Nothing Special   »   [go: up one dir, main page]

70-270 LabManualAnswers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 102

LAB 1 ANSWERS 1

LAB 1
SIMPLE INSTALLATION OPTIONS

EXERCISE 1-1: INSTALLING AND ACTIVATING


MICROSOFT WINDOWS XP PROFESSIONAL MANUALLY
4. The END-USER LICENSE AGREEMENT FOR MICROSOFT SOFT-
WARE page appears. Read the agreement and answer the following
questions.

QUESTION What is the maximum number of processors that are


licensed to use Windows XP Professional at a time on a single work-
station?

ANSWER

Only two processors are licensed to use Windows XP Professional at a


time on a single workstation.

QUESTION How many days do you have to activate the software after
it has been installed (assuming that you are not using a Volume Licensing
Product Key [VLK], which precludes activation)?

ANSWER

After Windows XP Professional has been installed, you have 30 days to


activate it. This can be done over the Internet or by phone.

QUESTION If you upgrade from Windows 2000 Professional to Windows


XP Professional, can you still use Windows 2000 Professional on another
workstation or as a dual boot option on the same workstation?

ANSWER

According to Section 9 of the license agreement, once you upgrade, you


are no longer eligible to use the product from which you upgraded.
2 LAB 1

11. Verify that Format The Partition Using The NTFS File System or Format
The Partition Using The NTFS File System (Quick) is selected, according
to your instructor, and then press ENTER.

NOTE Using the Quick option is substantially faster. However, that


option is not recommended unless you are sure of the health of the hard
drive. Using the normal format option can reveal a number of problems
that the hard drive might have, and it is strongly recommended in a real-
world environment. In this case, however, your instructor might want you
to use the Quick option to save time.

QUESTION What formatting options are available in Windows XP Pro-


fessional Setup?

ANSWER

There are four formatting options available, two for NTFS and two for
FAT. You can also choose Quick for each. The FAT option actually formats
the hard drive using FAT32, which is an upgrade over the old 16-bit FAT
file system. NTFS is a more secure and robust file system, and it is
strongly recommended that all Windows XP installations use NTFS unless
there is a compelling reason to use FAT.

EXERCISE 1-2: TAKING THE TOUR


4. On the Windows XP Basics page, click each of the icons on the left, as
seen in the following figure.

L01ht01.bmp
LAB 1 ANSWERS 3

QUESTION What does clicking on each of the icons do?

ANSWER

Clicking on each of the icons summons an image of the item being used.
There is no explanatory text.

EXERCISE 1-3: USING THE HELP AND SUPPORT CENTER

Using the Pick A Help Topic Feature


5. On the Getting Older Programs To Run On Windows XP page, read
the introductory section.

QUESTION What two options are suggested to get programs written


for older versions of Windows to run properly?

ANSWER

The two options suggested to run programs written for older versions of
Windows to run properly are
1. Run the Program Compatibility Wizard, or set compatibility
settings manually.
2. Update your program, drivers, or hardware.

Using Search
3. In the Search Results pane, click Getting Older Programs To Run On
Windows XP.

QUESTION What is different about the text presented as a result of


the search compared with the text displayed as a result of navigating to
the same document using hyperlinks?

ANSWER

When search is used, the search string elements are highlighted in the
text.
4 LAB 1

Using the Pick A Task Feature


8. The My Computer Information – General page will appear, and your
computer will be probed for information.

QUESTION From the information on the My Computer Information –


General page, what IPX address is your computer assigned?

ANSWER

No IPX address is assigned, because the IPX protocol is not installed.

LAB REVIEW QUESTIONS


1. If your computer is not able to boot from CD-ROM, what should you
do to install Windows XP from CD-ROM, assuming that no operating
system is currently installed?
ANSWER

The following readeraid is part of the list. If you cannot boot from the
CD-ROM drive, and no operating system is currently installed, you should
boot from a floppy system disk or other device that provides CD-ROM
drive support, and then run Winnt32.exe, which is located in the I386
folder on the Windows XP Professional Installation CD.

2. During manual installation of Windows XP Professional you are asked


if you want to use typical or custom network settings. If you do not use
custom settings, will an IP address be configured?
ANSWER

Yes, an IP address will be configured when you use typical settings. First,
your computer will attempt to contact a DHCP server and request an IP
address from it. If that fails, your computer will be assigned an address
by Automatic Private IP Addressing (APIPA), which will begin with the
octets 169.254.

3. In previous versions of Microsoft Windows, the area on the right end


of the taskbar was called the system tray. What is the new name accord-
ing to the Windows XP Basics section of the tour?
ANSWER

The new name for the system tray is the notification area.
LAB 1 ANSWERS 5

4. According to the Windows XP Basics section of the tour, where should


you go to handle many system tasks, such as configuring User
Accounts?
ANSWER

The tour recommends that you configure many system settings through
Control Panel.

5. According to the Connected Home And Office section of the tour, can
multiple user accounts be active simultaneously?
ANSWER

Yes, in Windows XP, multiple user accounts can be active at the same
time. For example, while one user is logged on, another user’s account
could download e-mail messages in Microsoft Outlook.

6. What feature in Windows XP offers the user help on many tasks and
problems?
ANSWER

The Help And Support Center, which can be accessed by selecting Help
And Support from the Start menu. It can also be launched by pressing F1
while the desktop is active.
LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 6

LAB 2
ADVANCED INSTALLATION OPTIONS

EXERCISE 2-1: CREATING AN UNATTENDED ANSWER


FILE USING SETUP MANAGER
11. On the Type Of Setup page, ensure that Unattended Setup is selected
and then click Next. On the Product To Install page, ensure that Win-
dows Unattended Installation is selected. Click Next.

QUESTION What are the three types of setup that Setup Manager
offers, and what is each for? (Hint: you can use the Help files that you
extracted from the Deploy cabinet file to find the answer.)

ANSWER

The three types are


■ Unattended Setup Creates an answer file that provides
answers to Windows Setup so that you don’t have to.
■ Sysprep Setup Creates an answer file for a setup mode
named Mini-Setup. This option is used when the deployment is
being performed by applying an image to the target comput-
ers’ hard drives with an image created on a computer with sim-
ilar hardware (to the target computers’ hardware) and a fully
deployed Windows installation. This is the most efficient
method of deploying Windows XP to many computers.
■ Remote Installation Services (RIS) Creates an answer file
that is used in a setup that uses RIS. The RIS server provides
the installation files to a remote installation client on the tar-
get computer, which can use an answer file to make the RIS
installation unattended.
46. Windows Setup Manager created a batch file on your desktop named
Unattend.bat. Right-click the file, and select Edit. Assuming that your
CD-ROM drive is drive D, it should look like the following:
@rem SetupMgrTag
@echo off

rem
rem This is a SAMPLE batch script generated by Setup Manager Wizard.
rem If this script is moved from the location where it was generated, it
may have to be modified.
rem
set AnswerFile=.\unattend.txt
7 LAB 2

set SetupFiles=D:\i386

D:\i386\winnt32 /s:%SetupFiles% /unattend:%AnswerFile%

QUESTION The batch file contains the following command, which


launches Winnt32.exe (Windows Setup):
D:\i386\winnt32 /s:%SetupFiles% /unattend:%AnswerFile%

From what you can see in the batch file, make an educated guess as to what the
/s and /unattend parameters specify.

ANSWER

The /s parameter specifies the location of the Windows Setup files, and
the /unattend parameter specifies an answer file to be used by Windows
Setup.

EXERCISE 2-3: UPDATING WINDOWS XP

Determining the Service Pack


2. In the Computer Properties dialog box, ensure that the General tab is
selected.

QUESTION According to the System Properties dialog box, what ser-


vice pack is installed?

ANSWER

Service Pack 2 is installed, as indicated in the System section of the


System Properties dialog box, in the General tab.

EXERCISE 2-5: VIEWING THE INSTALLATION LOGS


4. In the Good folder, double-click the Setuperr.log document to open it.

QUESTION What is contained in the good Setuperr.log file?

ANSWER

Nothing. The Setuperr.log file from the good installation contains no


entries.

7. Open the Setuperr.log file.


LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 8

QUESTION Error 126 is returned by the LoadLibrary frequently in this


log. What does error 126 indicate, according to the log file?

ANSWER

Error 126 returned by the LoadLibrary means that the specified module
could not be found.

13. In the Good folder, open Setupact.log.

QUESTION When do you think the Setupact.log file is created during


setup? (Hint: look at the first line.)

ANSWER

The Setupact.log file is created at the beginning of the GUI phase of


setup.

15. In the Find dialog box, in the Find What text box, type system stabil-
ity. Click Find Next.

QUESTION Did the line This file may be necessary to maintain


system stability appear in the log file, as it did in the corresponding bad
log file many times?

ANSWER

No, the line This file may be necessary to maintain system stabil-
ity does not appear in the good log file Setupact.log.

NOTE With all the errors recorded in the logs about setup, it would be
mandatory to redo the installation in this instance.
In actuality, the computer with the bad install seemed stable in moderate
testing. However, it used the old Windows 2000–style user interface
instead of the Windows XP interface. It also claimed that it had Service
Pack 1 installed in the System Properties dialog box, when the service
pack was actually only partially installed.
The errors during installation were created by removing the installa-
tion CD during the GUI phase of setup, about halfway through. At
this point, most installation files had been cached, so installation
did not fail entirely. When setup complained that some files were
needed, the Cancel button was clicked.
9 LAB 2

LAB REVIEW QUESTIONS


Estimated completion time: 15 minutes
1. In this lab, you used Windows Setup Manager to create an unattended
answer file for Windows XP Professional. Does Windows Setup Manager
also support Windows XP Home Edition?
ANSWER

Yes, Windows Setup Manager supports both Windows XP Professional and


Windows XP Home Edition.

2. You are creating an answer file for unattended setup using Windows
Setup Manager. What type of user interaction should you choose if you
want the end user to be able to see the options specified in the answer
file but not be able to change them?
ANSWER

Read Only. The Read Only user interaction option provides all the answers
in the answer file, and the end user can see the options but cannot
change them.

3. When creating an unattended answer file using Windows Setup Man-


ager, the user is solicited for a password for the Administrator account.
What protection is offered in the user interface against this password
being compromised?
ANSWER

Windows Setup Manager allows you to encrypt the password in the


answer file by selecting the Encrypt The Administrator Password In The
Answer File check box.

4. The beginning of Exercise 2-2 instructed you to rename the Unat-


tended.txt file to Winnt.sif. What is the point of renaming this file?
ANSWER

When launching Windows Setup by booting from the installation CD,


Setup checks to see if an answer file named Winnt.sif (.sif stands for
setup installation file) is on drive A. The file must be named Winnt.sif or it
will not be used. Alternatively, if you start Winnt32.exe (Windows Setup)
manually, you can specify any file as an answer file using the /unattend
parameter.
LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 10

5. What log file logs the errors during installation of Windows XP?
ANSWER

The Setuperr.log file logs errors during installation of Windows XP.

