12. You are called by a department manager who wants one of his employees to have access to a specific document in the manager’s home directory. The department manager wants to retain the file in his own home directory, rather than move it to a share. You successfully assign the correct NTFS rights to the employee who needs to access the file, but when the employee attempts to access the file he fails. You instruct the user to log off and log back on, at which point the employee is successful in accessing the object. You have not made any other changes. This is because the act of logging on has generated a new user _____________________, reflecting the updated NTFS permissions and allowing the user to access the file. (For this one I got group)

13. You are a Domain Administrator in the Contoso Domain, and have been called to the accounting department to assist the Accounting Manager. The manager needs access to a database file in order to complete her monthly reports on deadline. The database file is normally stored on an NTFS network share and updated there by whichever employee is assigned to track it for the month. However, the manager has discovered that the employee assigned to manage the file this month has brought the file to his local machine and has made all the updates there. Although she can log onto the employee’s workstation, the manager cannot access the file. The employee is offsite on an assignment and the manager has been unable to reach him. You log onto the employee’s Windows XP machine and are also unable to access the file as a Domain Administrator. You solve the problem by _____________________of the needed file and copying it back to the network share from which it originated. (For this one I got taking ownership)

14. The vice president of finance has called you with a security concern. She has placed a folder called Board, which contains sensitive executive bonus information, in the Finance folder on the corporate FTP server so that it may be accessed by members of the board of directors, who are meeting at an offsite location. She asks that you make absolutely sure that the files can now be accessed only by members of the board. Everyone with access rights to this server has membership in a group reflecting the department that employs them, e.g., Management, Finance, Support, etc. Board members are in their own user group, with no membership in any other groups on the FTP server. To protect your network, the FTP server, which is directly accessible from the Internet, is maintained as a stand-alone workgroup machine and is not a member of your domain. It is running the Windows XP Professional operating system. You realize the special circumstances of the situation call for a solution that is not usually a recommended method of controlling access. To fulfill the manager’s request, you issue a specific ___________ permission to all groups other than Everyone, Authenticated Users, and Board Members for the Board folder. (For this one I got NTFS)

15. The metadata repository containing pointers to the actual storage sites of data on the physical disk is known as the ________________. (For this one I got MFT)

17. You are called to the desk of a user in the engineering department. The user is working with a new Windows XP Professional workstation that is joined to the domain, and is trying to secure a group of folders on this machine. The folders contain data on a highly sensitive project to which he has been assigned, and the user wishes to ensure that he is the only person allowed to access the files. The user, an experienced Windows XP operator, tells you that he is unable to even try to secure the files because the Security tab is missing from the properties dialog on both the folder and file menu. Checking his machine, you verify that he has local administrator permissions and all necessary rights and privileges to make the changes he is attempting. What is the problem? ( I don't understand this one)

18. Adelle, a Help desk technician, is approached by the manager of the editorial department with a unique request. The department manager is responsible for assigning editorial workload and tracking employee productivity data that is published and posted in a monthly report. Recently, there have been several instances in which department employees have complained that they were not properly credited for work they performed. The editorial department manager tracks productivity by referencing the NTFS file attributes for Author at the end of each month. The manager now wants to ensure that he and only he can change this information on the files he tracks. Which of the 13 NTFS discrete permissions should Adelle focus her attention on? (I don't understand this one)

19. Jack is setting up a new FTP server that is running the Windows XP operating system. This FTP server will be shared by seven different corporate departments, each identified by a user group, but access is to be restricted by department. The Domain Administrators, Departmental Managers, and Senior Management groups are to have access to all folders. Jack starts by creating an FTP folder on the system data drive and granting access to all the above-mentioned groups. Under the FTP folder, Jack creates individual folders for all seven departments. What must Jack do to ensure the requirement that access be restricted by department is met? (This one I don't understand)

