70-270 LabManualAnswers
70-270 LabManualAnswers
70-270 LabManualAnswers
LAB 1
SIMPLE INSTALLATION OPTIONS
ANSWER
QUESTION How many days do you have to activate the software after
it has been installed (assuming that you are not using a Volume Licensing
Product Key [VLK], which precludes activation)?
ANSWER
ANSWER
11. Verify that Format The Partition Using The NTFS File System or Format
The Partition Using The NTFS File System (Quick) is selected, according
to your instructor, and then press ENTER.
ANSWER
There are four formatting options available, two for NTFS and two for
FAT. You can also choose Quick for each. The FAT option actually formats
the hard drive using FAT32, which is an upgrade over the old 16-bit FAT
file system. NTFS is a more secure and robust file system, and it is
strongly recommended that all Windows XP installations use NTFS unless
there is a compelling reason to use FAT.
L01ht01.bmp
LAB 1 ANSWERS 3
ANSWER
Clicking on each of the icons summons an image of the item being used.
There is no explanatory text.
ANSWER
The two options suggested to run programs written for older versions of
Windows to run properly are
1. Run the Program Compatibility Wizard, or set compatibility
settings manually.
2. Update your program, drivers, or hardware.
Using Search
3. In the Search Results pane, click Getting Older Programs To Run On
Windows XP.
ANSWER
When search is used, the search string elements are highlighted in the
text.
4 LAB 1
ANSWER
The following readeraid is part of the list. If you cannot boot from the
CD-ROM drive, and no operating system is currently installed, you should
boot from a floppy system disk or other device that provides CD-ROM
drive support, and then run Winnt32.exe, which is located in the I386
folder on the Windows XP Professional Installation CD.
Yes, an IP address will be configured when you use typical settings. First,
your computer will attempt to contact a DHCP server and request an IP
address from it. If that fails, your computer will be assigned an address
by Automatic Private IP Addressing (APIPA), which will begin with the
octets 169.254.
The new name for the system tray is the notification area.
LAB 1 ANSWERS 5
The tour recommends that you configure many system settings through
Control Panel.
5. According to the Connected Home And Office section of the tour, can
multiple user accounts be active simultaneously?
ANSWER
Yes, in Windows XP, multiple user accounts can be active at the same
time. For example, while one user is logged on, another user’s account
could download e-mail messages in Microsoft Outlook.
6. What feature in Windows XP offers the user help on many tasks and
problems?
ANSWER
The Help And Support Center, which can be accessed by selecting Help
And Support from the Start menu. It can also be launched by pressing F1
while the desktop is active.
LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 6
LAB 2
ADVANCED INSTALLATION OPTIONS
QUESTION What are the three types of setup that Setup Manager
offers, and what is each for? (Hint: you can use the Help files that you
extracted from the Deploy cabinet file to find the answer.)
ANSWER
rem
rem This is a SAMPLE batch script generated by Setup Manager Wizard.
rem If this script is moved from the location where it was generated, it
may have to be modified.
rem
set AnswerFile=.\unattend.txt
7 LAB 2
set SetupFiles=D:\i386
From what you can see in the batch file, make an educated guess as to what the
/s and /unattend parameters specify.
ANSWER
The /s parameter specifies the location of the Windows Setup files, and
the /unattend parameter specifies an answer file to be used by Windows
Setup.
ANSWER
ANSWER
ANSWER
Error 126 returned by the LoadLibrary means that the specified module
could not be found.
ANSWER
15. In the Find dialog box, in the Find What text box, type system stabil-
ity. Click Find Next.
ANSWER
No, the line This file may be necessary to maintain system stabil-
ity does not appear in the good log file Setupact.log.
NOTE With all the errors recorded in the logs about setup, it would be
mandatory to redo the installation in this instance.
In actuality, the computer with the bad install seemed stable in moderate
testing. However, it used the old Windows 2000–style user interface
instead of the Windows XP interface. It also claimed that it had Service
Pack 1 installed in the System Properties dialog box, when the service
pack was actually only partially installed.
The errors during installation were created by removing the installa-
tion CD during the GUI phase of setup, about halfway through. At
this point, most installation files had been cached, so installation
did not fail entirely. When setup complained that some files were
needed, the Cancel button was clicked.
9 LAB 2
2. You are creating an answer file for unattended setup using Windows
Setup Manager. What type of user interaction should you choose if you
want the end user to be able to see the options specified in the answer
file but not be able to change them?
ANSWER
Read Only. The Read Only user interaction option provides all the answers
in the answer file, and the end user can see the options but cannot
change them.
5. What log file logs the errors during installation of Windows XP?
ANSWER
6. Where are the setup installation logs stored? (Hint: use Search from
the Start menu, and search for Setuperr.log.)
ANSWER
The setup log files are stored in the C:\Windows folder or, more generally,
the %windir% folder.
LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 11
LAB 3
MANAGING DISKS AND FILE SYSTEMS
ANSWER
A basic disk can contain four primary partitions, or three primary parti-
tions and one extended partition.
QUESTION Did the data on the partition survive the conversion from
FAT32 to NTFS?
ANSWER
Yes. Converting from FAT32 or FAT to NTFS does not cause data loss.
However, before making any fundamental changes to a hard drive, it is
recommended that you back up any important data.
QUESTION In the graphical view pane, what word has changed in the
Disk 0 graphical representation?
ANSWER
The description under the label Disk 0 has changed from Basic to
Dynamic.
12 LAB 3 ANSWERS
ANSWER
QUESTION What color is the font for the Brochure Images folder?
ANSWER
The font is blue, which is the default color for compressed files or folders.
ANSWER
20. In the Brochure Images folder, right-click Picture1.bmp and then select
Properties.
QUESTION The image file has been moved into a folder using NTFS com-
pression. Why isn’t the file any smaller?
ANSWER
ANSWER
QUESTION Why did the file shrink, when it remained full size when it was
moved?
ANSWER
Files that are copied into a compressed folder inherit the compressed
attribute.
QUESTION What color is the font used for the Sensitive Data folder?
ANSWER
The color is green, which is the default color for encrypted folders or files.
ANSWER
QUESTION What occurs when you try to open the Sensitive Text.txt
file?
ANSWER
Windows warns that you will not be able to start other installed operat-
ing systems from any of the volumes on the disk.