6. Where are the setup installation logs stored? (Hint: use Search from
the Start menu, and search for Setuperr.log.)
ANSWER

The setup log files are stored in the C:\Windows folder or, more generally,
the %windir% folder.
LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 11

LAB 3
MANAGING DISKS AND FILE SYSTEMS

EXERCISE 3-1: FORMATTING A PARTITION


12. On the Select Partition Type page, ensure that Primary Partition is
selected, read the description provided, and then click Next.

QUESTION How many primary partitions can a basic disk contain?

ANSWER

A basic disk can contain four primary partitions, or three primary parti-
tions and one extended partition.

EXERCISE 3-2: CONVERTING FAT32 PARTITIONS TO


NTFS
10. In the Computer Management console, in the graphical view pane,
right-click the DATA (L:) partition and then select Open.

QUESTION Did the data on the partition survive the conversion from
FAT32 to NTFS?

ANSWER

Yes. Converting from FAT32 or FAT to NTFS does not cause data loss.
However, before making any fundamental changes to a hard drive, it is
recommended that you back up any important data.

EXERCISE 3-3: CONVERTING A BASIC DISK TO A


DYNAMIC DISK
13. In the Disk Management message box, click Yes to reconnect.

QUESTION In the graphical view pane, what word has changed in the
Disk 0 graphical representation?

ANSWER

The description under the label Disk 0 has changed from Basic to
Dynamic.
12 LAB 3 ANSWERS

EXERCISE 3-4: EXAMINING DRIVE PROPERTIES


4. Click the Volumes tab.

QUESTION How many volumes are on Drive 0?

ANSWER

There are two volumes on Drive 0; C and L (DATA).

EXERCISE 3-5: USING NTFS COMPRESSION


8. In the Brochure Images Properties dialog box, click OK.

QUESTION What color is the font for the Brochure Images folder?

ANSWER

The font is blue, which is the default color for compressed files or folders.

16. In the Shared Documents folder, right-click Picture1.bmp and then


select Properties.

QUESTION How large is the Picture1.bmp file on the disk?

ANSWER

The file is 12 MB on the disk.

20. In the Brochure Images folder, right-click Picture1.bmp and then select
Properties.

QUESTION The image file has been moved into a folder using NTFS com-
pression. Why isn’t the file any smaller?

ANSWER

Uncompressed files moved into an NTFS compressed folder do not inherit


the NTFS compression.

28. Right-click Picture1.bmp, and then select Properties.


LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 13

QUESTION What is the size on disk of the Picure1.bmp file now?

ANSWER

It is smaller than 12 MB, about 722 kilobytes (KB).

QUESTION Why did the file shrink, when it remained full size when it was
moved?

ANSWER

Files that are copied into a compressed folder inherit the compressed
attribute.

EXERCISE 3-6: USING EFS ENCRYPTION


6. Click OK in the Sensitive Data Properties dialog box.

QUESTION What color is the font used for the Sensitive Data folder?

ANSWER

The color is green, which is the default color for encrypted folders or files.

14. Open the Sensitive Text.txt text file.

QUESTION Can you read the Sensitive Text.txt file?

ANSWER

Yes, the Sensitive Text.txt file is readable.

29. In the Sensitive Data folder, open Sensitive Text.txt.

QUESTION What occurs when you try to open the Sensitive Text.txt
file?

ANSWER

You are informed in a Notepad message box that access is denied.


14 LAB 3 ANSWERS

LAB REVIEW QUESTIONS


Estimated completion time: 15 minutes
1. What formatting file system options does Windows XP offer for hard
drives using basic disks?
ANSWER

Fat 32 and NTFS.

2. When you converted the disk on your partner’s computer to a dynamic


disk, what type of volumes were created from the existing primary
partitions?
ANSWER

The primary partitions are automatically converted into simple volumes


during the conversion.

3. Once you instruct Windows to convert a basic disk to a dynamic disk,


you are warned that you will no longer be able to do what on any vol-
umes on the converted disk?
ANSWER

Windows warns that you will not be able to start other installed operat-
ing systems from any of the volumes on the disk.

4. What happens when you move an unencrypted and uncompressed file


into an EFS encrypted folder or to an NTFS compressed folder?
ANSWER

A file moved into a compressed folder from the same NTFS volume
remains uncompressed, whereas a file moved into a compressed folder
from a different NTFS volume becomes compressed. A file moved from any
NTFS volume into an encrypted folder becomes encrypted.

5. What happens when you lose or remove a certificate issued for EFS?
ANSWER

You cannot decipher EFS-encrypted data without the corresponding


certificate. If you lose the certificate for some reason, you will need a
data recovery agent to recover the data.
LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 15

6. When specifying disk quotas, for which two events can you enable
logging?
ANSWER

You can log an event when the warning level of the quota is exceeded or
when the user exceeds the limit.

LAB CHALLENGE 3-1: USING DISK TOOLS


You are working at the corporate help desk at Contoso, supporting users by
phone. You have a user that complains that it seems to take longer to load large
Microsoft Excel files than it used to on his computer. He also reports that he
received an error while trying to load an Excel file the other day, but when he
rebooted, it loaded fine.

He has plenty of empty space on his hard drive. You ask him if he has ever defrag-
mented his hard drive, and he says that he has not. You have him print a report of
the fragmentation status of his hard drive, and this is what it says:

Volume Data (D:)


Volume size = 49.34 GB
Cluster size = 4 KB
Used space = 16.64 GB
Free space = 32.71 GB
Percent free space = 66 %

Volume fragmentation
Total fragmentation = 46 %
File fragmentation = 92 %
Free space fragmentation = 0 %

File fragmentation
Total files = 8,222
Average file size = 3 MB
Total fragmented files = 2,208
Total excess fragments = 20,280
Average fragments per file = 3.46

Pagefile fragmentation
Pagefile size = 0 bytes
Total fragments = 0

Folder fragmentation
Total folders = 756
Fragmented folders = 28
Excess folder fragments = 222

Master File Table (MFT) fragmentation


Total MFT size = 22 MB
MFT record count = 9,005
Percent MFT in use = 39 %
Total MFT fragments = 3
16 LAB 3 ANSWERS

--------------------------------------------------------------------------------
Fragments File Size Most fragmented files
848 83 MB \User Data\Owen\Documents\Work\als-272\
year_end_data.xls
251 50 MB \User Data\Owen\Documents\War of the Species
Project\Rhino Models\Deer\tutorial\Financial_projections.xls
134 536 KB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006069.cpl
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004549.cpl
100 6 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008065.cpl
86 6 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\8\ch08da_p1.pdf
86 5 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\2\ch02da_p1.pdf
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006180.msi
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008486.msi
83 164 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008176.msi
75 5 MB \System Volume Information\_restore
{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021414.exe
69 35 MB \User Data\Owen\Documents\War of the Species
Project\New Folder (3)\dragon 002.3dm
68 4 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\4\ch04da_p1.pdf
60 4 MB \User Data\Owen\Documents\Work\als-296\
grouppolwp.doc
60 23 MB \User Data\Owen\Documents\War of the Species
Project\Rhino Models\elephant\Elephant 3-xxx.3dm
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006167.dll
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008473.dll
59 4 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\6\ch06da_p1.pdf
59 4 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008163.dll
58 4 MB \System Volume Information\_restore
{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021415.dll
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006078.exe
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004558.exe
55 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008074.exe
54 3 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\10\ch10da_p1.pdf
51 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0005236.dll
51 3 MB \System Volume Information\_restore
{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0006948.dll
51 3 MB \User Data\Owen\Documents\Work\als-296\
Labs\11\WinXP\Display\nv4_disp.dll
50 3 MB \User Data\Owen\Documents\Work\als-272\
Pages Reviews\5\ch05da_p1.pdf
49 3 MB \User Data\Owen\Documents\Work\als-296\
Labs\11\WinXP\AudioUtl\SSWAV06.WAV
LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 17

QUESTION Excel files use the .xls extension. Of how many fragments
are the two .xls files in the Most Fragmented Files list composed?

ANSWER

The year_end_data.xls file is separated into 848 fragments, and the


Financial_projections.xls file is divided into 251 fragments.

QUESTION What is the fragmentation percentage of all files on the


volume?

ANSWER

The file fragmentation percentage is 92 percent.

After looking at the fragmentation status of his hard drive, you decide to run
Chdsk first and then perform a defragmentation of his hard drive.

To complete this lab challenge, you must do the following:

1. Run Chdsk on drive D.


2. Output fragmentation information on drive D to a file on your desktop,
and view the information.
3. Defragment drive D.

ANSWER

To complete the lab challenge, follow these steps:


1. Log on with your local Administrator account. (The password
is P@ssw0rd.)
2. From the Start menu, select My Computer.
3. In the My Computer dialog box, right-click DATA (L:) and then
select Properties.
4. In the DATA (L:) Properties dialog box, in the Tools tab, click
Check Now.
5. In the Check Disk Data (L:) dialog box, select the Automati-
cally Fix File System Errors check box.
6. Select the Scan For And Attempt Recovery Of Bad Sectors
check box. Click Start.
NOTE Selecting the Scan For And Attempt Recovery Of Bad Sectors
check box can make this procedure take considerably longer, depending on
the size of the volume. Your instructor might tell you to leave this check
box cleared if you are short on time.
18 LAB 3 ANSWERS

7. In the Checking Disk DATA (L:) message box, click OK.


8. In the DATA (L:) Properties dialog box, click Defragment Now.
9. In the Disk Defragmenter window, ensure that DATA (L:) is
selected and click Analyze.
10. In the Disk Defragmenter message box, click View Report.
11. In the Analysis Report dialog box, click Save As.
12. In the Save Defragmentation Report dialog box, in the naviga-
tion pane on the left, click Desktop. Click Save.
13. In the Analysis Report dialog box, click Close.
14. In the Disk Defragmenter window, click Defragment.
15. In the Disk Defragmenter message box, click Close.
NOTE Because the DATA (L:) drive was not fragmented, defragmenta-
tion went very quickly. Defragmenting a large, fragmented drive can take
many hours.

16. Close all open Windows.


17. On the Desktop, double-click VolumeL.txt.
18. Look over the VolumeL.txt document, and then close it.
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 19

LAB 4
MANAGING DEVICES AND PERIPHERALS

EXERCISE 4-1: INSTALLING HARDWARE


AUTOMATICALLY USING THE ADD HARDWARE WIZARD

Adding a Hardware Device Using the Add


Hardware Wizard
4. Restore the Device Manager window.

QUESTION Has the Floppy Disk Drive device been restored in the Device
Manager tree?

ANSWER

Yes, the floppy disk drive device has been restored in the Device Manager
tree.

EXERCISE 4-2: INSTALLING HARDWARE MANUALLY


USING THE ADD HARDWARE WIZARD
11. Restore the Device Manager window.

QUESTION In the device tree, what device exists under Modems?

ANSWER

A Standard 56000 bps Modem exists under the Modems node in the
device tree.

