Information Technology Reference
In-Depth Information
3. Sam*Snead is a valid user account name. True or False?
4. Which of the following is true about user accounts in a Windows Server 2008 domain?
(Choose all that apply.)
a. The name can be from 1 to 20 characters.
b. The name is case sensitive.
c. The name can't be duplicated in the domain.
d. Using default settings, PASSWORD123 is a valid password.
5. Which of the following account options can't be set together? (Choose all that apply.)
a. User must change password at next logon
b. Store password using reversible encryption
c. Password never expires
d. Account is disabled
6. Global groups can have domain local groups as members. True or False?
7. Jane has left the company. Her user account is a member of several groups and has permis-
sions and rights to a number of forestwide resources. Jane's replacement will arrive in a
couple of weeks and need access to the same resources. In addition, you want the new
employee to have access to the files in Jane's profile. What is the best course of action?
a. Find all groups Jane is a member of and make a note of them. Delete Jane's user account
and create a new account for the new employee. Add the new account to all the groups
Jane was a member of.
b. Copy Jane's user account and give the copy another name.
c. Disable Jane's account. When the new employee arrives, rename Jane's account, assign
it a new password, and enable it again.
d. Back up Jane's profile and restore it to a folder assigned to the new employee.
8. Over the past several months, Tom, who has access to sensitive company information, has
logged on to computers in other departments and left them without logging off. You have dis-
cussed the matter with him, but the problem continues to occur. You're concerned that some-
one could access these sensitive resources easily. What's the best way to solve this problem?
a. Ensure that all computers Tom is logging on to have screen savers set to lock the com-
puter after 5 minutes of inactivity.
b. Specify which computers Tom can log on to in the domain by using the Log On To
option in his account's properties.
c. Move Tom's account and computer to another domain, thereby making it impossible for
him to log on to computers that are members of different domains.
d. Disable local logon for Tom's account on all computers except Tom's.
9. You have noticed inappropriate use of computers for gaming and Internet downloads by
some employees who come in after hours and on weekends. These employees don't have
valid work assignments during these times. You have been asked to devise a solution for
these employees that doesn't affect other employees or these employees' computers during
working hours. What's the best solution?
a.
Install personal firewall software on their computers in an attempt to block the gaming
and Internet traffic.
b.
Request that the Maintenance Department change the locks on their office doors so that
they can enter only during prescribed hours.
c.
Set the Logon Hours options for their user accounts.
d.
Before you leave each evening and before the weekend, disable these employees'
accounts and re-enable them the next working day.
Search WWH ::




Custom Search