A file moved into a compressed folder from the same NTFS volume
remains uncompressed, whereas a file moved into a compressed folder
from a different NTFS volume becomes compressed. A file moved from any
NTFS volume into an encrypted folder becomes encrypted.
5. What happens when you lose or remove a certificate issued for EFS?
ANSWER
6. When specifying disk quotas, for which two events can you enable
logging?
ANSWER
You can log an event when the warning level of the quota is exceeded or
when the user exceeds the limit.
He has plenty of empty space on his hard drive. You ask him if he has ever defrag-
mented his hard drive, and he says that he has not. You have him print a report of
the fragmentation status of his hard drive, and this is what it says:
Volume fragmentation
Total fragmentation = 46 %
File fragmentation = 92 %
Free space fragmentation = 0 %
File fragmentation
Total files = 8,222
Average file size = 3 MB
Total fragmented files = 2,208
Total excess fragments = 20,280
Average fragments per file = 3.46
Pagefile fragmentation
Pagefile size = 0 bytes
Total fragments = 0
Folder fragmentation
Total folders = 756
Fragmented folders = 28
Excess folder fragments = 222
--------------------------------------------------------------------------------
Fragments File Size Most fragmented files
848 83 MB \User Data\Owen\Documents\Work\als-272\
year_end_data.xls
251 50 MB \User Data\Owen\Documents\War of the Species
Project\Rhino Models\Deer\tutorial\Financial_projections.xls
134 536 KB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006069.cpl
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004549.cpl
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008065.cpl
86 6 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\8\ch08da_p1.pdf
86 5 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\2\ch02da_p1.pdf
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006180.msi
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008486.msi
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008176.msi
75 5 MB \System Volume Information\_restore
{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021414.exe
69 35 MB \User Data\Owen\Documents\War of the Species
Project\New Folder (3)\dragon 002.3dm
68 4 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\4\ch04da_p1.pdf
60 4 MB \User Data\Owen\Documents\Work\als-296\
grouppolwp.doc
60 23 MB \User Data\Owen\Documents\War of the Species
Project\Rhino Models\elephant\Elephant 3-xxx.3dm
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006167.dll
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008473.dll
59 4 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\6\ch06da_p1.pdf
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008163.dll
58 4 MB \System Volume Information\_restore
{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021415.dll
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006078.exe
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004558.exe
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008074.exe
54 3 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\10\ch10da_p1.pdf
51 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0005236.dll
51 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0006948.dll
51 3 MB \User Data\Owen\Documents\Work\als-296\
Labs\11\WinXP\Display\nv4_disp.dll
50 3 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\5\ch05da_p1.pdf
49 3 MB \User Data\Owen\Documents\Work\als-296\
Labs\11\WinXP\AudioUtl\SSWAV06.WAV
LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 17
QUESTION Excel files use the .xls extension. Of how many fragments
are the two .xls files in the Most Fragmented Files list composed?
ANSWER
ANSWER
After looking at the fragmentation status of his hard drive, you decide to run
Chdsk first and then perform a defragmentation of his hard drive.
ANSWER
LAB 4
MANAGING DEVICES AND PERIPHERALS
QUESTION Has the Floppy Disk Drive device been restored in the Device
Manager tree?
ANSWER
Yes, the floppy disk drive device has been restored in the Device Manager
tree.
ANSWER
A Standard 56000 bps Modem exists under the Modems node in the
device tree.
ANSWER
ANSWER
The standard resources for a PS/2 keyboard are I/O Ranges of 0060 and
0064 (for which the ranges are listed as 0060 – 0060 and 0064 –
0064, but this just means that one value defines the range), and an IRQ
of 01. Answers may vary.
8. Examine the resources for your floppy disk controller, and answer the
following question:
ANSWER
The floppy disk controller uses I/O Ranges 03F0 – 03F5 and 03F7, IRQ 6,
and DMA 2. (Answers may vary.)
9. Examine the resources for your network adapter, and answer the
following question:
QUESTION What resource type does your network adapter use that
the other devices we have examined did not use?
ANSWER
GL04ht04.bmp
ANSWER
Yes, PCI IRQs can be used by more than one device. Therefore, a double
entry for a PCI IRQ is not necessarily indicative of a conflict. However, ISA
(Industry Standard Architecture) IRQs can only handle a single device,
and so a double entry for an ISA IRQ would indicate an IRQ conflict.
Drive A:
Type: 3.5" 1.44MB floppy disk drive
Total Space: 1,474,560 bytes
Heads: 2
Cylinders: 80
Sectors Per Track: 18
Bytes Per Sector: 512
Drive C:
Type: Fixed disk drive
Total Space: 27,036,459,008 bytes
Free Space: 8,034,979,840 bytes
Heads: 255
Cylinders: 9729
Sectors Per Track: 63
Bytes Per Sector: 512
Drive D:
Type: CD-ROM drive
Total Space: 557,842,432 bytes
Drive L:
Type: Fixed disk drive
Total Space: 52,979,023,872 bytes
Free Space: 34,936,680,448 bytes
Heads: 255
Cylinders: 9729
Sectors Per Track: 63
Bytes Per Sector: 512
ANSWER
The Standard OpenHCD USB Host Controller and the NVIDIA nForce MCP
Audio Processing Unit share IRQ 22.
ANSWER
The Standard Floppy Disk Controller and the Direct Memory Access Con-
troller each use a DMA channel.
ANSWER
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 25
ANSWER
6. In the Communications Port (COM1) dialog box, click the Resources tab.
ANSWER
The Resources tab indicates that the device cannot find enough free
resources, and that to use the device, you will need to disable one of the
other devices on the system.
The Add Hardware Wizard, accessed through Control Panel, is the most
common and easiest way to add a hardware device (although most mod-
ern devices are automatically detected and installed by Windows XP).
26 LAB 4 ANSWERS
The four view types offered in Device Manager are Devices By Type, Devices
By Connection, Resources By Type, and Resources By Connection.
3. What are the six summaries that a Device Manager System Summary
printout is divided into?
ANSWER
When you print a Device Manager System Summary, it is divided into the
following six summaries: System Summary, Disk Drive Info, IRQ Summary,
DMA Usage Summary, Memory Summary, and IO Port Summary.
Devices are grouped into classes. For example, the COM1 port is part of
the class Ports (COM & LPT).