EXERCISE 4-3: EXAMINING HARDWARE RESOURCES IN


DEVICE MANAGER

Examining Devices by Type


3. In the Mouse Properties page, click the Resources tab.

QUESTION What resources does the mouse use?


20 LAB 4 ANSWERS

ANSWER

The mouse generally uses IRQ 12. Answers may vary.

6. In the Keyboard Properties dialog box, click the Resources tab.

QUESTION What resources does your keyboard use?

ANSWER

The standard resources for a PS/2 keyboard are I/O Ranges of 0060 and
0064 (for which the ranges are listed as 0060 – 0060 and 0064 –
0064, but this just means that one value defines the range), and an IRQ
of 01. Answers may vary.

8. Examine the resources for your floppy disk controller, and answer the
following question:

QUESTION What resources does your floppy disk controller use?

ANSWER

The floppy disk controller uses I/O Ranges 03F0 – 03F5 and 03F7, IRQ 6,
and DMA 2. (Answers may vary.)

9. Examine the resources for your network adapter, and answer the
following question:

QUESTION What resource type does your network adapter use that
the other devices we have examined did not use?

ANSWER

The network adapter uses memory. The memory resource is represented


as a range (Memory Range) in hexadecimal that denotes a contiguous
section of random access memory (RAM) that is reserved for use by the
device.
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 21

Examining Resources by Type and Connection


2. Expand Interrupt Request (IRQ), as shown in the following figure:

GL04ht04.bmp

QUESTION Assuming the computer from which the preceding image


was captured is correctly configured, can a PCI IRQ be used by more than
one device?

ANSWER

Yes, PCI IRQs can be used by more than one device. Therefore, a double
entry for a PCI IRQ is not necessarily indicative of a conflict. However, ISA
(Industry Standard Architecture) IRQs can only handle a single device,
and so a double entry for an ISA IRQ would indicate an IRQ conflict.

EXERCISE 4-4: PRINTING DEVICE MANAGER DATA


TO A TEXT FILE

Printing Device Manager Summary Data


9. In the Run dialog box, in the Open text box, type Notepad
C:\DevicesSummary.txt and then press ENTER. The text within
Notepad will be similar to the following sample output.
Resource Summary Report - Page: 1

******************** SYSTEM SUMMARY ********************

Windows Version: Windows 5.1 Service Pack 2 (Build 2600)


Registered Owner: Student08
Registered Organization: Classroom
Computer Name: COMPUTER08
Machine Type: AT/AT COMPATIBLE
22 LAB 4 ANSWERS

System BIOS Version: Nvidia - 42302e31


System BIOS Date: 05/02/03
Processor Type: x86 Family 6 Model 10 Stepping 0
Processor Vendor: AuthenticAMD
Number of Processors: 1
Physical Memory: 1024 MB

******************** DISK DRIVE INFO ********************

Drive A:
Type: 3.5" 1.44MB floppy disk drive
Total Space: 1,474,560 bytes
Heads: 2
Cylinders: 80
Sectors Per Track: 18
Bytes Per Sector: 512

Drive C:
Type: Fixed disk drive
Total Space: 27,036,459,008 bytes
Free Space: 8,034,979,840 bytes
Heads: 255
Cylinders: 9729
Sectors Per Track: 63
Bytes Per Sector: 512

Drive D:
Type: CD-ROM drive
Total Space: 557,842,432 bytes

Drive L:
Type: Fixed disk drive
Total Space: 52,979,023,872 bytes
Free Space: 34,936,680,448 bytes
Heads: 255
Cylinders: 9729
Sectors Per Track: 63
Bytes Per Sector: 512

******************** IRQ SUMMARY ********************

IRQ Usage Summary:


(ISA) 0 System timer
(ISA) 1 Standard 101/102-Key or Microsoft Natural PS/2 Keyboard
(ISA) 4 Communications Port (COM1)
(ISA) 6 Standard floppy disk controller
(ISA) 8 System CMOS/real time clock
(ISA) 9 Microsoft ACPI-Compliant System
(PCI) 11 NVIDIA nForce PCI System Management
(ISA) 12 PS/2 Compatible Mouse
(ISA) 13 Numeric data processor
(ISA) 14 Primary IDE Channel
(ISA) 15 Secondary IDE Channel
(PCI) 18 Realtek RTL8139 Family PCI Fast Ethernet NIC
(PCI) 19 NVIDIA GeForce FX 5200
(PCI) 20 Standard Enhanced PCI to USB Host Controller
(PCI) 20 NVIDIA(R) nForce(TM) Audio Codec Interface
(PCI) 21 Standard OpenHCD USB Host Controller
(PCI) 22 Standard OpenHCD USB Host Controller
(PCI) 22 NVIDIA(R) nForce(TM) MCP Audio Processing Unit
(Dolby(R) Digital
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 23

******************** DMA USAGE SUMMARY ********************

DMA Usage Summary:


2 Standard floppy disk controller
4 Direct memory access controller

******************** MEMORY SUMMARY ********************

Resource Summary Report - Page: 2

Memory Usage Summary:


[000A0000 - 000BFFFF] PCI bus
[000A0000 - 000BFFFF] NVIDIA nForce2 AGP Host to PCI Bridge
[000A0000 - 000BFFFF] NVIDIA GeForce FX 5200
[000C0000 - 000DFFFF] PCI bus
[40000000 - FEBFFFFF] PCI bus
[D0000000 - D7FFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge
[D0000000 - D7FFFFFF] NVIDIA GeForce FX 5200
[D8000000 - DBFFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge
[DC000000 - DDFFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge
[DC000000 - DCFFFFFF] NVIDIA GeForce FX 5200
[DE000000 - DFFFFFFF] PCI standard PCI-to-PCI bridge
[DF000000 - DF0000FF] Realtek RTL8139 Family PCI Fast Ethernet NIC
[E0000000 - E007FFFF] NVIDIA(R) nForce(TM) MCP Audio Processing Unit (Dol
[E0080000 - E0080FFF] Standard OpenHCD USB Host Controller
[E0081000 - E0081FFF] NVIDIA(R) nForce(TM) Audio Codec Interface
[E0083000 - E0083FFF] Standard OpenHCD USB Host Controller
[E0084000 - E00840FF] Standard Enhanced PCI to USB Host Controller

******************** IO PORT SUMMARY ********************

I/O Ports Usage Summary:


[00000000 - 00000CF7] PCI bus
[00000000 - 0000000F] Direct memory access controller
[00000010 - 0000001F] Motherboard resources
[00000020 - 00000021] Programmable interrupt controller
[00000022 - 0000003F] Motherboard resources
[00000040 - 00000043] System timer
[00000044 - 0000005F] Motherboard resources
[00000060 - 00000060] Standard 101/102-Key or Microsoft Natural PS/2 Keyb
[00000061 - 00000061] System speaker
[00000062 - 00000063] Motherboard resources
[00000064 - 00000064] Standard 101/102-Key or Microsoft Natural PS/2 Keyb
[00000065 - 0000006F] Motherboard resources
[00000070 - 00000073] System CMOS/real time clock
[00000074 - 0000007F] Motherboard resources
[00000080 - 00000090] Direct memory access controller
[00000091 - 00000093] Motherboard resources
[00000094 - 0000009F] Direct memory access controller
[000000A0 - 000000A1] Programmable interrupt controller
[000000A2 - 000000BF] Motherboard resources
[000000C0 - 000000DF] Direct memory access controller
[000000E0 - 000000EF] Motherboard resources
[000000F0 - 000000FF] Numeric data processor
[00000170 - 00000177] Secondary IDE Channel
[000001F0 - 000001F7] Primary IDE Channel
[00000274 - 00000277] ISAPNP Read Data Port
[00000279 - 00000279] ISAPNP Read Data Port
[00000290 - 00000297] Motherboard resources
[00000376 - 00000376] Secondary IDE Channel
[00000378 - 0000037F] Printer Port (LPT1)
24 LAB 4 ANSWERS

[000003B0 - 000003BB] NVIDIA nForce2 AGP Host to PCI Bridge


[000003B0 - 000003BB] NVIDIA GeForce FX 5200
[000003C0 - 000003DF] NVIDIA nForce2 AGP Host to PCI Bridge
[000003C0 - 000003DF] NVIDIA GeForce FX 5200
[000003F0 - 000003F5] Standard floppy disk controller
[000003F6 - 000003F6] Primary IDE Channel
[000003F7 - 000003F7] Standard floppy disk controller

Resource Summary Report - Page: 3

[000003F8 - 000003FF] Communications Port (COM1)


[000004D0 - 000004D1] Motherboard resources
[00000800 - 00000805] Motherboard resources
[00000A79 - 00000A79] ISAPNP Read Data Port
[00000D00 - 0000FFFF] PCI bus
[00004000 - 0000407F] Motherboard resources
[00004080 - 000040FF] Motherboard resources
[00004200 - 0000427F] Motherboard resources
[00004280 - 000042FF] Motherboard resources
[00004400 - 0000447F] Motherboard resources
[00004480 - 000044FF] Motherboard resources
[00005000 - 0000503F] Motherboard resources
[00005100 - 0000513F] Motherboard resources
[0000C000 - 0000CFFF] PCI standard PCI-to-PCI bridge
[0000C000 - 0000C0FF] Realtek RTL8139 Family PCI Fast Ethernet NIC
[0000D400 - 0000D4FF] NVIDIA(R) nForce(TM) Audio Codec Interface
[0000D800 - 0000D87F] NVIDIA(R) nForce(TM) Audio Codec Interface
[0000E400 - 0000E41F] NVIDIA nForce PCI System Management
[0000F000 - 0000F00F] Standard Dual Channel PCI IDE Controller

NOTE Answer the following questions according to the preceding


sample output. (Do not use the file that you created.)

QUESTION What two devices share IRQ 22?

ANSWER

The Standard OpenHCD USB Host Controller and the NVIDIA nForce MCP
Audio Processing Unit share IRQ 22.

QUESTION What two controllers use a DMA channel?

ANSWER

The Standard Floppy Disk Controller and the Direct Memory Access Con-
troller each use a DMA channel.

QUESTION What memory range is the graphics adapter assigned


(Nvidia GeForce FX 5200)?

ANSWER
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 25

The graphics adapter is assigned the memory range DC000000 –


DCFFFFFF.

EXERCISE 4-6: VIEWING A CONFLICT WARNING IN


DEVICE MANAGER

Viewing the Conflict in Device Manager


2. Open Device Manager.

QUESTION What does the flag that is attached to the Communica-


tions Port (COM1) device look like?

ANSWER

The Communications Port (COM1) device is marked with a warning flag (a


yellow disk containing a black exclamation point). When it is opened (or
refreshed), Device Manager automatically expands all nodes that contain
devices that are flagged.

6. In the Communications Port (COM1) dialog box, click the Resources tab.

QUESTION What information concerning the resource settings is


conveyed on the Resources tab?

ANSWER

The Resources tab indicates that the device cannot find enough free
resources, and that to use the device, you will need to disable one of the
other devices on the system.

