Posted by shiningstar007 on .
I have a few questions on my assignment over Windows XP could you please check them? Thanxs!
17. Danni, an employee of a small medical group, manages a network of 30 PCs running Windows XP Professional on NTFS volumes. Eight of the PCs, located in three different offices, are used to track patient records. Because of the medical profession’s need to insure the security of patient data, Danni institutes folder-level file encryption using EFS on each of the PCs. One of the managing partners is PC literate, and is also very concerned about compliance with data security laws. He approaches Danni with a plan to implement additional security software to supplement EFS. His concern regarding EFS is that sensitive data remaining in the Windows XP paging file after shutdown exposes the firm to liability concerns. Is the partner correct in believing that Danni has failed to properly secure patient data?
I say that the partner is not right.
NARRATIVE MULTIPLE CHOICE (can have more than one answer)
18. Simon, a consultant, is called to the offices of a video production firm to assist in optimizing a number of Windows XP Professional computers for use as media editing stations. These machines are each equipped with three large hard drives, high performance video cards, 1 GB of memory, and high-end processors. Users are complaining that the performance of the systems has deteriorated steadily during the first six months of use and is now unacceptable. Simon analyzes the workstations and rules out mechanical defects as the cause of the performance issues. He then performs a number of operations designed to help the machines meet the performance expectations of the users. Which of the following operations would NOT be expected to improve the speed of the workstations?
a. Reconfiguring the three hard drives as dynamic disks, and arranging them into one large striped volume.
b. Moving the media data files out of the NTFS compressed volumes the data was stored in to conserve space.
c. Using Disk Cleanup to free disk space used by temporary files and unnecessary programs.
d. Using Disk Defragmenter to analyze and repair disk fragmentation.
e. Disabling the Encrypting File System
(On this question I got only E)
19. Mike, a consultant, is asked to check the configuration of a stand-alone desktop machine used in a warehouse environment. This Windows XP Professional machine is located on the loading dock, runs barcode scanning software and tracks all the shipping and receiving activities at the dock. The information it contains is considered vital. At the end of each day, the desktop is brought into the warehouse office where it is connected to the network and backed up. While reading through the machine’s system logs, Mike discovers that the machine has frequently experienced unexpected shutdowns. A conversation with the operator who usually runs the machine reveals that power fluctuations are common on the loading dock, with the desktop shutting down and rebooting several times a week. Mike immediately recommends the installation of a UPS, which he is told will be installed within a week. Which of the following additional procedures will be most helpful in protecting this machine’s vital data until the backup power supply is installed?
a. Add a second hard drive, and, using Disk Management, set up both the original and new hard drives as dynamic disks, and install the second drive as a spanned volume.
b. Using Disk Management, repartition the existing hard drive into three separate volumes, one for the operating system, one for applications, and one for data.
c. Using Disk Management, access the existing hard drive and, under Policies, deselect the Enable Write Caching check box to turn off write caching.
d. Using Disk Management, access the existing hard drive and Refresh the disk information in order to insure that all data is present.
e. Using Disk Defragmenter, defragment the disk in order to improve the integrity of the data.
(On this one I got B as the answer)
20. Winifred is the Office Manager of Contoso Limited. Contoso uses a payroll subscription service to generate company payroll. Payroll data is kept on a stand-alone machine supplied by the payroll subscription service. The machine, supplied and set up by the payroll subscription service, runs Windows XP Professional with workgroup membership. During the training period, the subscription service trainer implemented data encryption and instructed Winifred in the use of encrypted files. Since that time, Winifred has kept all payroll data encrypted on this machine. On Thursday afternoon, Winifred is unable to boot the system. The BIOS reports that there is no hard drive present. Winifred calls her network administrator, Damien, who diagnoses the problem as a defective hard drive and installs a replacement. Damien reinstalls Windows XP, the payroll software, and the payroll files from last week’s backup. Winifred logs on to the system but is unable to access the payroll files. Damien asks Winifred for her copy of the file encryption certificate. The file is not immediately available as Winifred has placed her copy of the certificate on a disk that is stored offsite with the company’s backup tapes. Which of the following recovery options will allow Winifred to recover the encrypted files?
a. Winifred, who is a member of the local administrator’s group, can create a new account for herself, add the new account to the administrator group, and decrypt the encryopted files with those credentials.
b. Damien, as a Contoso domain administrator, can log on to the payroll computer and decrypt the encrypted files.
c. Damien, as a Contoso domain administrator, can add the payroll computer to the Contoso domain, then log on and decrypt the files as a Contoso domain administrator.
d. Winifred or Damien can contact the payroll services company and obtain the local administrator password and associated private key. After logging on as the local administrator, they can use the administrators key as the default recovery agent for a standalone computer to decrypt the file, or send the file via e-mail for decryption at the system where the agent’s file recovery certificate is located.
e. Damien, as a Contoso domain administrator, can copy the encrypted file to a Contoso domain controller, where his access level as a domain administrator will allow him to authenticate and decrypth the file.
(On this question I got E for the answer)
oidwaj hdazny -
uynid iuwrsoaf mvytw lrzat jhcbusd pjohu acfn