Hexadecimal
Digit 0 1 2 3 4 5 6 7 8 9 A B C D E F
Decimal Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
3 * 100 +
8 * 101 +
5 * 102 +
1 * 103,
The same can be done in hexadecimal, but using 16s (because it is base 16)
instead of 10s. For example, the number D93E would be:
E * 160 +
3 * 161 +
9 * 162 +
D * 163
After installing the new device on the first test computer, you find that it has
reserved the memory range E0085000 through E0085FFF for its use.
To complete this lab challenge, you need to write down the conversion to decimal
for the hexadecimal values E0085000 and E0085FFF. You then need to verify
your results using Microsoft Calculator. (Hint: switch to Scientific view when
using Calculator.)
ANSWER
which, using Calculator (from the Start menu, point to All Programs,
Accessories, and then select Calculator), equals 20,480 + 524,288 +
3,758,096,384, or 3,758,641,152. To get the decimal equivalent for
E0085FFF, add FFF:
F * 160 +
F * 161 +
F * 162,
LAB 5
CONFIGURING AND MANAGING THE USER
EXPERIENCE
Desktop Items
6. In the Display Properties dialog box, click OK.
QUESTION What two items appear on the desktop when you click
Apply?
ANSWER
10. Right-click the embedded Web page, and then select Refresh.
ANSWER
Display Settings
1. In the Display Properties dialog box, on the Settings tab, examine the
settings and answer the following questions.
ANSWER
ANSWER
The Color Quality offerings vary depending on the display adapter driver.
An example answer is Medium (16 bit) and Highest (32 Bit).
30 LAB 5 ANSWERS
ANSWER
The Hardware Acceleration slider and the Enable Write Combining check
box are the available settings on this tab.
The Taskbar
2. Right-click each option in the Taskbar Appearance section, select
What’s This?, and answer the following questions.
ANSWER
He should select the Group Similar Taskbar Buttons check box. This will
group taskbar buttons opened by the same program into a single group if
the taskbar becomes crowded.
QUESTION A user wants the full use of the screen, but cannot “get rid
of the bar at the bottom of the screen.” Which two settings could you
recommend the user change to fix this?
ANSWER
The user could clear the Lock The Taskbar check box, which would allow the
user to hide the taskbar manually. Alternatively, the user could select the
Auto-Hide The Taskbar check box, which would automatically hide the
taskbar and reveal it when the mouse was brought to the taskbar area.
QUESTION What option allows the user to choose from a list of short-
cuts located on the taskbar?
ANSWER
The Show Quick Launch check box will display the Quick Launch toolbar on
the taskbar. The Quick Launch toolbar allows the user to display the
desktop or launch an application with a single click.
LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 31
ANSWER
The Calculator appears in the top section of the All Programs list.
ANSWER
The Calculator shortcut has moved to the bottom section of the All
Programs list.
QUESTION How do you launch the Calculator from the Start menu now?
ANSWER
From the Start menu, point to All Programs, Accounting, and then select
Calculator.
ANSWER
In the Regional And Language Options dialog box, on the Regional Options
tab, in the Location section, in the drop-down list, select Kazakhstan.
32 LAB 5 ANSWERS
QUESTION A user has nerve degeneration and often hits a key more
than once by accident. What accessibility key option can help to mitigate
this problem?
ANSWER
The FilterKeys option will allow Windows to ignore brief or repeated key-
strokes or slow the repeat rate. This can help to mitigate problems where
the user involuntarily presses a key repeatedly, has difficulty pressing
keys briefly, or accidentally presses keys for short periods.
ANSWER
ANSWER
The keyboard shortcut is to hold down the RIGHT SHIFT key for eight
seconds.
ANSWER
The StickyKeys option allows a user to avoid having to press two keys
simultaneously to apply a modifier key.
ANSWER
ANSWER
The keyboard shortcut for activating StickyKeys is pressing the SHIFT key
five times.
QUESTION What other option is on the Sound tab, and what does
it do?
ANSWER
The other option on the Sound tab is Use ShowSounds. Use ShowSounds
requests that programs display captions for the speech and sounds
that they make. The programs must have this functionality built-in for
this option to work.
QUESTION What other options are on the Display tab, and what do
they do?
ANSWER
The other options on the Display tab are the Blink Rate and the Width,
which adjust how fast the cursor blinks and how wide it is.
ANSWER
The keyboard shortcut for MouseKeys is LEFT ALT + LEFT SHIFT + NUM
LOCK.
The Themes tab. Themes allow the user to set a combination of the back-
ground, a set of sounds, icons, and other elements by selecting a single
theme.
2. A user has set a picture of her son as the background image on her
desktop. However, the image is horribly distorted; the face is three
times as wide as it is tall. What is wrong, and how can you fix it?
ANSWER
3. Knowing from what location you organize the Start menu for an indi-
vidual user, where do you think you can organize the Start menu for all
users of a Windows XP installation?
ANSWER
You can organize the Start menu for all users by accessing C:\Documents
And Settings\All Users\Start Menu. Or, you can right-click the Start
menu, and then select Open All Users or Explore All Users.
4. A user who spends half his time in New York and the other half in Paris
wants to add French as an alternative input language on his computer.
What option in Control Panel should he choose?
ANSWER
The conclusion was that the attention given to the employees, not the altering of
light levels, is what increased productivity. In the spirit of this study, the human
resources department wants to track the productivity of users who receive cus-
tomized desktops that look and feel different from the default. They want to see
whether productivity is altered, and how long changes in productivity last.
You have been asked to create the custom desktop that will be used for testing.
This lab challenge is open ended and has no correct answer, but consider doing
some or all of the following:
Once you have modified your local student account to create a custom desktop,
be sure to change the essential behaviors back to the default so that future labs
will work.
ANSWER
Lab Challenge 5-1 has no single correct answer; just create a custom
desktop (with your local student account) using the techniques you
learned in Lab 5. Once you are done, restore the default settings so that
future labs will work as written.
36 LAB 6 ANSWERS
LAB 6
CONFIGURING AND MANAGING PRINTERS
ANSWER
The first two lines of the Test.txt document contain “Windows XP” and
“Printer Test Page.”
ANSWER
ANSWER
QUESTION How many printers at Contoso are available that can print
color?
ANSWER
12. In the Printers tab, in the Location text box, type Room yy and then
click Find Now.
ANSWER
ANSWER
ANSWER
The Internet Jokes.rtf document, which is the last document listed in the
queue, has a status of printing.