LAB REVIEW QUESTIONS


Estimated completion time: 15 minutes
1. What is the easiest and most common way to add hardware to a
computer?
ANSWER

The Add Hardware Wizard, accessed through Control Panel, is the most
common and easiest way to add a hardware device (although most mod-
ern devices are automatically detected and installed by Windows XP).
26 LAB 4 ANSWERS

2. What are the four view types offered in Device Manager?


ANSWER

The four view types offered in Device Manager are Devices By Type, Devices
By Connection, Resources By Type, and Resources By Connection.

3. What are the six summaries that a Device Manager System Summary
printout is divided into?
ANSWER

When you print a Device Manager System Summary, it is divided into the
following six summaries: System Summary, Disk Drive Info, IRQ Summary,
DMA Usage Summary, Memory Summary, and IO Port Summary.

4. In Device Manager, when viewing devices by type, devices are con-


tained under nodes denoting the device type. According to the printed
output from Device Manager, what are these groupings by type of
devices called?
ANSWER

Devices are grouped into classes. For example, the COM1 port is part of
the class Ports (COM & LPT).

5. What is the feature of Windows XP that allows a user to create and


start different sets of hardware configuration settings?
ANSWER

Hardware Profiles allow the creation and selection at startup of different


sets of hardware configurations.

LAB CHALLENGE 4-1: UNDERSTANDING HEXADECIMAL


MEMORY RANGES
Contoso has hired an engineering firm to create an electronic device that helps to
record and collect data at car accident sites. The data can then be downloaded to
a computer via the USB port. The device is nearly finished, and they want to beta
test it at Contoso. Part of the testing is to ensure that the device drivers are work-
ing properly, and they have asked a technician at Contoso (you) to install the
device on various computers and record the memory location used by the driver.
They explain a little bit about what they need the data for, and ask you if you
understand hexadecimal. You say that you don’t, but resolve to understand it bet-
ter so that you can better understand what you are doing for the engineering con-
sultants.
LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 27

Hexadecimal is a base-16 numbering system, just as decimal is a base-10 number-


ing system. Decimal uses the symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 to represent the
values 0 through 9, and similarly, hexadecimal uses the symbols 0, 1, 2, 3, 4, 5, 6,
7, 8, 9, A, B, C, D, E, and F to represent the values 0 through 15. This is summa-
rized in the following chart.

Hexadecimal
Digit 0 1 2 3 4 5 6 7 8 9 A B C D E F
Decimal Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

The decimal (base-10) number 1,583 can be broken down as follows:

3 * 100 +
8 * 101 +
5 * 102 +
1 * 103,

which equals 3 + 80 + 500 + 1000, or 1,583.

The same can be done in hexadecimal, but using 16s (because it is base 16)
instead of 10s. For example, the number D93E would be:

E * 160 +
3 * 161 +
9 * 162 +
D * 163

which equals (14 * 1) + (3 * 16) + (9 * 256) + (13 * 4096), or 55,614.

After installing the new device on the first test computer, you find that it has
reserved the memory range E0085000 through E0085FFF for its use.

To complete this lab challenge, you need to write down the conversion to decimal
for the hexadecimal values E0085000 and E0085FFF. You then need to verify
your results using Microsoft Calculator. (Hint: switch to Scientific view when
using Calculator.)

ANSWER

Convert E0085000 and E0085FFF to decimal by hand using the follow-


ing process. The numbers E0085000 and E0085FFF are different only
by the last three digits FFF. So if we calculate E0085000, we only need
add FFF to get the value for E0085FFF.
Here is the conversion to decimal for E0085000:
0 * 160 +
0 * 161 +
0 * 162 +
5 * 163 +
8 * 164 +
0 * 165 +
0 * 166 +
E * 167,
28 LAB 4 ANSWERS

which, using Calculator (from the Start menu, point to All Programs,
Accessories, and then select Calculator), equals 20,480 + 524,288 +
3,758,096,384, or 3,758,641,152. To get the decimal equivalent for
E0085FFF, add FFF:
F * 160 +
F * 161 +
F * 162,

which equals 15 + 240 + 3840, or 4,095. So E0085FFF equals


3,758,641,152 + 4,095, or 3,758,645,247.
To check this work using Calculator:
1. Start Calculator.
2. In Calculator, from the View menu, select Scientific.
3. Select Hex in the top row of options.
4. Using your mouse, type E0085000 and then select Dec. Our
first value, 3,758,641,152, appears.
5. Select Hex. Type E0085FFF and then select Dec. Our second
value, 3,758,645,247, appears.
LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 29

LAB 5
CONFIGURING AND MANAGING THE USER
EXPERIENCE

EXERCISE 5-1: SETTING DISPLAY PROPERTIES

Desktop Items
6. In the Display Properties dialog box, click OK.

QUESTION What two items appear on the desktop when you click
Apply?

ANSWER

A shortcut to My Documents and a white window with the text “Sample


Web Page” both appear.

10. Right-click the embedded Web page, and then select Refresh.

QUESTION What happens when you click Refresh?

ANSWER

The Web page reloads, and the word Change appears.

Display Settings
1. In the Display Properties dialog box, on the Settings tab, examine the
settings and answer the following questions.

QUESTION What is the highest and lowest screen resolution offered?

ANSWER

The range of screen resolutions offered depends on the display adapter


and monitor drivers. An example answer is 800 by 600 to 2048 by 1536.

QUESTION What Color Quality settings are available?

ANSWER

The Color Quality offerings vary depending on the display adapter driver.
An example answer is Medium (16 bit) and Highest (32 Bit).
30 LAB 5 ANSWERS

6. Select the Troubleshoot tab.

QUESTION What settings are available on this tab?

ANSWER

The Hardware Acceleration slider and the Enable Write Combining check
box are the available settings on this tab.

EXERCISE 5-2: THE TASKBAR AND THE START MENU

The Taskbar
2. Right-click each option in the Taskbar Appearance section, select
What’s This?, and answer the following questions.

QUESTION A user often has a large number of windows open at the


same time. The taskbar becomes crowded with all the corresponding
taskbar buttons, and the user would like to mitigate the clutter. What
option would you recommend that he set?

ANSWER

He should select the Group Similar Taskbar Buttons check box. This will
group taskbar buttons opened by the same program into a single group if
the taskbar becomes crowded.

QUESTION A user wants the full use of the screen, but cannot “get rid
of the bar at the bottom of the screen.” Which two settings could you
recommend the user change to fix this?

ANSWER

The user could clear the Lock The Taskbar check box, which would allow the
user to hide the taskbar manually. Alternatively, the user could select the
Auto-Hide The Taskbar check box, which would automatically hide the
taskbar and reveal it when the mouse was brought to the taskbar area.

QUESTION What option allows the user to choose from a list of short-
cuts located on the taskbar?

ANSWER

The Show Quick Launch check box will display the Quick Launch toolbar on
the taskbar. The Quick Launch toolbar allows the user to display the
desktop or launch an application with a single click.
LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 31

The Start Menu


12. From the Start menu, point to All Programs.

QUESTION Where does the Calculator appear in the Start menu?

ANSWER

The Calculator appears in the top section of the All Programs list.

14. Locate the Calculator shortcut in the Start menu.

QUESTION Where has the Calculator shortcut moved to in the Start


menu?

ANSWER

The Calculator shortcut has moved to the bottom section of the All
Programs list.

19. Locate the Calculator shortcut in the Start menu.

QUESTION How do you launch the Calculator from the Start menu now?

ANSWER

From the Start menu, point to All Programs, Accounting, and then select
Calculator.

EXERCISE 5-3: CONFIGURING MULTIPLE LANGUAGES


AND LOCATIONS
8. In the Regional And Language Options dialog box, select the Regional
Options tab.

QUESTION You are on a business trip to Kazakhstan. How do you con-


figure services to provide you with local information?

ANSWER

In the Regional And Language Options dialog box, on the Regional Options
tab, in the Location section, in the drop-down list, select Kazakhstan.
32 LAB 5 ANSWERS

EXERCISE 5-4: CONFIGURING ACCESSIBILITY

Keyboard Accessibility Settings


4. In the Accessibility Options dialog box, on the Keyboard tab, read the
descriptions of the keys options and browse the settings of each, and
then answer the following questions.

QUESTION A user has nerve degeneration and often hits a key more
than once by accident. What accessibility key option can help to mitigate
this problem?

ANSWER

The FilterKeys option will allow Windows to ignore brief or repeated key-
strokes or slow the repeat rate. This can help to mitigate problems where
the user involuntarily presses a key repeatedly, has difficulty pressing
keys briefly, or accidentally presses keys for short periods.

QUESTION The FilterKeys offers two settings related to repeating a


keystroke when the key is held down. What are the two settings?

ANSWER

The two settings are Repeat Delay and Repeat Rate.

QUESTION What is the keyboard shortcut for FilterKeys?

ANSWER

The keyboard shortcut is to hold down the RIGHT SHIFT key for eight
seconds.

QUESTION A user is unable to press two keys simultaneously (for


example, CTRL+C to copy). What accessibility key option can help the
user?

ANSWER

The StickyKeys option allows a user to avoid having to press two keys
simultaneously to apply a modifier key.

QUESTION When using StickyKeys, how do you lock a modifier key?


LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 33

ANSWER

You can lock a modifier key in StickyKeys by pressing it twice.

QUESTION What is the keyboard shortcut for activating StickyKeys?

ANSWER

The keyboard shortcut for activating StickyKeys is pressing the SHIFT key
five times.

Sound Accessibility Settings


2. Click an open space in the desktop to make it active, and then press Q.
Your desktop will flash twice. Clear the Use SoundSentry check box.

QUESTION What other option is on the Sound tab, and what does
it do?

ANSWER

The other option on the Sound tab is Use ShowSounds. Use ShowSounds
requests that programs display captions for the speech and sounds
that they make. The programs must have this functionality built-in for
this option to work.

Display Accessibility Settings


2. Once you have observed the high-contrast setting, clear the Use High
Contrast check box, and then click Apply.

QUESTION What other options are on the Display tab, and what do
they do?

ANSWER

The other options on the Display tab are the Blink Rate and the Width,
which adjust how fast the cursor blinks and how wide it is.

Mouse Accessibility Settings


2. Ensure that NUM LOCK is turned on, and use the 4, 8, 6, and 2 keys to
navigate the mouse cursor to the Settings button, and then press the
PLUS SIGN (+).
34 LAB 5 ANSWERS

QUESTION What is the keyboard shortcut for MouseKeys?

ANSWER

The keyboard shortcut for MouseKeys is LEFT ALT + LEFT SHIFT + NUM
LOCK.

LAB REVIEW QUESTIONS


Estimated completion time: 15 minutes
1. A user’s mouse cursor is represented as a bug, instead of the familiar
arrow. Which tab of the Display Properties dialog box should the user
visit to fix this problem?
ANSWER

The Themes tab. Themes allow the user to set a combination of the back-
ground, a set of sounds, icons, and other elements by selecting a single
theme.

