Information Technology Reference
In-Depth Information
10. The Users domain local group can be a member of the local Administrators group on a Vista
computer. True or False?
11. Which of the following is considered a security principal? (Choose all that apply.)
a. Contacts
b. Computers
c. User accounts
d. Distribution lists
12. You're trying to troubleshoot a user's profile. When you open the folder containing the pro-
file, you notice that many files and folders you expect to see are missing. The symptoms of
the problem don't indicate so many files and folders being missing. What's the likely prob-
lem, and how can you solve it?
13. What file do you see in the root of a user's mandatory profile?
a. Netlogon.dat
b. Netlogon.man
c. Ntuser.dat
d. Ntuser.man
14. You have just installed 50 new Vista computers. You want to be sure that all users get an
initial profile you have created when they first log on to a computer in the domain; they can
then customize the profile as needed. Which of the following is a required step for this task?
a. Rename Ntuser.dat.
b. Copy the appropriate files to the Default folder on every computer in the domain.
c. Create a folder named Default User.V2.
d. Assign permissions to the NETLOGON share.
15. You want to prevent users from logging on to the domain if their mandatory profiles are
unavailable for some reason. Which of the following is a necessary step?
a. Configure the Log On To option in the user's account.
b. Add .man to the profile path in their account properties.
c. Add .V2 to the profile path in their account properties.
d. Click the Super Mandatory check box in their account properties.
16. You have configured roaming profiles throughout your company. However, employees are
now complaining that logging on and off sometimes take a long time. You have also noticed
a spike in overall network traffic, particularly during the beginning and end of shifts. What
can you do to reduce the delays and reduce network traffic while maintaining the conven-
ience of roaming profiles?
17. Which of the following is a valid group scope? (Choose all that apply.)
a. Global
b. Domain local
c. Forest
d. Domain global
18. What happens if a security group that's an ACE in a shared folder is converted to a distri-
bution group?
a.
5
A security group can't be converted to a distribution group if it has already been
assigned permissions.
b.
The group is removed from the DACL automatically.
Search WWH ::




Custom Search