38 LAB 6 ANSWERS
QUESTION Does the fact that a file not at the top of the queue is
printing before others listed above it indicate that its priority number is
higher or lower (assuming that the priority assigned to the documents is
responsible for the out–of-order printing)?
ANSWER
ANSWER
The scope of the local administrator account does not extend to domain
administration. The Contoso student account is a member of the Contoso
domain and therefore cannot be added by an administrator account that
covers only the local computer.
The name of the location is Printers And Faxes, and it can be accessed
from the Start menu or from Control Panel.
3. You are technical support agent at Contoso. Because you are moving
continually from site to site fixing problems, you often do not have
access to a computer. So that you can check your e-mail messages, you
have purchased a Pocket PC that connects to the Contoso network via
a wireless connection. You want to be able to easily administer printers
from your Pocket PC. How can you accomplish this?
ANSWER
You can install Internet printing, which will allow you to manage network
printers via the Web browser on your Pocket PC.
No, you would not be able to print because Deny permissions always take
precedence over Allow permissions.
You can ensure that the load is distributed evenly by configuring printer
pooling. This will create only one logical printer for the users to print to,
which will distribute print jobs to all five printers evenly. Also, you might
want to configure a cover page that identifies the document and its
source.
You have decided to create a fax printer on a computer at the front desk that is
currently configured as a print server.
40 LAB 6 ANSWERS
Currently, all documents sent to the printer are queued on a first-come, first-served
basis. You need to create two new logical printers, one that prints at maximum
priority and one that prints during off-hours. This way, employees can select the
high-priority printer if they need to print a document quickly, or they can select
the off-hours printer if they do not need the document until the next, day. Also,
really long documents can be sent to the off-hours printer to keep the print device
from being occupied printing long documents during working hours.
ANSWER
LAB 7
CONFIGURING AND MANAGING NTFS SECURITY
Configuring Permissions
8. In the Select Users, Computers, Or Groups dialog box, in the Enter
The Object Names To Select (Examples) text box, type Computerxx\
Accountants and then click Check Names. Click OK.
ANSWER
The Read & Execute, List Folder Contents, and Read permissions are all
assigned to the group Accountants (or any other group) when it is
added.
9. In the Group Or User Names list, select Users and then click Remove.
ANSWER
Because the folder is set to inherit permissions, and the Users group
has rights in the parent folder (drive C), which it is inheriting. You cannot
remove a group or user from a folder’s permissions when it is set to
inherit permissions.
Testing Permissions
12. Double-click AllenB’s Document.
ANSWER
QUESTION Can you save the changes you made to AllenB’s Document?
44 LAB 7 ANSWERS
ANSWER
QUESTION Why were you able to save changes to the file when you were
logged on as AllenB, but not JayH, when you are both members of the
Accountants group?
ANSWER
The Accountants group does not have the Write permission, so being a
member of that group does not grant you permission to write to any file.
But the Creator Owner group is allowed the Write permission, so AllenB
is allowed to change the file because he is a member of the Creator Owner
group for the file.
ANSWER
The Write Data portion of the Create Files / Write Data special permis-
sion has no effect at all when applied to a folder. The Write Data portion
will affect only files, whereas the Create Files portion applies only to
folders.
Effective Permissions
6. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\
Accountants and then click Check Names. Click OK.
QUESTION What are the effective permissions that are granted to the
Accountants group for the Share 1 On Volume 1 folder?
ANSWER
8. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\
Administrator and then click Check Names. Click OK.
QUESTION What are the effective permissions that are granted to the
local Administrator account for the Share 1 On Volume 1 folder?
ANSWER
15. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\AllenB
and then click Check Names. Click OK.
ANSWER
The Creator Owner group has full permissions, and AllenB created the file
and owns it.
QUESTION What other Allow check boxes are selected when you select
the Modify check box?
ANSWER
The Allow check boxes for the Read & Execute, List Folder Contents, Read,
and Write permissions are automatically selected when the Allow check
box for the Modify permission is selected.
6. Clear all the check boxes, and then select the Allow check box for the
Read & Execute permission.
QUESTION When you select the Allow check box for the Read & Execute
permission, what other Allow check boxes are selected?
46 LAB 7 ANSWERS
ANSWER
The Allow check boxes for the List Folder Contents and Read permissions
are selected automatically when you select the Allow check box for the
Read & Execute permission.
GL07ht03.bmp
ANSWER
The Traverse Folder / Execute File, List Folder / Read Data, Read
Attributes, Read Extended Attributes, and Read Permissions special
permissions constitute the Read & Execute permission.
ANSWER
No, the Accountants group does not appear in the list. This means that
the NTFS permissions were not copied to the new folder.
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 47
15. Examine the Security tabs in the Properties for the folders you moved
and copied, and complete the following chart.
QUESTION
ANSWER
When you block permission entries from being inherited from a parent, you
have the option of either copying the currently inherited permissions to
the current object, or removing all inherited permissions and keeping only
permissions that are explicitly defined at the object level.
The Create Files / Write Data, Create Folders / Append Data, Write
Attributes, and Write Extended Attributes special permissions
constitute the Write permission.
ANSWER
When you save files to a CD-ROM, they are set to read-only. You need to
allow the Write permission for the file to the appropriate users.
Each of the workstations has a folder on the root of drive C, named Share 2 On
Volume 1, that needs to be accessible only to the Administrators group, the
Accountants group, and the SYSTEM. You are not sure who can access the folder
right now.
Rather than set the NTFS permissions for the folder on each of the 20 worksta-
tions manually, you have decided to write a batch file that will change the settings
using the Cacls command. You can then distribute the batch file either over the
network or on a floppy disk to be run on each workstation.
Write a batch file named Permissions.bat on the root of drive C that will:
NOTE A batch file is text file that contains commands that are exe-
cuted one at a time as if they were being typed directly into a command-
prompt window. You can create a batch file by saving a text file as
name.bat. You can then run the batch file by entering path:name.bat at
a command prompt (for example, C:\Example.bat). Chapter 7 of the text-
book book covers the use of the Cacls command. You can also get infor-
mation by typing cacls /? at a command prompt or by using the Help and
Support Center (search for Cacls).
ANSWER
To create the batch file and run it, complete the following steps:
1. Ensure that you are logged on with your local Administrator
account.
2. From the Start menu, point to All Programs, Accessories, and
then select Notepad.
