read
C.	Change
D.	Read and Write
A

C. To figure out a user’s permissions, you must first add up what their effective NTFS rights are and their effective Shared permissions. Then, the most restrictive set takes precedence. So, in this example, the user’s NTFS permissions are Full Control and the Shared permissions are Change, so Change would be the effective permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You are setting up a machine for a home user who does not know much about computers. You do not want to make the user a local administrator, but you do want to give this user the right to change Windows Updates manually. How can you configure this?
A. Modify the LGPO for Windows Update to allow the user to make changes manually.
B. Explain to the user how to log on as the Administrator account.
C. Set Windows Update modifications to anyone.
D. This can’t be done. Only administrators can change Windows Update.

A

A. You do not want this user to have any administrator rights. To allow this user to change Windows Update manually, you must set this in an LGPO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You are the administrator for a large organization with multiple Windows Server 2008 R2 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the Sales group. How do you stop the Sales group from accessing this one application?
A. Deny the Everyone group the rights to the application.
B. Create an executable rule from the Application Control Policy.
C. Create a security role from the Application Control Policy.
D. Give the Everyone group full control to the application.

A

B. Application Control Policy (AppLocker) allows you to configure a Denied list and an Accepted list for applications or users. Applications that are configured on the Denied list will not run on the system or cannot be run by specific groups, and applications on the Accepted list will operate properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You have a Windows 7 machine that multiple users access. All users have the rights to use USB removable devices, but you need to deny one user access to USB removable devices. How do you accomplish this?
A. Deny the one user from using the machine.
B. Set a USB rule on Hardware Manager.
C. Deny all users from using USB devices.
D. Create a removable storage access policy through an LGPO.

A

D. LGPOs are policies that you can set on a local Windows 7 machine to limit hardware and user usage. You also have the ability to control individual users within the Local Group Policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are the system administrator for a large organization. You have a Windows 7 machine that all users can access. There is a folder on the Windows 7 machine called Apps. You need to set up auditing on this folder. How do you accomplish this task?
A. From the Local Group Policy, enable Directory Service Access.
B. From the Local Group Policy, enable Audit Object Access.
C. From the Local Group Policy, enable Account Access.
D. From the Local Group Policy, enable File And Folder Access.

A

B. Audit Object Access enables auditing of access to files, folders, and printers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
You have a user named Will who has access to the Finance folder on your network server. Will belongs to the following groups:
	NTFS
o	Admin (Full Control)
o	Finance (Modify)
	Shared Permissions
o	Admin (Full Control)
o	Finance (Change)
When Will logs into the Finance folder from his Windows 7 machine, what are his effective permissions?
A.	Full Control
B.	Read
C.	Change
D.	Read and Write
A

A. Will’s NTFS rights are Full Control and the Shared permissions are Full Control, so Full Control would be the effective permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You are the network administrator for a large organization. You have a Windows 7 machine that needs to prevent any user from copying unencrypted files from the Windows 7 machine to any removable disk. How do you accomplish this task?
A. Within the System icon in Control Panel, set the BitLocker Drive Encryption.
B. Within the Hardware icon in Control Panel, set the BitLocker Drive Encryption.
C. Within the Device Manager icon in Control Panel, set the BitLocker Drive Encryption.
D. Within a Local Group Policy, set the BitLocker Drive Encryption.

A

D. Windows 7 comes with a new feature called BitLocker Drive Encryption. BitLocker encrypts the entire system drive. New files added to this drive are encrypted automatically. To configure BitLocker, you must either use a Local Group Policy or use the BitLocker icon in Control Panel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
In which editions of Windows 7 can you enable BitLocker? (Choose all that apply.)
A.	Windows 7 Home edition
B.	Windows 7 Basic edition
C.	Windows 7 Ultimate edition
D.	Windows 7 Enterprise edition
A

C, D. BitLocker Drive Encryption is a data-protection feature available in Windows Enterprise and Ultimate editions of Windows 7.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A salesperson in your company purchases a new laptop with Windows 7 installed. She asks you to configure it for her. You create a standard local user account for her. Which of the following tasks can she perform by default?
A.	Change date and time settings
B.	Change time-zone settings
C.	Check Device Manager
D.	Enable parental controls
A

B. As a standard user, the salesperson can change time-zone settings. Changing the date and time settings, checking Device Manager, and enabling parental controls require administrative privileges. Any action that requires administrative privileges will be marked with a shield icon.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Your network’s security has been breached. You are trying to redefine security so that a user cannot repeatedly attempt user logon with different passwords. To accomplish this, which of the following items in the Local Security Policy dialog box shown here should you define?

A. Password Policy
B. Account Lockout Policy
C. Audit Policy
D. Security Options

A

B. Account Lockout Policy, a subset of Account Policies, is used to specify options that prevent a user from attempting multiple failed logon attempts. If the Account Lockout Threshold value is exceeded, the account will be locked. The account can be reset based on a specified amount of time or through administrator intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
You are the network administrator for a Fortune 500 company. The Accounting department has recently purchased a custom application for running financial models. To run properly, the application requires that you make some changes to the computer policy. You decide to deploy the changes through a Local Group Policy setting. You suspect that the policy is not being applied properly because of a conflict somewhere with another Local Group Policy setting. What command should you run to see a list of how the group policies have been applied to the computer and the user?
A.	gpresult
B.	gporesult
C.	gpaudit
D.	gpinfo
A