2. A user has set a picture of her son as the background image on her
desktop. However, the image is horribly distorted; the face is three
times as wide as it is tall. What is wrong, and how can you fix it?
ANSWER

The desktop background image (a picture of her son) is set to stretch to


fit the desktop. It needs to be set to be centered without any stretching.
In the Display Properties dialog box, on the Desktop tab, change the Posi-
tion drop-down list from Stretch to Center.

3. Knowing from what location you organize the Start menu for an indi-
vidual user, where do you think you can organize the Start menu for all
users of a Windows XP installation?
ANSWER

You can organize the Start menu for all users by accessing C:\Documents
And Settings\All Users\Start Menu. Or, you can right-click the Start
menu, and then select Open All Users or Explore All Users.

4. A user who spends half his time in New York and the other half in Paris
wants to add French as an alternative input language on his computer.
What option in Control Panel should he choose?
ANSWER

To add French as an alternative input language, he should choose Date,


Time, Language, And Regional Options in Control Panel.
LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 35

LAB CHALLENGE 5-1: CREATING A CUSTOM DESKTOP


The head of the human resources department tells you a story of a study where a
random sample of workers was given brighter overhead lights. Productivity went
up. The researchers increased lighting more, and productivity went up again.
After increasing brightness to a very high level a third time and finding another
increase in productivity, they lowered the brightness of the lights of a different
group, which also resulted in increased productivity!

The conclusion was that the attention given to the employees, not the altering of
light levels, is what increased productivity. In the spirit of this study, the human
resources department wants to track the productivity of users who receive cus-
tomized desktops that look and feel different from the default. They want to see
whether productivity is altered, and how long changes in productivity last.

You have been asked to create the custom desktop that will be used for testing.
This lab challenge is open ended and has no correct answer, but consider doing
some or all of the following:

■ Use a different theme.


■ Change the desktop background image.
■ Create a custom screen saver.
■ Change the default font.
■ Relocate the taskbar.
■ Modify the organization of the Start menu.

Once you have modified your local student account to create a custom desktop,
be sure to change the essential behaviors back to the default so that future labs
will work.

ANSWER

Lab Challenge 5-1 has no single correct answer; just create a custom
desktop (with your local student account) using the techniques you
learned in Lab 5. Once you are done, restore the default settings so that
future labs will work as written.
36 LAB 6 ANSWERS

LAB 6
CONFIGURING AND MANAGING PRINTERS

EXERCISE 6-1: INSTALLING A SHARED PRINTER

Installing a Shared Printer


20. Open the Test.txt file.

QUESTION What do the first two lines of the Test.txt document


contain (ignoring nonalphanumeric characters)?

ANSWER

The first two lines of the Test.txt document contain “Windows XP” and
“Printer Test Page.”

QUESTION According to the Test.txt file, in what format is the data


that is sent to the printer?

ANSWER

The format of the data sent to the printer is Raw.

EXERCISE 6-2: ACCESSING SHARED PRINTERS

Accessing a Shared Printer through the Network


15. In the \\Computerxx window, in the address text box, type C:\Documents
And Settings\Studentxx.CONTOSO and press ENTER.

QUESTION When you print to file on a shared printer on another com-


puter, by default, is the document printed to a file on the local computer
or on the computer hosting the printer?

ANSWER

When you print to file on a shared printer on another computer, by


default, the document is printed to file on the local computer.

Searching for a Printer in Active Directory


10. Select the Can Print Color check box, and then click Find Now.
LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 37

QUESTION How many printers at Contoso are available that can print
color?

ANSWER

There are no color printers available at Contoso.

12. In the Printers tab, in the Location text box, type Room yy and then
click Find Now.

QUESTION What printer is available in Room yy?

ANSWER

Printer3 is available in Room yy.

Using the Add Printer Wizard to Add a Network Printer


3. On the Local Or Network Printer page, answer the following question,
and then click Next.

QUESTION What is the only option available to your student account


on Contoso, and why are the other options unavailable?

ANSWER

The only option available is to add A Network Printer, Or A Printer


Attached To Another Computer. The other options are not available
because they require the Manage Printers permission, which the Contoso
student accounts lack.

EXERCISE 6-4: MANAGING DOCUMENTS IN THE


PRINT QUEUE
23. In the Connect To Computerxx.Contoso.Local dialog box, enter your
local Administrator credentials and then click OK.

QUESTION In the HP LaserJet 4 window, which of the three documents


in the printer queue has a status of printing?

ANSWER

The Internet Jokes.rtf document, which is the last document listed in the
queue, has a status of printing.
38 LAB 6 ANSWERS

QUESTION Does the fact that a file not at the top of the queue is
printing before others listed above it indicate that its priority number is
higher or lower (assuming that the priority assigned to the documents is
responsible for the out–of-order printing)?

ANSWER

It indicates that the priority number is higher because higher numbers


mean higher priority.

EXERCISE 6-5: PRINTER PERMISSIONS


6. In the Enter Network Password dialog box, in the User Name text box,
type StudentAdmin, and in the Password text box, type P@ssw0rd.
Click OK.

QUESTION You are currently logged on as an administrator. Why can’t


you use your current credentials to add your student account?

ANSWER

The scope of the local administrator account does not extend to domain
administration. The Contoso student account is a member of the Contoso
domain and therefore cannot be added by an administrator account that
covers only the local computer.

LAB REVIEW QUESTIONS


1. Almost all printer-related tasks begin by accessing the same location
where you can view all the printers on the local computer. What is the
name of this location, and from where can you get to it?
ANSWER

The name of the location is Printers And Faxes, and it can be accessed
from the Start menu or from Control Panel.

2. When configuring Internet printing, what component of Windows do


you need to partially install?
ANSWER

To use Internet printing, you need to install components of Internet Infor-


mation Services (IIS).
LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 39

3. You are technical support agent at Contoso. Because you are moving
continually from site to site fixing problems, you often do not have
access to a computer. So that you can check your e-mail messages, you
have purchased a Pocket PC that connects to the Contoso network via
a wireless connection. You want to be able to easily administer printers
from your Pocket PC. How can you accomplish this?
ANSWER

You can install Internet printing, which will allow you to manage network
printers via the Web browser on your Pocket PC.

4. On all printers, by default the Everyone group (which includes all


users) is allowed the Print permission. If you were to select the Deny
option for the Print permission on the printer for your student
account, would you be able to print on that printer? Why or why not?
ANSWER

No, you would not be able to print because Deny permissions always take
precedence over Allow permissions.

5. Because of high printing volume, the graphics design department has


recently been given five new printers, all identical. A colleague of yours
successfully installed all the printers, but the users complain that they
don’t have a good way of deciding which printer to send their docu-
ments to distribute the load evenly. How can you fix this?
ANSWER

You can ensure that the load is distributed evenly by configuring printer
pooling. This will create only one logical printer for the users to print to,
which will distribute print jobs to all five printers evenly. Also, you might
want to configure a cover page that identifies the document and its
source.

LAB CHALLENGE 6-1: SETTING UP FAXING


Currently, Contoso uses a standard fax machine at the front desk. The fax
machine is old and is continually requiring maintenance, and the printing quality
is degrading quickly.

You have decided to create a fax printer on a computer at the front desk that is
currently configured as a print server.
40 LAB 6 ANSWERS

To complete this lab challenge, do the following:

■ Install a standard 56,000 bps modem


■ Enable faxing
■ Install a fax (logical fax)
■ Configure the fax with the following parameters:
❑ Phone number 100-123-4567
❑ TSID and CSID of Contoso 100-123-4567
❑ Uses HP LaserJet 4 printer
❑ Stores a copy of faxes in C:\Faxes
ANSWER

To set up faxing complete the following steps:


1. Log on with your local Administrator account.
2. Install a standard 56,000 bps modem (referring to Lab 4,
Exercise 4-2, “Installing Hardware Manually Using the Add
Hardware Wizard,” if necessary) if one is not already installed.
3. Ensure that your Windows XP Installation CD is in your CD-
ROM drive.
4. From the Start menu, select Printers And Faxes.
5. In the Printers And Faxes window, in the Printer Tasks pane,
select Set Up Faxing.
6. The Configuring Components page will appear during installa-
tion, and then disappear.
7. In the Printers And Faxes window, in the Printer Tasks pane,
click Install A Local Fax Printer.
8. The Printers And Faxes window will update to show the Fax
icon. Double-click Fax.
9. In the Location Information dialog box, in the What Area Code
(Or City Code) Are You In Now text box, type 100 and then
click OK.
10. In the Phone And Modem Options dialog box, click OK.
11. In the Fax Configuration Wizard, on the Welcome page, click
Next.
12. On the Sender Information Page, in the Your Full Name text
box, enter fictitious information and click Next, or just click
Next.
13. On the Select Device For Sending Or Receiving Faxes page,
ensure that the Enable Send check box is selected, and select
the Enable Receive check box. Click Next.
LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 41

14. On the Transmitting Subscriber Identification (TSID) page, in


the TSID text box, type 100-123-4567 Contoso and then click
Next.
15. On the Called Subscriber Identification (CSID) page, in the
CSID text box, type 100-123-4567 Contoso and then click
Next.
16. On the Routing Options page, select the Print It On check box,
and in the drop-down list select HP LaserJet 4.
17. Select the Store A Copy In A Folder check box, and then click
Browse.
18. In the Browse For Folder dialog box, browse to Local Disk (C:)
and then click Make New Folder.
19. Type Faxes for the name of the folder, and then press ENTER.
Click OK.
20. In the Fax Configuration Wizard, on the Routing Options page,
click Next.
21. On the Completing The Fax Configuration Wizard page, click
Finish.

LAB CHALLENGE 6-2: CONFIGURING MULTIPLE


PRINTERS FOR DIFFERENT PRIORITIES AND SCHEDULES
The HP LaserJet 4 in the main hallway is a very busy printer, and people often
have to wait a long time for their documents to print.

Currently, all documents sent to the printer are queued on a first-come, first-served
basis. You need to create two new logical printers, one that prints at maximum
priority and one that prints during off-hours. This way, employees can select the
high-priority printer if they need to print a document quickly, or they can select
the off-hours printer if they do not need the document until the next, day. Also,
really long documents can be sent to the off-hours printer to keep the print device
from being occupied printing long documents during working hours.

To complete this lab challenge, do the following:

■ Install an HP LaserJet 4 Printer that points to the HP LaserJet 4 print


device on the LPT1 port (which is a fictitious print device), and set it to
print with a priority of 99. Name this printer High Priority-HP LaserJet 4.
Make the share name HighPri.
■ Install an HP LaserJet4 Printer that points to the HP LaserJet 4 print
device on the LPT1 port, and set it to print only between 6 P.M. and
7 A.M. Name this printer HP Off Hours-HP LaserJet4. Make the share
name OffHours.
42 LAB 6 ANSWERS

ANSWER

To configure the two new printers, complete the following steps.