3. In Notepad, type the following code. (The @REM are comments
and will not affect the output of the program, and therefore do
not need to be included.)
50 LAB 7 ANSWERS
@REM Allow the SYSTEM group and the Administrators group full
control. Because the /E switch was not used in the first
instance, all existing permissions are removed.
CACLS "Share 2 On Volume 1" /G SYSTEM:F
CACLS "Share 2 On Volume 1" /E /G Administrators:F
BUILTIN\Users:(CI)(special access:)
FILE_WRITE_DATA
LAB 8
CONFIGURING AND MANAGING SHARED FOLDERS
ANSWER
The shares ADMIN$, C$, IPC$, L$, and Print$ all exist. They are all admin-
istrative shares and are hidden. Share names followed by a dollar sign ($)
are hidden from network browsing.
10. In the Shared Folder Permissions dialog box, select Customize Permission.
QUESTION What four permissions settings are offered for the shared
folder?
ANSWER
The four permissions settings offered for the shared folder are as follows:
1. All Users Have Read-Only Access.
2. Administrators Have Full Access; Other Users Have Read-Only
Access.
3. Administrators Have Full Access; Other Users Have No Access.
4. Customize Permissions.
QUESTION What occurs when you try to access the shared folder
Accounting Data on your partner’s computer?
ANSWER
When you try to access the shared folder Accounting Data on your part-
ner’s computer, you receive a message indicating that access is denied.
LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 53
QUESTION Why are you able to access the shared folder Accounting
Data on your computer, but you are not able to access the same folder
on your partner’s computer, when the share and NTFS permissions are
identical?
ANSWER
You are not able to access the shared folder Accounting Data on your
partner’s computer because the share permissions allow access only to
the Accountants and Domain Administrators groups. However, these
permissions only affect access over the network and do not affect con-
nections to the folder made locally. Therefore, you can access the folder
locally because it is allowed by the NTFS permissions.
ANSWER
The message box states that no more connections can be made because
as many connections as the computer can accept have been made.
ANSWER
QUESTION How many open files are there in MZwilling’s current session?
54 LAB 8 ANSWERS
ANSWER
ANSWER
ANSWER
2. You create a shared folder and allow only Domain Admins access to it.
However, you find that you can access the folder on the file server
when you log on as a Domain User. Why can you access the folder?
ANSWER
Shared folder permissions apply only when the folder is accessed over the
network. If the folder is accessed locally, the shared permissions do not
apply (but the NTFS permissions still apply).
ANSWER
4. You work for a software company that sells tax software. They have
been selling the same DOS-based application for 15 years because their
clientele is used to it and can use it very efficiently. The software was
designed before networking was available, and you need to store the
data files on a file server rather than the local machine. However, the
program will work only if the data designated by the software is stored
on the root of a drive. How can you use the file server and satisfy the
software’s requirement that it be able to store data on the root of
a drive?
ANSWER
To make the shared folder on the file server look like a local drive to the
client machine, you can map a network drive to the folder. This can be
done by selecting Map Network Drive from the Tools menu of Windows
Explorer.
1. Write a batch file named SharedFolders.bat that uses the Net Share
command to share the following folders. The share name and folder
name should be the same, and the folders should be located in
C:\Standard Shares\.
❑ Financial
❑ Marketing
❑ Support
❑ Miscellaneous
❑ Legal
❑ Customer Support
56 LAB 8 ANSWERS
TIP A batch file is text file that contains commands that are executed
one at a time as if they were being typed directly into a command-prompt
window. You can create a batch file by saving a text file as name.bat. You
can then run the batch file by entering path:name.bat at a command
prompt (for example, C:\Example.bat).
Chapter 8 of the text book covers the use of the Net Share command.
You can also get information by typing net share /? at a command
prompt or by using the Help and Support Center (searching for
Net Share).
To create a directory at the command line, use the Md command. For
example, to create the folder Standard Shares, type md “C:\Standard
Shares”. You will need to create each folder before you share it.
ANSWER
To create the batch file and run it, complete the following steps:
1. Ensure that you are logged on with your local Administrator
account.
2. From the Start menu, point to All Programs, Accessories, and
then select Notepad.
3. In Notepad, type the following code. (The @REM are comments
and will not affect the output of the program, and therefore
they do not need to be included.)
@REM Create the "Standard Shares" folder and the folders within it
md "C:\Standard Shares"
md "C:\Standard Shares\Financial"
md "C:\Standard Shares\Marketing"
md "C:\Standard Shares\Support"
md "C:\Standard Shares\Miscellaneous"
md "C:\Standard Shares\Legal"
md "C:\Standard Shares\Customer Support"
NOTE If you completed other labs, the World Wide Web Service check box
might already be selected. In this case, click Cancel.
LAB 9
SUPPORTING APPLICATIONS IN WINDOWS XP
PROFESSIONAL
GL09ht02.bmp
ANSWER
15. In the details pane, right-click drive C and select Properties, as shown
in the following figure.
GL09ht03.bmp
60 LAB 9 ANSWERS
ANSWER
No, it has only 1.57 gigabytes (GB) free, and 2 GB are required.
GL09ht04.bmp
ANSWER
ANSWER
No, Litware did not appear in the Windows Catalog. This omission does
not mean that Litware is incompatible with Windows XP; it just means
that it has not been listed in the Windows Catalog or certified by
Microsoft as compatible.
LAB 9 ANSWERS: SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL 61
You need to edit a group policy object (GPO) attached to the OU and
assign the new MSI package to the GPO. You need to edit the properties
of the MSI package distribution and on the Upgrades tab specify that
the new software is replacing the old software, and that the old software
needs to be uninstalled. Also, to make the deployment automatic, you
need to set the software to install on logon.
The Run In 640 x 480 Screen Resolution setting might fix this problem
by reducing the resolution so that the application fits in the screen
correctly.
62 LAB 9 ANSWERS
IT administration has decided that the SDP should be different from the SDP
containing the Litware software, so you will need to create a new SDP.
To complete this lab challenge, you need to perform the following steps:
ANSWER
LAB 10
CONNECTING WINDOWS XP PROFESSIONAL
TO A NETWORK
QUESTION What are the first two octets of the IP address, and what
do they tell you about the source of the IP address?
ANSWER
The first two octets are 169 and 254, which tells you that the IP address
is an APIPA-assigned address.
