A Quick Answer Key follows the Self Test questions. For complete questions, answers, and explanations to the Self Test questions in this chapter as well as the other chapters in this book, see the Self Test Appendix.
You are the network administrator for the Blue Sky, LTD, airplane manufacturer. The vice president of the Finance department has reported that some technically savvy users within the department have been attempting to access confidential information by browsing the available network shares from the Network Connections desktop icon. He has requested that users within subdepartments of the Finance area not be able to map network drives or browse network shares that they have not been explicitly granted access to. However, you have assigned a word processing application to the entire organization using a default GPO, and you do not want to reconfigure this portion of the Active Directory structure. In response to the VP’s request, you have configured your Active Directory environment as shown in Figure 10.13. (Please note that, in the illustration, “Enforce” means that the “Enforce settings” property has been applied to the GPO in question.) Which setting(s) will be applied to a workstation in the Collections OU? (Choose all that apply.) Figure 10.13: Question 1 Illustration | ||
You are the administrator for a Windows Server 2003 domain. Your network consists of five locations connected by high-speed Internet connections. Your network servers are running solely Windows Server 2003, but you are supporting network clients that are a mixture of Windows XP Professional, Windows 2000, and Windows NT 4.0 Workstation. Because of the recent spate of critical security updates that have been released by Microsoft, you need to design a strategy to apply security updates to all of your workstations in a quick and efficient manner. Given the current environment, what option can you use to roll out updates for all of your network clients? Install an internal SUS server and use Group Policy to configure clients to download approved updates from the SUS server.
Configure all workstations to prompt end users when downloads are available from the Windows Update site.
Use the software installation section of Group Policy to manually deploy software updates at the domain level.
Invest in a third-party patch management utility such as SMS.
| ||
You are the network administrator for a Windows Server 2003 network with Windows XP Professional desktops. Your help desk has been inundated with support calls from users who have intentionally or accidentally altered their system settings in such a way that they have lost network connectivity or some other form of functionality. You create a new Group Policy Object (GPO) that restricts access to the Control Panel for all of your network users and link it to the domain level. You notice after several weeks that support calls have greatly diminished except for the Communications department. Upon further investigation, you discover that this department is contained within its own OU, and the OU has another GPO applied to it that explicitly grants access to the Control Panel, along with several other settings that the department manager insists are critical for his employees to perform their job functions. How can you enforce the Control Panel lockout without otherwise adversely affecting the Communications department? Delete the GPO that is linked to the Communications OU.
Configure the “Control Panel lockout” GPO with the Enforce setting.
Configure the Communications OU to Block Inheritance so that the existing GPO will no longer be applied to it.
Merge the Communications OU GPO settings into the default domain GPO.
|
Answers
A, B, D |
|
D |
|
B |
You are the network administrator for a medical research facility running Windows Server 2003. Your firm is beginning a joint research operation with a major university, and many of your users will need to access files and folders on the university’s network. The university that you are collaborating with is operating using a UNIX Kerberos environment with UNIX clients at each desktop. Your company’s resources should also be accessible by the university staff. How can you accomplish this with the least administrative effort? Create a realm trust between your network and the UNIX network, and create account mappings in Active Directory for the UNIX clients.
Create separate accounts for the clients on the UNIX network.
Mandate the use of NTLMv2 authentication on the Windows network.
Mandate the use of MS-CHAP from the UNIX clients.
| ||
You are the network administrator for a large e-commerce site. Your Web developers have created a Web application to share information on the company intranet; this application relies on Digest Authentication to allow users to log on. For some reason, employees seem to be unable to access the new application. You check the account properties of one of the user accounts and see the screen shown in Figure 10.14. What is the most likely reason why your users cannot authenticate? Figure 10.14: Administrator Properties Sheet When logging on using Digest Authentication, the Windows username is case sensitive.
To use Digest Authentication, users must be running Internet Explorer version 6.
Your users’ passwords are set to expire every 60 days, which is causing Digest Authentication to fail.
You must enforce the Store passwords using reversible encryption setting for all users who need to authenticate using Digest Authentication.
|
Answers
A |
|
D |
Answers
A |
|
A |
|
A, D |