A. The Group Policy Result Tool is accessed through the GPResult command-line utility. The gpresult command displays the resulting set of policies that were enforced on the computer and the specified user during the logon process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
You have a Windows 7 computer that is located in an unsecured area. You want to track usage of the computer by recording user logon and logoff events. To do this, which of the following auditing policies must be enabled?
A.	Audit Account Logon Events
B.	Audit Account Management
C.	Audit Process Tracking
D.	Audit System Events
A

A. Audit Account Logon Events is used to track when a user logs on, logs off, or makes a network connection. You can configure auditing for success or failure, and audited events can be tracked through Event Viewer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You are the administrator for a printing company. After you configure the Password Must Meet Complexity Requirements policy, several users have problems when changing their passwords. Which of the following passwords meet the minimum complexity requirements? (Choose all that apply.)
A.	aBc-1
B.	Abcde!
C.	1247445Np
D.	!@#$%∧&*(−[]
A

B, C. The password Abcde! meets complexity requirements because it is at least six characters long and contains an uppercase letter, lowercase letters, and a symbol. The password 1247445Np meets complexity requirements because it is at least six characters long and contains an uppercase letter, a lowercase letter, and numbers. Complex passwords must be at least six characters long and contain three of the four types of characters—uppercase letters, lowercase letters, numbers, and symbols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You are the system administrator for Stellacon Corp. You have a computer that is shared by many users. You want to ensure that when users press Ctrl+Alt+Del to log on, they do not see the name of the last user. What do you configure?
A. Set the security option Clear User Settings When Users Log Off.
B. Set the security option Interactive Logon: Do Not Display Last User Name In Logon Screen.
C. Set the security option Prevent Users From Seeing Last User Name.
D. Configure nothing; this is the default setting.

A

B. The security option Interactive Logon: Do Not Display Last User Name In Logon Screen is used to prevent the last username in the logon screen from being displayed in the logon dialog box. This option is commonly used in environments where computers are used publicly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Mary has access to the R&D folder on your network server. Mary's user belongs to the following groups:
	NTFS
o	Sales (Read)
o	Marketing (Read)
	Shared Permissions
o	Sales (Read)
o	Marketing (Change)
When Mary logs into the R&D folder from her Windows 7 machine, what are her effective permissions?
A.	Full Control
B.	Read
C.	Change
D.	Read and Write
A

B. Mary’s NTFS rights are Read and the Shared permissions are Change, so Read would be the effective permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You have recently hired Will as an assistant for network administration. You have not decided how much responsibility you want Will to have. In the meantime, you want Will to be able to restore files on Windows 7 computers in your network, but you do not want Will to be able to run the backups. What is the minimum assignment that will allow Will to complete this task?
A. Add Will to the Administrators group.
B. Grant Will the Read right to the root of each volume he will back up.
C. Add Will to the Backup Operators group.
D. Grant Will the user right Restore Files and Directories.

A

D. The Restore Files and Directories user right allows a user to restore files and directories regardless of file and directory permissions. Assigning this user right is an alternative to making a user a member of the Backup Operators group.

17
Q

You are the network administrator of a medium-size company. Your company requires a fair degree of security, and you have been tasked with defining and implementing a security policy. You have configured password policies so that users must change their passwords every 30 days. Which password policy would you implement if you want to prevent users from reusing passwords they have used recently?
A. Passwords Must Be Advanced
B. Enforce Password History
C. Passwords Must Be Unique
D. Passwords Must Meet Complexity Requirements

A

B. The Enforce Password History policy allows the system to keep track of a user’s password history for up to 24 passwords. This prevents a user from using the same password over and over again.

18
Q

You have a network folder that resides on an NTFS partition on a Windows 7 computer. NTFS permissions and share permissions have been applied. Which of the following statements best describes how share permissions and NTFS permissions work together if they have been applied to the same folder?
A. The NTFS permissions will always take precedence.
B. The share permissions will always take precedence.
C. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is less restrictive will be applied.
D. The system will look at the cumulative share permissions and the cumulative NTFS permissions. Whichever set is more restrictive will be applied.

A

D. When both NTFS and share permissions have been applied, the system looks at the effective rights for NTFS and share permissions and then applies the most restrictive of the cumulative permissions. If a resource has been shared, and you access it from the local computer where the resource resides, then you will be governed only by the NTFS permissions.

19
Q
You are the network administrator for a bookstore. You install Windows 7 on a new computer. Before you connect the computer to the Internet, you want to ensure that the appropriate features are enabled. You open Windows Security Center and notice that there are features that need to be addressed. Which of the following features are not included with Windows 7?
A.	Firewall protection
B.	Spyware protection
C.	Virus protection
D.	Automatic update protection
A

C. Virus protection is not included with Windows 7 and should be purchased separately. Windows Firewall, Windows Defender (spyware protection), and Windows Update (automatic updates) are included with Windows 7.

20
Q

You are the Active Directory administrator for your company. A Windows 7 computer has been purchased for the Finance department, and you want to monitor it for unauthorized access. You configure the Audit Object Access policy to audit both success and failure events. However, when you look at the security event log a few days later, you do not see any entries related to file access. What is the most likely reason for this behavior?
A. Auditing has not been enabled for the appropriate files and folders.
B. A conflicting Group Policy setting is overriding your configuration.
C. Another administrator has disabled your Group Policy setting.
D. Object access events are found in the system event log.

A

A. The most likely reason there are no file access entries in the security event log is that you did not enable auditing for the appropriate files and folders. This behavior is true of print auditing as well.