ANSWER
ANSWER
The preferred DNS server is not 192.168.1.200 because the value was
set statically and did not use DHCP. Therefore, it did not change. To
make this work according to the task scenario, you would have to set
the static value of the preferred DNS server address to 192.168.1.200.
However, for the purposes of the lab, leave it as is.
ANSWER
ANSWER
10.1.1.200.
Using NSlookup
2. At the command prompt, type nslookup www.microsoft.com and
press ENTER.
ANSWER
ANSWER
APIPA addresses always begin with the octets 169 and 254.
Yes, DHCP can configure many options, including DNS server addresses.
4. What command-line diagnostic used in this lab asks the DNS server to
resolve a name on to an IP address, or vice versa?
ANSWER
When you access a computer with remote assistance, the security cre-
dentials of the logged-on account on the computer serving the remote
desktop take precedence. In this case, you would have only Domain User
credentials.
However, this is not allowed by default, and you will have to configure your com-
puter to allow Remote Assistance to be offered. This can be done in a domain
through Active Directory so that each computer does not need to be configured
individually. But in this lab, you need to make the change locally through Group
Policy.
66 LAB 10 ANSWERS
ANSWER
1. Use the Repair feature in the context menu of your Local Area Connec-
tion network connection.
2. Execute all the separate commands of the Repair feature manually by
using the command prompt and the IP Protocol (TCP/IP) Properties
dialog box.
68 LAB 10 ANSWERS
ANSWER
GL10ht05.bmp
LAB 11
CONFIGURING TCP/IP ADDRESSING AND SECURITY
Creating Subnets
7. In the Internet Protocol (TCP/IP) Properties dialog box, in the IP
Address text box, in the Subnet Mask text box, type 255.255.255.252.
ANSWER
8. In the IP Address text box, for the first three octets type 192.168.0 and
enter the fourth octet according to the following table. (Ensure that
you and your partner assign consecutive fourth octets.)
QUESTION The subnet mask that you used specifies 2 bits for the host
portion of the IP address. After subtracting 2 for reserved addresses,
how many possible addresses can 2 bits represent on each subnet?
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 71
ANSWER
2 bits can represent 2n, or 22, possible addresses. However, two of these
(in binary) are 00 and 11, which are reserved. This leaves 01 and 10 (deci-
mal equivalents are 1 and 2) to represent the host addresses in each
subnet.
ANSWER
4. Find the IP address of a student who is not your partner, and ping that
IP address.
TIP When using the command prompt window, you can press the Up
Arrow key to display the previous command, and then press ENTER to exe-
cute it, or you can modify the command and then press ENTER to execute
the modified version.
QUESTION The host IP address that you specified in the Ping command
exists on the classroom network, so why does Ping give a Destination
Host Unreachable message?
ANSWER
ANSWER
ANSWER
Configuring Exceptions
ANSWER
Configuring Logging
1. In the Windows Firewall dialog box, on the Advanced tab, in the
Security Logging section, click Settings.
ANSWER
1. What is the binary equivalent of the subnet mask and the IP address
that you assigned to your computer?
ANSWER
2. Using the AND operator, use your binary IP address and subnet mask
to calculate your network address, and then convert it to decimal.
ANSWER
Fourteen hosts can exist in each subnet with a 28-bit subnet mask. The
formula is 2n – 2, where n is the number of binary digits of host address
space (32 – 28 = 4 = n).
4. You have installed Windows Firewall on your home network and want
to play a game over the local area network. You have added the game to
the exceptions list, but want to further restrict access to the computers
that will be involved specifically. How can you do this?
ANSWER
You can define the scope of the exception to include only the IP addresses
that you specify. This is done by accessing the Change Scope dialog box
(Exceptions tab of Windows Firewall | Edit | Change Scope | Custom List).
In the Log Settings dialog box (Windows Firewall | Advanced tab | Security
Logging | Settings), clear the Log Successful Connections check box, and
leave the Log Dropped Packets check box selected.
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 77
1. Subnet 192.168.2.0 into subnets that can accommodate six hosts each.
2. Join with six classmates (or however many are available), and config-
ure your TCP/IP settings to communicate on this subnet.
3. Use the Ping command to confirm that all hosts on this network can
communicate, and ensure that pings to other networks fail.
4. Restrict the file and printer sharing exception in Windows Firewall to
include only your subnet.
5. Return your system to the 10.1.1.0/24 network.
IMPORTANT If you do not complete step 5, future labs will not work
correctly.
ANSWER
You must discuss with six classmates (or fewer) which subnet in the
192.168.2.0/29 address space you want to exist, and then configure your
IP address accordingly. The options are (using the last octet): 9 through
14, 17 through 22, 25 through 30, and so on.
Once you have assigned your IP address, use the subnet mask
255.255.255.248.
Ping hosts within your IP address subnet range, as you did earlier in this
lab, to check connectivity. Also ping other classmates configured in a
different 192.168.2.0/29 subnet.
To restrict the file and printer sharing in Windows Firewall to the local
subnet:
1. In the Windows Firewall dialog box, on the Exceptions tab,
select File And Printer Sharing, and then click Edit.
2. In the Edit A Service dialog box, click Change Scope.
3. In the Change Scope dialog box, select My Network (Subnet)
Only. Click OK.
4. In the Edit A Service dialog box, click OK.
5. In the Windows Firewall dialog box, click OK.
Once you have tested your new subnet, be sure to restore the previous
TCP/IP settings to the 10.1.1.0/24 network and to disable Windows
Firewall.
78 LAB 12 ANSWERS
LAB 12
MANAGING INTERNET EXPLORER CONNECTIONS
AND SECURITY
QUESTION What are the default security levels for each Web content
zone?
ANSWER
The default security levels for the Web content zones are as follows:
■ Internet: Medium
■ Local Intranet: Medium-Low
■ Trusted Sites: Low
■ Restricted Sites: High
4. In the Security Settings dialog box, scroll until you find the entry Use
Pop-Up Blocker.
ANSWER
The default setting for the pop-up blocker in the Trusted Sites Web
content zone is Disable.
ANSWER
The two sets of cookies that are blocked at the High setting are cookies
that do not have a compact privacy policy and cookies that use person-
ally identifiable information without your explicit consent.
LAB 12 ANSWERS: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 79
2. Click Advanced.
ANSWER
You have the option to Always Allow Session Cookies. This can be a conve-
nient setting because session cookies are usually used to cache data
that you submit so that you do not have to submit it again during that
session.