20. Victoria is the administrator of the Contoso domain. Contoso is highly dependent on an application, developed in house, that manages workflow and ordering. Over the past several weeks, a number of virus attacks have severely impacted Contoso productivity by attaching themselves to the executable for the application, which is stored on all users’ Windows XP Professional workstations. Although Victoria protects her systems with antivirus software, the viruses that impacted the systems were so new that the anti-virus software did not recognize or stop them. Victoria was forced to take the infected machines out of service and restore the impacted files from backup before returning the computers to their users. What user file permissions can Victoria assign to the application executables in order to prevent, or at least reduce, the impact of this type of attack in the future? (For this one I got modify)

21. You are contacted by a Windows XP Professional user who is having issues reaching a folder to which his manager arranged access. The folder is located three levels below the root folder of the manager’s Windows XP desktop. The user has no problem connecting to the top-level share his manager set up and can explore folders one level down, but he is denied permission to access the folder he is trying to reach. The user gets a permission denial even when using the URL his manager sent him. The manager confirms that he has given the user rights to access and read from the folder, but not the folder immediately above, which he does not wish the user to see. Both the manager and the user, and their respective computers, are members of the domain you administer. Which of the following is the cause of the problem?

a. Group Policy has been modified to prevent the Everyone group from having the Traverse Folder right, and the user has not been granted the Traverse Folder right to the folders above the one he is trying to reach. (I think this one is the answer)

b. The user has incorrect DNS server settings. The user cannot resolve the URL for the folder.

c. The user needs to have Full Control rights in order to reach the folder in question.

d. The users access is being blocked by a specific deny on the root share created by the manager.

e. Windows XP Professional can only share files between XP machines in a Workgroup arrangement. The file will have to be placed on a domain-based file server in order to be shared once the computers are joined to the domain.

22. Marlon is the Backup Administrator of the Contoso Domain. He is trying to devise a scheme by which he can back up the entire documents folder used by the editorial department to create advertising documents, news releases, and the like. Marlon has been frustrated in his efforts to achieve a consistently error-free backup by the fact that users in the editorial department frequently access documents remotely through the corporate VPN while the backup is running. In these cases, backup will skip these files because they are open during the backup routine. In discussing his problem with Archie, a Help Desk technician, Archie informs Marlon that he can write a batch file using the command-line tool CACLS.exe to accomplish this goal. Is Archie’s statement true or false?
I got false for this one

Can someone help me out please?

You are involved in architecting the setup of an Active Directory domain
for a small Real Estate office. The office is relocating to a new facility and
is taking this opportunity to improve the business network. Your responsibility
is to manage efficient setup and location of the printers. The new office is in
a residence that is being converted for business use. It consists of four
floors, each of which will have offices. A dedicated computer room will be
located in the basement. There will be two Windows XP Professional print
servers located in the computer room, one business-class laser printer on each
of the four office floors, and one color laser printer on the first floor and
one on the fourth floor. In addition, all four floors will be equipped with a
single centrally-located networked ink-jet printer, for a total of 10 networked
printers. Users are expressing concern that with so many printers scattered
over so many floors, it will be impossible to know where the closest printer
is. You know, however, that the Printer Installation Wizard will present the
Location and Comment page. When you supply descriptive information about the
printers on setup, it will be displayed whenever the user searches
____________________________ for a printer.

TRUE OR FALSE
1) ____ Windows XP Professional enables you to manage printers from any
computer running a Web browser.

2) ____ The Windows XP Professional fax component is installed by default.

3) ____ A Line Printer Daemon (LPD) print server is required in order to print
Adobe PostScript documents.

4) ____ Each printer in a printer pool is individually accessible to the
network user.

5) ____ Members of the Everyone Group are more trusted than members of the
Authenticated Users Group.

6) ____ There is no way to cause Windows XP to retain permissions when an
object is copied or moved to another NTFS volume.

7) ____ Administrators and users with the Full Control permission are the only
users who can assign file and folder permissions to user accounts and groups.