1. Log on with your local Administrator account.
2. Install and share the printers. Use the TCP/IP port pointing
to 10.1.1.152 (referring to Lab 6, Exercise 6-1, “Installing a
Shared Printer,” if necessary). You will not need to create a
new TCP/IP port; the correct port has already been created.
Ensure that the printers you add are not set to be the default
printers.
3. In the Printers And Faxes window, right-click High Priority-HP
LaserJet 4 and then select Properties.
4. In the High Priority-HP LaserJet 4 Properties dialog box, in
the Advanced tab, in the Priority spin box, type 99 and then
click OK.
5. In the Printers And Faxes window, right-click Off Hours-HP
LaserJet 4 and then select Properties.
6. In the Off Hours-HP LaserJet 4 Properties dialog box, in the
Advanced tab, select Available From.
7. In the first Available From text box, select 6 PM, and in the
second, select 7 AM. Click OK.
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 43

LAB 7
CONFIGURING AND MANAGING NTFS SECURITY

EXERCISE 7-1: CONFIGURING NTFS PERMISSIONS

Configuring Permissions
8. In the Select Users, Computers, Or Groups dialog box, in the Enter
The Object Names To Select (Examples) text box, type Computerxx\
Accountants and then click Check Names. Click OK.

QUESTION What three permissions for Accountants are set to Allow


by default?

ANSWER

The Read & Execute, List Folder Contents, and Read permissions are all
assigned to the group Accountants (or any other group) when it is
added.

9. In the Group Or User Names list, select Users and then click Remove.

QUESTION Why can’t you remove the Users group?

ANSWER

Because the folder is set to inherit permissions, and the Users group
has rights in the parent folder (drive C), which it is inheriting. You cannot
remove a group or user from a folder’s permissions when it is set to
inherit permissions.

Testing Permissions
12. Double-click AllenB’s Document.

QUESTION Can you read the contents of AllenB’s Document?

ANSWER

Yes, you can read AllenB’s Document.

14. From the File menu, select Save.

QUESTION Can you save the changes you made to AllenB’s Document?
44 LAB 7 ANSWERS

ANSWER

No, you do not have permission to write to the file.

QUESTION Why were you able to save changes to the file when you were
logged on as AllenB, but not JayH, when you are both members of the
Accountants group?

ANSWER

The Accountants group does not have the Write permission, so being a
member of that group does not grant you permission to write to any file.
But the Creator Owner group is allowed the Write permission, so AllenB
is allowed to change the file because he is a member of the Creator Owner
group for the file.

QUESTION We assigned the Accountants group the Create Files /


Write Data special permission on the Share 1 On Volume 1 folder. Why isn’t
the Write Data portion of this permission enough to allow you to write as
JayH to a file created by another user, as long as it is in the Share 1 On
Volume 1 folder?

ANSWER

The Write Data portion of the Create Files / Write Data special permis-
sion has no effect at all when applied to a folder. The Write Data portion
will affect only files, whereas the Create Files portion applies only to
folders.

EXERCISE 7-2: UNDERSTANDING NTFS PERMISSIONS

Effective Permissions
6. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\
Accountants and then click Check Names. Click OK.

QUESTION What are the effective permissions that are granted to the
Accountants group for the Share 1 On Volume 1 folder?

ANSWER

The effective permissions are Transverse Folders / Execute Files, List


Folders / Read Data, Read Attributes, Read Extended Attributes, Create
Files / Write Data, and Read Permissions.
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 45

8. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\
Administrator and then click Check Names. Click OK.

QUESTION What are the effective permissions that are granted to the
local Administrator account for the Share 1 On Volume 1 folder?

ANSWER

The Administrator has all effective permissions.

15. In the Select User, Computer, Or Group text box, in the Enter The
Object Name To Select (Examples) text box, type Computerxx\AllenB
and then click Check Names. Click OK.

QUESTION The Accountants group only explicitly allows a subset of all


permissions, but AllenB has all effective permissions for the file AllenB’s
Document. Why?

ANSWER

The Creator Owner group has full permissions, and AllenB created the file
and owns it.

Understanding the Relationship Between Permissions and


Special Permissions
5. Select the Allow check box for the Modify permission.

QUESTION What other Allow check boxes are selected when you select
the Modify check box?

ANSWER

The Allow check boxes for the Read & Execute, List Folder Contents, Read,
and Write permissions are automatically selected when the Allow check
box for the Modify permission is selected.

6. Clear all the check boxes, and then select the Allow check box for the
Read & Execute permission.

QUESTION When you select the Allow check box for the Read & Execute
permission, what other Allow check boxes are selected?
46 LAB 7 ANSWERS

ANSWER

The Allow check boxes for the List Folder Contents and Read permissions
are selected automatically when you select the Allow check box for the
Read & Execute permission.

9. Use the Permission Entry For Share 1 On Volume 1 dialog box, as


shown in the following figure, to answer the inline questions that
follow it.

GL07ht03.bmp

QUESTION What special permissions constitute the Read & Execute


permission?

ANSWER

The Traverse Folder / Execute File, List Folder / Read Data, Read
Attributes, Read Extended Attributes, and Read Permissions special
permissions constitute the Read & Execute permission.

Copying and Moving Files with NTFS Permissions


9. In the Copy Of Share 1 On Volume 1 Properties dialog box, on the
Security tab, examine the Group Or User Names list.

QUESTION Does the Accountants group appear in the list?

ANSWER

No, the Accountants group does not appear in the list. This means that
the NTFS permissions were not copied to the new folder.
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 47

15. Examine the Security tabs in the Properties for the folders you moved
and copied, and complete the following chart.

QUESTION

Moved Copied Moved to Copied to


Within NTFS Within NTFS Other NTFS Other NTFS
Volume Volume Volume Volume
Retained NTFS
Permissions
Did Not Retain
NTFS Permissions
(inherited them from
destination folder
instead)

ANSWER

Moved Copied Moved to Copied to


Within NTFS Within NTFS Other NTFS Other NTFS
Volume Volume Volume Volume
Retained NTFS X
Permissions
Did Not Retain X X X
NTFS Permissions
(inherited them from
destination folder
instead)

LAB REVIEW QUESTIONS


1. You have added an account to a group that has the Write permission
for a folder, but you are still unable to write to the folder. What could be
causing this?
ANSWER

The account is denied the Write permission through its membership to


another Group or by account name explicitly. Deny permissions override
Allow permissions.
48 LAB 7 ANSWERS

2. When you block permission entries from being inherited from a


parent, you are asked what you want to do with the current permis-
sions that were inherited. What are the two options?
ANSWER

When you block permission entries from being inherited from a parent, you
have the option of either copying the currently inherited permissions to
the current object, or removing all inherited permissions and keeping only
permissions that are explicitly defined at the object level.

3. What special permissions constitute the Write permission?


ANSWER

The Create Files / Write Data, Create Folders / Append Data, Write
Attributes, and Write Extended Attributes special permissions
constitute the Write permission.

4. A user belongs to six separate groups, all with different permissions.


You are trying to figure out what permissions the user has by mapping
them by hand. What is an easier way to find out what his permissions
are when his membership to all the groups is taken into account?
ANSWER

An easy way to find his permissions is to use the Effective Permissions


tab in the Advanced Security Settings dialog box.

5. A user has copied a data file using a CD burner from a Windows 98


computer and transferred the file to a Windows XP computer. When
the application that uses the data file is started, an “access is denied”
error appears and references the data file. What might be the problem?

ANSWER

When you save files to a CD-ROM, they are set to read-only. You need to
allow the Write permission for the file to the appropriate users.

LAB CHALLENGE 7-1: USING THE COMMAND LINE


WITH NTFS PERMISSIONS
Many users in the accounting department share computers depending on what
tasks they are performing and the applications they are using. Each of these
computers has a local Accountants user group, to which each user in the
department belongs.
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 49

Each of the workstations has a folder on the root of drive C, named Share 2 On
Volume 1, that needs to be accessible only to the Administrators group, the
Accountants group, and the SYSTEM. You are not sure who can access the folder
right now.

Rather than set the NTFS permissions for the folder on each of the 20 worksta-
tions manually, you have decided to write a batch file that will change the settings
using the Cacls command. You can then distribute the batch file either over the
network or on a floppy disk to be run on each workstation.

To complete this lab challenge, do the following:

Write a batch file named Permissions.bat on the root of drive C that will:

1. List the permissions on the “Share 2 On Volume 1” folder.


2. Allow Full Control for the SYSTEM group, while replacing all existing
permissions.
3. Allow Full Control for the Administrators group, while preserving
existing permissions.
4. Allow Read and Write permissions for the Accountants group, while
preserving existing permissions.
5. List the permissions after they have been changed.
6. Once the batch file is complete, run it successfully.

NOTE A batch file is text file that contains commands that are exe-
cuted one at a time as if they were being typed directly into a command-
prompt window. You can create a batch file by saving a text file as
name.bat. You can then run the batch file by entering path:name.bat at
a command prompt (for example, C:\Example.bat). Chapter 7 of the text-
book book covers the use of the Cacls command. You can also get infor-
mation by typing cacls /? at a command prompt or by using the Help and
Support Center (search for Cacls).

ANSWER

To create the batch file and run it, complete the following steps:
1. Ensure that you are logged on with your local Administrator
account.
2. From the Start menu, point to All Programs, Accessories, and
then select Notepad.
3. In Notepad, type the following code. (The @REM are comments
and will not affect the output of the program, and therefore do
not need to be included.)
50 LAB 7 ANSWERS

@REM Get to the root of C.


CD C:\

@REM List the current NTFS permissions of the Share 2 On


Volume 2 folder- quotes are necessary due to spaces.
CACLS "Share 2 On Volume 1"

@REM Allow the SYSTEM group and the Administrators group full
control. Because the /E switch was not used in the first
instance, all existing permissions are removed.
CACLS "Share 2 On Volume 1" /G SYSTEM:F
CACLS "Share 2 On Volume 1" /E /G Administrators:F

@REM Allow Accountants the Read and Write permissions.