ANSWER
2. List the four Web content zones in order of the least secure to the most
secure.
ANSWER
The four Web content zones in order of the least secure to the most
secure are Trusted Sites, Local Intranet, Internet, and Restricted Sites.
80 LAB 12 ANSWERS
3. What is the name of the small files that Web servers can store on your
computer to record information, and what are the two types?
ANSWER
Cookies are small files that can be stored by Web servers on clients to
store information. The two types of cookies are session and persistent.
Offline files are stored with other temporary Internet files. The Empty
Temporary Internet Files Folder When Browser Is Closed setting will delete
these files when Internet Explorer is closed.
5. A user had a hard drive that was too full. She upgraded the hard drive
to a larger size, and she says that Internet Explorer is now faster. Why
would this be?
ANSWER
You need to use Internet Explorer as an FTP client to retrieve the proofs.
3. Log on with your student account, and access the FTP site on your
partner’s computer. Retrieve the Proof1 and Proof2 text files from your
partner’s FTP site to your desktop.
ANSWER
IMPORTANT Wait until you partner has completed the previous step
before continuing.
LAB 13
MANAGING USERS AND GROUPS
ANSWER
ANSWER
The message informs you that you do not have the privilege level required
to change the system time.
ANSWER
The Shut Down option is available because when you log on to the work-
station locally, you become a part of the Interactive Users dynamic group,
which is part of the Users group, which allows you to shut down the system.
84 LAB 13 ANSWERS
ANSWER
The only available option in the Shut Down Windows dialog box is Log Off BobK.
QUESTION Why are no files saved in the SteveL folder when we have
specified that as the location for profile data for your partner’s SteveL
local account?
ANSWER
The profile is cached locally until you log off. Once SteveL logs off from your
partner’s computer, the profile will be saved to C:\Bldg1Profiles\SteveL on
your computer.
ANSWER
To add a user to a group, you may either access the user’s or the group’s
properties.
LAB 13 ANSWERS: MANAGING USERS AND GROUPS 85
To grant access to the shared resource to the eight users from dispar-
ate groups, create a new group, and give the group the Read and Write
NTFS permissions for the folder. Then add each of the users to the new
group.
3. You add a user to a group that you have created with a specific set of
rights for a new project. How can adding the user to this group affect
the user’s membership in other groups?
ANSWER
You need to configure roaming profiles, which allow you to store users’
documents and settings, including their desktops, on a file share. This
allows users to access their desktops (and other items) from any com-
puter that can access the file share where the profile is stored.
Rather than doing this manually, you have decided to create a batch file using the
Net Localgroup command.
TIP A batch file is a text file that contains commands that are exe-
cuted one at a time as if they were being typed directly into a command
prompt window. You can create a batch file by saving a text file as
name.bat. You can then run the batch file by typing path:name.bat at a
command prompt (for example, C:\Example.bat).
Chapter 13 of the textbook covers the use of the Net Localgroup
command. You can also get information by typing net localgroup /?
at a command prompt or by using the Help And Support Center
(search for Net localgroup).
ANSWER
1. Ensure that you are logged on locally with your Administrator
account.
2. From the Start menu, point to Accessories, and then select
Notepad.
3. In Notepad, type the following:
@REM Create the groups
net localgroup Management /add
net localgroup Staff /add
6. Close Notepad.
7. Open a command prompt window.
8. At the command prompt, type cd c:\ and then press ENTER.
9. At the command prompt, type Addgroups.bat and then press
ENTER. The following text is an example from Computer07 of
the results.
C:\Documents and Settings\Administrator>cd c:\
C:\>addgroups.bat
C:\>net localgroup
-------------------------------------------------------------
----
*Administrators
*Backup Operators
*Guests
*HelpServicesGroup
*Management
*Network Configuration Operators
*Power Users
*Remote Desktop Users
*Replicator
*Restricted Users
*Staff
*Users
The command completed successfully.
LAB 14
MANAGING COMPUTER SECURITY CONFIGURATION
GL14ht02.bmp
ANSWER
ANSWER
The File System node defines NTFS permissions (in this case, it contains
the default NTFS permissions for the system drive on a Microsoft Win-
dows XP system).
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 89
14. In the console tree, examine the Setup Security template node.
QUESTION In the Setup Security template, who is allowed the user right
Take Ownership Of Files Or Other Objects (Hint: User Rights Assignment
node)?
ANSWER
ANSWER
The lines of code under [Group Membership] are the lines responsible for
the fact that in the Compatws template, the Power Users group is a
restricted group. The lines read as follows:
%SceInfPowerUsers%__Memberof =
%SceInfPowerUsers%__Members =
ANSWER
The Registry or Registry Keys have more entries than any other group of
items in the Compatws security template.
QUESTION In the details pane, what does the red X flag on the Audit
Account Logon Events policy icon denote? (Hint: look at the items in the
Database Setting and Computer Setting column.)
90 LAB 14 ANSWERS
ANSWER
It denotes that the policy currently is defined both in the database and
the current configuration, but that the value is not the same.
QUESTION In the details pane, what does the green check mark flag on
the Accounts: Guest Account Status policy icon denote?
ANSWER
It denotes that the policy currently is defined both in the database and
the current configuration and that the value is the same.
ANSWER
ANSWER
The red X now marks the Removable Storage service because the policy
defined in the database was changed by the Bldg1ws security template
so that it is different from your computer’s current configuration.
QUESTION In the details pane, why is there no longer a red X flag on the
Audit Account Logon Events policy icon?
ANSWER
Because the template has been applied, and the setting in the database
is no longer different from the setting configured on the computer.
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 91
ANSWER
Secedit reported that “This will cause an error not expected in section
System Access.”
QUESTION By default, does the Audit Logon Events policy log success-
ful logons?
ANSWER
No, by default, the Audit Logon Events policy does not log successful
logons.
11. In the details pane, locate a Failure Audit with a Category of Account
Logon, as shown in the following figure. Double-click the event.
GL14ht06.bmp
ANSWER
Security templates are stored in text files with the extension .inf.
4. What are the four flags that are possible when using the Security
Configuration And Analysis snap-in, and what do they denote?
ANSWER
■ X in a red circle The policy is defined in both the database
and on the computer, and the values do not match.