8) ____ Administrators can take ownership of a folder or file, regardless of
assigned permissions.

21) Printers that are on print servers running Unix/Linux and running the
_________ server service can be advertised in Active Directory.

22) Printers that are on print servers running Unix/Linux and running the
_________ server service can be advertised in Active Directory.

23) You are involved in architecting the setup of an Active Directory domain
for a small Real Estate office. The office is relocating to a new facility and
is taking this opportunity to improve the business network. Your responsibility
is to manage efficient setup and location of the printers. The new office is in
a residence that is being converted for business use. It consists of four
floors, each of which will have offices. A dedicated computer room will be
located in the basement. There will be two Windows XP Professional print
servers located in the computer room, one business-class laser printer on each
of the four office floors, and one color laser printer on the first floor and
one on the fourth floor. In addition, all four floors will be equipped with a
single centrally-located networked ink-jet printer, for a total of 10 networked
printers. Users are expressing concern that with so many printers scattered
over so many floors, it will be impossible to know where the closest printer
is. You know, however, that the Printer Installation Wizard will present the
Location and Comment page. When you supply descriptive information about the
printers on setup, it will be displayed whenever the user searches
____________________________ for a printer.

24) You are involved in architecting the setup of an Active Directory domain
for a small Real Estate office. The office is relocating to a new facility and
is taking this opportunity to improve the business network. Your responsibility
is to manage efficient setup and location of the printers. The new office is in
a residence that is being converted for business use. It consists of four
floors, each of which will have offices. A dedicated computer room will be
located in the basement. There will be two Windows XP Professional print
servers located in the computer room, one business-class laser printer on each
of the four office floors, and one color laser printer on the first floor and
one on the fourth floor. In addition, all four floors will be equipped with a
single centrally-located networked ink-jet printer, for a total of 10 networked
printers. Users are expressing concern that with so many printers scattered
over so many floors, it will be impossible to know where the closest printer
is. You know, however, that the Printer Installation Wizard will present the
Location and Comment page. When you supply descriptive information about the
printers on setup, it will be displayed whenever the user searches
____________________________ for a printer.

27) ____ You are contacted by a Windows XP Professional user who is having
issues printing to the brand-new Internet printer installed in the accounts
payable department. The user, working from home and connected through his cable
provider, reports that he cannot browse to the printer through the Internet.
The server, your company's first Internet-enabled print server, was newly built
and brought online yesterday. The server is running a default installation of
Windows XP Professional and is connected to a new high-speed laser printer.
Internet printing was tested on installation and worked properly. After
confirming proper operation, the server was disconnected from the Internet and
had all applicable Windows updates installed. Following company security
policy, the IIS Lockdown Tool was run with default settings, and finally, the
Microsoft Baseline Security Checker Tool was run with default settings to
ensure that there were no security vulnerabilities. The user is able to surf
the Web, ping the server by name, and display Web pages on the new server you
have posted for test purposes. Which of the following is the cause of the
problem?
a. The IIS Lockdown tool has blocked access to Internet printing.
b. The user has incorrect network settings. With the wrong DNS server
specified, he cannot resolve the URL for the Internet printer.
c. The user has incorrect network settings. He is using a fixed IP address and
the incorrect default gateway, and cannot find his way off of his local network
segment.
d. The user is communicating at the wrong baud rate. The print job is timing
out and knocking him offline.
e. The printer is offline.