Because the /E switch is used, this adds to existing
permissions (it doesn't replace them).
CACLS "Share 2 On Volume 1" /E /G Accountants:R
CACLS "Share 2 On Volume 1" /E /G Accountants:W

@REM Lists the current permissions for the Share 2 On


Volume 1 folder.
CACLS "Share 2 On Volume 1"

4. From the File menu, select Save As.


5. In the Save As dialog box, in the File Name text box, type
“C:\Permissions.bat” and then press ENTER.
6. Close Notepad.
7. From the Start menu, select Run.
8. In the Run dialog box, in the Open text box, type cmd and then
press ENTER.
9. At the command prompt, type C:\Permissions.bat and then
press ENTER. Answer Yes to any queries. Your output should
look like the following:
C:\Documents and Settings\Administrator>C:\Permissions.bat

C:\Documents and Settings\Administrator>CD C:\

C:\>CACLS "Share 2 On Volume 1"


C:\Share 2 On Volume 1 BUILTIN\Administrators:(OI)(CI)F
NT AUTHORITY\SYSTEM:(OI)(CI)F
COMPUTER07\Administrator:F
CREATOR OWNER:(OI)(CI)(IO)F
BUILTIN\Users:(OI)(CI)R
BUILTIN\Users:(CI)(special access:)
FILE_APPEND_DATA

BUILTIN\Users:(CI)(special access:)
FILE_WRITE_DATA

C:\>CACLS "Share 2 On Volume 1" /G SYSTEM:F


Are you sure (Y/N)?y
processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1" /E /G Administrators:F


processed dir: C:\Share 2 On Volume 1
LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 51

C:\>CACLS "Share 2 On Volume 1" /E /G Accountants:R


processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1" /E /G Accountants:W


processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1"


C:\Share 2 On Volume 1 NT AUTHORITY\SYSTEM:(OI)(CI)F
BUILTIN\Administrators:(OI)(CI)F
COMPUTER07\Accountants:(OI)(CI)
(special access:)
READ_CONTROL
SYNCHRONIZE
FILE_GENERIC_READ
FILE_GENERIC_WRITE
FILE_GENERIC_EXECUTE
FILE_READ_DATA
FILE_WRITE_DATA
FILE_APPEND_DATA
FILE_READ_EA
FILE_WRITE_EA
FILE_EXECUTE
FILE_READ_ATTRIBUTES
FILE_WRITE_ATTRIBUTES
52 LAB 8 ANSWERS

LAB 8
CONFIGURING AND MANAGING SHARED FOLDERS

EXERCISE 8-1: SHARING A FOLDER ON THE NETWORK

Sharing a Folder with the Create A Shared Folder Wizard


3. In the Computer Management console, in the console tree, under
System Tools, expand Shared Folders, and then select Shares.

QUESTION What shares currently exist?

ANSWER

The shares ADMIN$, C$, IPC$, L$, and Print$ all exist. They are all admin-
istrative shares and are hidden. Share names followed by a dollar sign ($)
are hidden from network browsing.

10. In the Shared Folder Permissions dialog box, select Customize Permission.

QUESTION What four permissions settings are offered for the shared
folder?

ANSWER

The four permissions settings offered for the shared folder are as follows:
1. All Users Have Read-Only Access.
2. Administrators Have Full Access; Other Users Have Read-Only
Access.
3. Administrators Have Full Access; Other Users Have No Access.
4. Customize Permissions.

EXERCISE 8-2: ACCESSING SHARED FOLDERS

Accessing Shared Folders Through My Network Places


7. Open Windows Explorer, and browse to Accounting Data on Computeryy.

QUESTION What occurs when you try to access the shared folder
Accounting Data on your partner’s computer?

ANSWER

When you try to access the shared folder Accounting Data on your part-
ner’s computer, you receive a message indicating that access is denied.
LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 53

9. In Windows Explorer, browse to C:\Accounting Data.

QUESTION Why are you able to access the shared folder Accounting
Data on your computer, but you are not able to access the same folder
on your partner’s computer, when the share and NTFS permissions are
identical?

ANSWER

You are not able to access the shared folder Accounting Data on your
partner’s computer because the share permissions allow access only to
the Accountants and Domain Administrators groups. However, these
permissions only affect access over the network and do not affect con-
nections to the folder made locally. Therefore, you can access the folder
locally because it is allowed by the NTFS permissions.

Mapping a Drive to a Network Folder


10. In the tree view, expand My Network Places, Entire Network, Microsoft Win-
dows Network, Contoso, Computerxx, and then select Sales Projections.

QUESTION Summarize what the message box states.

ANSWER

The message box states that no more connections can be made because
as many connections as the computer can accept have been made.

QUESTION The Sales Projections folder that we just tried to access


is stored locally. Because share permissions apply only to resources
accessed over the network, why were we unable to access the Sales
Projections folder?

ANSWER

We were unable to access the folder, even though it is local, because we


tried to access it via the network, not from the hard drive directly, and
therefore the share permissions disallowed the connection because we
set the connection limit to one. (Your partner is already connected to
it via a mapped drive.)

EXERCISE 8-3: MONITORING SHARED FOLDERS


7. In the Computer Management console, in the console tree, under
System tools, expand Shared Folders, and then select Sessions.

QUESTION How many open files are there in MZwilling’s current session?
54 LAB 8 ANSWERS

ANSWER

There is one open file.

8. In the console tree, select Open Files.

QUESTION What folder is the open file located in?

ANSWER

The file is in the folder C:\Sales Projections.

EXERCISE 8-4: CONFIGURING SYNCHRONIZATION


7. Ensure that the \\Computeryy\Sales Projections On Computeryy
check box is selected, and then click Properties.

QUESTION In the Offline Files folder, what documents are present?

ANSWER

The Projections 2006 – 2010 document is present.

LAB REVIEW QUESTIONS


1. How can you designate a share as an administrative share, which will
cause it to be hidden?
ANSWER

Appending the share name with $ will designate it as an administrative


share. Administrative shares do not appear as a network resource
because ordinary users have no reason to view them.

2. You create a shared folder and allow only Domain Admins access to it.
However, you find that you can access the folder on the file server
when you log on as a Domain User. Why can you access the folder?
ANSWER

Shared folder permissions apply only when the folder is accessed over the
network. If the folder is accessed locally, the shared permissions do not
apply (but the NTFS permissions still apply).

3. How is the Synchronization Manager accessed?


LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 55

ANSWER

To access the Synchronization Manager, from the Tools menu of Windows


Explorer or a folder window, select Synchronize.

4. You work for a software company that sells tax software. They have
been selling the same DOS-based application for 15 years because their
clientele is used to it and can use it very efficiently. The software was
designed before networking was available, and you need to store the
data files on a file server rather than the local machine. However, the
program will work only if the data designated by the software is stored
on the root of a drive. How can you use the file server and satisfy the
software’s requirement that it be able to store data on the root of
a drive?
ANSWER

To make the shared folder on the file server look like a local drive to the
client machine, you can map a network drive to the folder. This can be
done by selecting Map Network Drive from the Tools menu of Windows
Explorer.

LAB CHALLENGE 8-1: USING SCRIPTS


TO CONFIGURE SHARES
Contoso has 20 separate locations in the United States, and each location is being
equipped with a new file server. The file servers are going to have six shared fold-
ers, which will have the same names regardless of location. You need to create a
batch file that automatically creates these six shares. Once the shares are created,
on-site technicians will set the permissions manually according to their needs.

To complete this lab challenge, do the following:

1. Write a batch file named SharedFolders.bat that uses the Net Share
command to share the following folders. The share name and folder
name should be the same, and the folders should be located in
C:\Standard Shares\.
❑ Financial
❑ Marketing
❑ Support
❑ Miscellaneous
❑ Legal
❑ Customer Support
56 LAB 8 ANSWERS

2. Run the batch file.


3. Verify that your partner has successfully run the batch file by accessing
the shared folders on your partner’s computer from a Run dialog box.

TIP A batch file is text file that contains commands that are executed
one at a time as if they were being typed directly into a command-prompt
window. You can create a batch file by saving a text file as name.bat. You
can then run the batch file by entering path:name.bat at a command
prompt (for example, C:\Example.bat).
Chapter 8 of the text book covers the use of the Net Share command.
You can also get information by typing net share /? at a command
prompt or by using the Help and Support Center (searching for
Net Share).
To create a directory at the command line, use the Md command. For
example, to create the folder Standard Shares, type md “C:\Standard
Shares”. You will need to create each folder before you share it.

ANSWER

To create the batch file and run it, complete the following steps:
1. Ensure that you are logged on with your local Administrator
account.
2. From the Start menu, point to All Programs, Accessories, and
then select Notepad.
3. In Notepad, type the following code. (The @REM are comments
and will not affect the output of the program, and therefore
they do not need to be included.)
@REM Create the "Standard Shares" folder and the folders within it
md "C:\Standard Shares"
md "C:\Standard Shares\Financial"
md "C:\Standard Shares\Marketing"
md "C:\Standard Shares\Support"
md "C:\Standard Shares\Miscellaneous"
md "C:\Standard Shares\Legal"
md "C:\Standard Shares\Customer Support"

@REM Share the folders


net share Financial="c:\Standard Shares\Financial"
net share Marketing="c:\Standard Shares\Marketing"
net share Support="c:\Standard Shares\Support"
net share Miscellaneous="c:\Standard Shares\Miscellaneous"
net share Legal="c:\Standard Shares\Legal"
net share "Customer Support"="c:\Standard Shares\Customer Support"

4. From the file menu, select Save.


5. In the Save As dialog box, in the File Name text box, type
“C:\ShareFolders.bat” and then press ENTER.
6. From the Start menu, select Run.
7. In the Run dialog box, in the Open text box, type cmd and then
press ENTER.
8. In the command prompt window, at the command prompt, type
cd C:\ and then press ENTER.
LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 57

9. At the command prompt, type ShareFolders and then press


ENTER. The batch file will run.
10. Once you partner has completed step 9, open a Run dialog box,
and in the Open text box, type \\10.1.1.yy and then press ENTER.
You should see all the newly shared folders in the \\10.1.1.yy
folder.

LAB CHALLENGE 8-2: USING WEB FOLDERS


You have decided to create an intranet site where you can post documents that
you want domain users to be able to access as read-only. To do this, you need to
install the World Wide Web Service and supporting components within Internet
Information Services (IIS).

To complete this lab challenge, perform the following steps:

1. Install the World Wide Web Service component of Internet Information


Services (IIS).
2. Create and share as a Web folder C:\Intranet Share with the alias Intranet
Share. Make sure that the Read and Directory Browsing access permis-
sions are assigned to the folder.
3. Once your partner has completed the first two tasks, ensure that you
can access http://Computeryy/Intranet Folder from your Contoso stu-
dent account.
ANSWER

The following steps will complete the lab challenge:


NOTE Before you begin the following steps, load your Windows XP instal-
lation CD into the CD-ROM drive. If the Welcome To Microsoft Windows XP
window appears, close it.

1. Ensure that you are logged on with your local Administrator


account.
2. From the Start menu, select Control Panel.
3. In Control Panel, click Add Or Remove Programs.
4. In the Add Or Remove Programs window, click Add/Remove
Windows Components.
5. In the Windows Components Wizard, in the Components list
box, select Internet Information Services (IIS) (not its
check box) and then click Details.
6. In the Internet Information Services (IIS) dialog box, select
Word Wide Web Service (not its check box) and then click
Details.
7. In the World Wide Web Service dialog box, select the World Wide
Web Service check box. Click OK.
58 LAB 8 ANSWERS

NOTE If you completed other labs, the World Wide Web Service check box
might already be selected. In this case, click Cancel.

8. In the Internet Information Services dialog box, click OK.


9. In the Windows Components Wizard, click Next.
10. The Configuring Components page will appear and indicate
progress.
11. On the Completing The Windows Components Wizard page, click
Finish.
12. Close the Add Or Remove Programs dialog box.
13. Close the Control Panel.
14. From the Start menu, select My Computer.
15. In the My Computer window, double-click Local Disk (C:).
16. In the Local Disk (C:) window, from the File menu, point to New
and then select Folder.
17. For the name of the folder, type Intranet Share and then
press ENTER.
18. Right-click Intranet Share, and then select Properties.
19. In the Intranet Share Properties dialog box, in the Web Sharing
tab, select Share This Folder.
20. In the Edit Alias dialog box, select the Directory Browsing
check box and then click OK.
21. In the Intranet Share Properties dialog box, click OK.
22. Log off and log back on to Contoso with your student account.
23. From the Start menu, select Internet Explorer.
IMPORTANT Wait until your partner has completed the previous step
before continuing.