■ Green check mark in a white circle The policy is defined in
both the database and on the computer, and the policies
match.
■ Question mark in a white circle The policy is not in the data-
base and therefore was not analyzed, or the user running the
analysis did not have sufficient rights to access the policy.
■ Exclamation point in a white circle The policy is defined in
the database, but does not exist on the computer.
5. You suspect that a user is logging on and trying to access network resources
that require credentials. Which auditing policy will help you to determine
if this is so, Audit Account Logon Events or Audit Logon Events?
ANSWER
The Audit Account Logon Events will help determine this. The Audit Logon
Events option audits Interactive (local) logons, and the Audit Account
Logon Events audits attempts to access network resources that require
credentials.
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 93
Once you have completed the template file, save it as Challenge.inf in the
C:\Windows\Security\Templates\Custom folder. Use the Secedit tool to validate
the file. Finally, ensure that the settings are as they should be by using the
Security Templates console that you created in Exercise 14-1.
ANSWER
[System Access]
MinimumPasswordLength = 5
PasswordHistorySize = 3
[Event Audit]
AuditPrivilegeUse = 2
[Privilege Rights]
SeRemoteShutdownPrivilege = Administrators
SeMachineAccountPrivilege = Authenticated Users
LAB 15
BACKING UP AND RESTORING SYSTEMS AND DATA
GL13ht01.bmp
QUESTION When System State is selected (the name and the check
box) in the directory tree, why are the check boxes in the detail pane
unavailable (grayed out)?
ANSWER
8. In the Options dialog box, in the Default Backup Type drop-down list,
select Differential.
NOTE You might want to select the other options and read the descrip-
tions, if you are unfamiliar with them.
ANSWER
You will have to restore two: the original normal backup and the last
differential backup.
QUESTION Given that you have selected Differential backup, what type
of backup method will be applied to the System State information?
ANSWER
17. The Backup Progress dialog box will appear and indicate progress.
This task can take anywhere from 5 minutes to 15 minutes or more.
QUESTION When the backup is under way, you might notice in the
Status text box that the message “Preparing to backup using shadow
copy” appears. What is shadow copy, and why is it being used?
ANSWER
A shadow copy is a special copy of a file. This can be useful for several
purposes, but in this context, some files cannot be backed up because
other processes are using them. By creating a shadow copy that is
not being used by other processes, the Backup utility can back up the
shadow copy rather than the real copy. When the backup and thus
the restore are performed, the shadow copy is treated as if it were the
original copy.
ANSWER
The two switches are /P and /R, which force a check on a drive not flagged
as dirty, and attempt to recover readable information on bad sectors,
respectively.
96 LAB 15 ANSWERS
When you select the System State for backup, three separate compo-
nents are backed up: Boot Files, COM+ Class Registration Database, and
the Registry.
2. What are the five backup types, and how does each relate to the archive
attribute? (Hint: The archive attribute is set to denote a file for backup
and can be cleared to mark the file as backed up. Given this informa-
tion, you can deduce the treatment of the archive attribute for each
backup type by reading its description in the Options dialog box in the
Backup utility.)
ANSWER
The five types of backups and their relationships to the archive attribute
are as follows:
■ Normal: All files are backed up that are selected, regardless of
the archive attribute. Once the files are backed up, the archive
attribute is cleared.
■ Copy: All files selected are backed up, and the archive attribute
is ignored completely.
■ Differential: Selected files with the archive attribute set
are backed up, and the archive attribute is not modified after
backup.
■ Incremental: Selected files with the archive attribute set are
backed up, and the archive attribute of the backed up files is
cleared.
■ Daily: All files created or modified during the day are backed
up. The archive attribute is not used or modified.
3. There are three options when restoring a backup set as to where the
files are to be restored. What are the options, and what do they do?
ANSWER
The three location options for restored files in the Backup utility are Orig-
inal Location, Alternate Location, and Single Folder. The first two loca-
tions do what their names imply, and they retain the original folder
structure. The Single Folder option restores all files in the backup set to
the same folder, regardless of their locations in the original directory
structure.
LAB 15 ANSWERS: BACKING UP AND RESTORING SYSTEMS AND DATA 97
4. You are about to install third-party drivers for a legacy device that does
not have signed drivers. You are suspicious of the drivers. What feature
can you use so that you can easily undo the configuration if it fails?
ANSWER
You can use the System Restore feature, by creating a system restore
point before you install the drivers. If the configuration fails, you can roll
back your system to the system restore point.
1. Create a backup job that creates a backup file named Backup.bkf to the
L drive every Thursday at 3 A.M., starting with January 1, 2004.
2. The backup job should not run unless the computer has been idle for
more than 10 minutes so that if a user is putting in a late night, he will
not be interrupted by a backup job.
3. The backup should be of type Normal so that a full data set is created
at each backup session.
ANSWER
LAB 16
MANAGING PERFORMANCE
GL16ht04.bmp
QUESTION What two system resources were taxed the most during the
backup according to your data?
ANSWER
The % Disk Write Time and the % Processor Time counters indicated
that the physical disk and the processor were the most taxed resources
during the backup. The memory might have been taxed, depending on your
system.
ANSWER
ANSWER
The size of the file is now static, so it is 1024 MB, or 1 GB (or whatever
value you set it to if you did not have 1024 MB available disk space).
You can schedule the creation of a counter log, and add any counters
that you wish to monitor to the log.
4. In what log does Event Viewer store log entries created by the Perfor-
mance console Alert function?
ANSWER
Alert log entries are stored in the Application log in Event Viewer.
LAB 16 ANSWERS: MANAGING PERFORMANCE 101
5. A user is running out of space on drive C. What is the name of the file
that acts as memory for the computer you can move to mitigate the
problem, and where do you configure its location?
ANSWER
ANSWER
1. Open the Performance console.
2. In the Performance console, in the console tree, expand Perfor-
mance Logs And Alerts and then select Counter Logs.
3. From the Action menu, select New Log Settings.
4. In the New Log Settings dialog box, in the Name text box, type
ComputerxxPLog and then press ENTER.
5. In the ComputerxxPLog dialog box, click Add Counters.
6. Add the following counters:
❑ % Processor Time (processor object)
❑ Pages/Sec (memory object)
❑ Avg. Disk Queue Length (physical disk object)
❑ % Disk Time (physical disk object)
7. In the Add Counters dialog box, click Close.
102 LAB 16 ANSWERS