28) ____ Cosmo is at work at the Help Desk when he receives a call from the
manager of the finance department, asking him to meet her at the five-printer
printer pool for her department. He checks to make sure that the Windows XP
Professional print server servicing the finance department printer pool has no
errors in its logs, and leaves for the finance department. When Cosmo arrives,
the finance manager greets him with stacks of paper in each hand. "We are
wasting a lot of paper in this department!" she says. "We paid all this money
for business-class printers that could handle multiple document sizes, and all
I'm seeing is waste!" Cosmo looks at the paper the finance manager has now
handed him. He notes that most of the letter size (8 ½" x 11") paper has no
bottom margin; the print runs right off the bottom of the page. Looking
further, he finds that most of the legal size (8 ½" x 14") paper has too much
bottom margin, with the print stopping almost 8" from the bottom of the page.
He also finds several sheets of paper with a single postal address printed
vertically across the page. "Well, I see what the problem is," says Cosmo, "and
I'm sure I can resolve it." How does Cosmo most efficiently address this issue?
a. Cosmo breaks up the printer pool into separate units. He assigns one pool of
two printers to print only letter size documents, one pool of two printers to
print only legal size documents, and the remaining printer to print only
envelopes. He renames the printers with a naming convention that allows users
to find and print to the appropriate printer.
b. Cosmo writes a batch file that is distributed on login to all memebers of
the finance department. The batch file invokes the Sysprint.sep file from the
%systemroot%\system32 folder, which automatically directs the print job to use
the proper paper size.
c. Cosmo upgrades the printer drivers on all finance department computers
running windows XP, installing the newest XP drivers.
d. Cosmo assigns forms to specific paper trays on each printer in the finance
printer pool and notes on each tray that the paper size should not be changed.
e. Cosmo rearranges the printer priority for each of the employees in the
finance department, assigning the finance manager the highest priority, and the
user who incorrectly printed the envelopes the lowest.

29) ____ You are the domain administrator at Contoso Corporation, a
manufacturing firm. You are contacted by the loading dock manager. The loading
dock's staffing requirements change on a daily basis, depending on the
shipping/receiving workload. All loading dock personnel need access to the dock
printer in order to print out their picking and packing requisitions. You are
called a minimum of three times a day and asked to add or remove printer
permissions for these temporary employees. As the printer sits right on the
dock and is used by so many people, you are also called at least once a day to
clear the print queue after paper is reloaded or the printer is put back on
line. The loading dock manager wants to know if there is anything you can do to
streamline the process and cut down on the phone calls he has to make to you.
How would you resolve the situation in a way that would best preserve
efficiency and security?
a. Remove the network-enabled printer from the loading dock and replace it with
a newly-puchased local printer. Cable the printer to the loading dock manager's
laptop and allow him to administrate the printer using his local administrator
account.
b. Change the permissions on the network printer, giving Print permission to
the loading dock manager.
c. Change the permissions on the network printer, giving Manage Documents
permission to the loading dock manager.
d. Change the permissions on the network printer, giving Manage Printers
permission to the loading dock manager.
e. Create a generic print account within the domain, assign it Print
permissions to the loading dock network printer, and allow all loading dock
temp personnel to use the same account.

31) You are called to the desk of a user in the engineering department. The
user is working with a new Windows XP Professional workstation that is joined
to the domain, and is trying to secure a group of folders on this machine. The
folders contain data on a highly sensitive project to which he has been
assigned, and the user wishes to ensure that he is the only person allowed to
access the files. The user, an experienced Windows XP operator, tells you that
he is unable to even try to secure the files because the Security tab is
missing from the properties dialog on both the folder and file menu. Checking
his machine, you verify that he has local administrator permissions and all
necessary rights and privileges to make the changes he is attempting. What is
the problem?

32) Adelle, a Help desk technician, is approached by the manager of the
editorial department with a unique request. The department manager is
responsible for assigning editorial workload and tracking employee productivity
data that is published and posted in a monthly report. Recently, there have
been several instances in which department employees have complained that they
were not properly credited for work they performed. The editorial department
manager tracks productivity by referencing the NTFS file attributes for Author
at the end of each month. The manager now wants to ensure that he and only he
can change this information on the files he tracks. Which of the 13 NTFS
discrete permissions should Adelle focus her attention on?

teast

#1 is a

ineed the answer of 21

I need help with Penn Foster Test Using Window XP #038105, Internet Basic #083004

6. True