24. In Internet Explorer, in the Address text box, type http://


Computeryy/Intranet Share.
25. The Computeryy - /Intranet Share/ page should appear.
LAB 9 ANSWERS: SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL 59

LAB 9
SUPPORTING APPLICATIONS IN WINDOWS XP
PROFESSIONAL

EXERCISE 9-2: ASSESSING PRODUCT COMPATIBILITY

Checking System Information with Computer Management


13. In the details pane, expand Display Adapters, Network Adapters, and
Processors, as shown in the following figure.

GL09ht02.bmp

QUESTION Does Computer08 in the preceding figure meet the


processor requirements for Fruit Stand 3-D: The Final Fig?

ANSWER

Yes, it meets the processor requirements.

15. In the details pane, right-click drive C and select Properties, as shown
in the following figure.

GL09ht03.bmp
60 LAB 9 ANSWERS

QUESTION Does Computer08 in the preceding figure have enough


space on drive C to install Fruit Stand 3-D: The Final Fig?

ANSWER

No, it has only 1.57 gigabytes (GB) free, and 2 GB are required.

17. In the Computer Management (COMPUTERyy) Properties dialog box,


on the General tab, read the Computer section to determine how much
RAM your partner’s computer has. The General tab is displayed for
Computer08 in the following figure.

GL09ht04.bmp

QUESTION Does Computer08 in the preceding figure have enough RAM


to run Fruit Stand 3-D: The Final Fig?

ANSWER

Yes, it has 1 GB and only 256 megabytes (MB) are required.

Using the Windows Catalog


3. On the Software page, in the Search text box, type Litware and then
click Go.

QUESTION Did Litware appear in the Windows Catalog?

ANSWER

No, Litware did not appear in the Windows Catalog. This omission does
not mean that Litware is incompatible with Windows XP; it just means
that it has not been listed in the Windows Catalog or certified by
Microsoft as compatible.
LAB 9 ANSWERS: SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL 61

LAB REVIEW QUESTIONS


1. What is the difference between assigning and publishing software to
users through Group Policy?
ANSWER

Assigning software either installs the software upon logon or creates a


shortcut for the software in the Start menu but waits to install it until
it is invoked. Publishing software makes the software available through
Add Or Remove Programs.

2. What is the difference between assigning and publishing software to


computers through Group Policy?
ANSWER

Software cannot be published to computers through Group Policy.


Assigning software to computers causes the software to be installed
on the next startup.

3. You have received a critical upgrade to a program used throughout the


Accounting division at Contoso. All employees of the Accounting divi-
sion of Contoso are in the same OU. You want the computers of all the
users who are using the current version to have it uninstalled and to
have the new version installed automatically. The new version is pack-
aged in a standalone MSI package. How can you use Group Policy to
do this?
ANSWER

You need to edit a group policy object (GPO) attached to the OU and
assign the new MSI package to the GPO. You need to edit the properties
of the MSI package distribution and on the Upgrades tab specify that
the new software is replacing the old software, and that the old software
needs to be uninstalled. Also, to make the deployment automatic, you
need to set the software to install on logon.

4. A program used in the Accounting division is outdated, and when it


runs, it uses only the top-left portion of the screen. What setting on the
Compatibility tab might mitigate this problem?
ANSWER

The Run In 640 x 480 Screen Resolution setting might fix this problem
by reducing the resolution so that the application fits in the screen
correctly.
62 LAB 9 ANSWERS

5. What resource provided by Windows offers a list of programs that have


been certified to work with Windows XP, and what is its URL?
ANSWER

The Windows Catalog provides a list of programs and compatibility levels


with Windows XP. Its URL is http://www.microsoft.com/windows/catalog.

LAB CHALLENGE 9-1: ASSIGNING SOFTWARE TO


COMPUTERS THROUGH ACTIVE DIRECTORY
The call center at Contoso is going to be using new software that should be
available to all users on the call center workstations. Rather than distributing
through Group Policy to users, you need to distribute to computers. The computers
should install the software the next time that they are restarted.

IT administration has decided that the SDP should be different from the SDP
containing the Litware software, so you will need to create a new SDP.

To complete this lab challenge, you need to perform the following steps:

1. Create an SDP at C:\ProsewareSDP with appropriate permissions.


2. Copy Proseware1.0.msi to the SDP from C:\Lab Manual\Lab 9.
3. Edit the Software Distribution GPO attached to the Call Center xx
group to assign Proseware1.0 from \\Computerxx\ProsewareSDP.
4. Restart your computer, and verify the installation of Proseware1.0.

ANSWER

To create a new SDP, use the same technique as outlined earlier in


Exercise 9-1 in the “Creating an SDP” section. The creation is identical,
except for the name, to that of the SDP you created in that exercise.
Copy Proseware1.0.msi to the SDP from C:\Lab Manual\Lab 9.
To edit the GPO, open the Group Policy Management console using
Contoso\StudentAdmin credentials (the password is P@ssw0rd), and
then perform the following steps:
1. In the Group Policy Management console, expand Software
Distribution [SERVER.Contoso.Local] Policy, Computer Config-
uration, Software Settings, and select Software Installation.
2. From the Action menu, point to New and then select Package.
3. In the Open dialog box, browse to Call Center yy On Computer xx.
4. Double-click Proseware1.0.
5. In the Deploy Software dialog box, click OK.
6. Restart your computer, and log on to Contoso as Studentxx.
7. From the Start menu, point to Programs and then select
Proseware1.0.
8. Read the Windows Script Host message box and then click OK.
LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 63

LAB 10
CONNECTING WINDOWS XP PROFESSIONAL
TO A NETWORK

EXERCISE 10-3: OBTAINING AN IP ADDRESS

Obtaining an IP Address Through APIPA


8. At the command prompt, type ipconfig /all and then press ENTER.

QUESTION What are the first two octets of the IP address, and what
do they tell you about the source of the IP address?

ANSWER

The first two octets are 169 and 254, which tells you that the IP address
is an APIPA-assigned address.

Using an Alternate IP Address


10. At the command prompt, type ipconfig /all and then press ENTER.

QUESTION What is the Autoconfiguration IP Address as reported by


Ipconfig /all?

ANSWER

The Autoconfiguration IP Address as reported by Ipconfig /all is


192.168.1.xx.

QUESTION Why isn’t the preferred DNS server address 192.168.1.200,


as specified on the Alternate Configuration tab?

ANSWER

The preferred DNS server is not 192.168.1.200 because the value was
set statically and did not use DHCP. Therefore, it did not change. To
make this work according to the task scenario, you would have to set
the static value of the preferred DNS server address to 192.168.1.200.
However, for the purposes of the lab, leave it as is.

Obtaining an IP Address Through DHCP


3. At the command prompt, type ipconfig /all and press ENTER.
64 LAB 10 ANSWERS

QUESTION The Ipconfig /all command reveals the IP address of the


DHCP server. What is it?

ANSWER

The IP address of the DHCP server is 10.1.1.200.

EXERCISE 10-4: USING THE HELP AND SUPPORT CENTER


NETWORK DIAGNOSTICS
6. Once the options are set, click Scan Your System. The more computers
that are on the network, the longer the scan will take.

QUESTION What is the default gateway according to the results of the


diagnosis?

ANSWER

10.1.1.200.

EXERCISE 10-5: USING COMMAND-LINE DIAGNOSTICS

Using NSlookup
2. At the command prompt, type nslookup www.microsoft.com and
press ENTER.

QUESTION What information does the NSlookup command convey in


this instance?

ANSWER

It returns the IP addresses and aliases from a Domain Name System


(DNS) server of the DNS name queried.

LAB REVIEW QUESTIONS


1. You are on a network with a DHCP server. Your computer boots and
attempts to renew its lease on its IP address, but is unable to reach the
DHCP server, which is down. You are assigned an APIPA address and
cannot access the network. Later, the DHCP server is started and work-
ing. What is the minimum action you need to take to receive a DHCP-
assigned address?
LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 65

ANSWER

No action is necessary. When an APIPA address is assigned, the DHCP


client checks for an accommodating DHCP server every five minutes until
it receives a DHCP address.

2. How can you tell an APIPA address at first glance?


ANSWER

APIPA addresses always begin with the octets 169 and 254.

3. Can the DHCP client be enabled to receive other IP parameters besides


an address, such as the address of a DNS server?
ANSWER

Yes, DHCP can configure many options, including DNS server addresses.

4. What command-line diagnostic used in this lab asks the DNS server to
resolve a name on to an IP address, or vice versa?
ANSWER

The Nslookup command was used as a diagnostic to look up and resolve a


DNS name into an IP address.

5. You are logged onto your computer as an Administrator. You use


Remote Assistance to take control over a user’s computer who is
logged on as a Domain User. Whose security credentials take prece-
dence when you are accessing his computer?
ANSWER

When you access a computer with remote assistance, the security cre-
dentials of the logged-on account on the computer serving the remote
desktop take precedence. In this case, you would have only Domain User
credentials.

LAB CHALLENGE 10-1: OFFERING REMOTE ASSISTANCE


It is sometimes easier to offer an invitation for Remote Assistance than it is to
explain to a client how to request Remote Assistance.

However, this is not allowed by default, and you will have to configure your com-
puter to allow Remote Assistance to be offered. This can be done in a domain
through Active Directory so that each computer does not need to be configured
individually. But in this lab, you need to make the change locally through Group
Policy.
66 LAB 10 ANSWERS

To complete this lab challenge, do the following:

1. On your partner’s computer (Computeryy), run Gpedit.msc and


enable the Offer Remote Assistance option in the Local Computer
Policy\Computer Configuration\Administrative Templates\
System\Remote Assistance folder. Allow Studentxx (your student
account) to offer Remote Assistance.
2. Offer Remote Assistance to your partner’s computer through the Help
And Support Center on your computer (Computerxx). Hint: Use the
search function.
3. Confirm that the offer arrived on your partner’s computer.

IMPORTANT This lab challenge should first be completed by one stu-


dent in the student pair, and then the other student in the pair. It cannot
be completed by both simultaneously.

ANSWER

To modify Group Policy to allow offers of Remote Assistance, complete the


following steps.
IMPORTANT The following should be completed on your partner’s
computer.
1. Log on with your local Administrator account.
2. From the Start menu, select Run.
3. In the Run dialog box, type gpedit.msc and then press ENTER.
4. In the Group Policy console, under Computer Configuration,
expand Administrative Templates, System, and then select
Remote Assistance.
5. In the Details pane, select Offer Remote Assistance, and read
the description that appears.
6. From the Action menu, select Properties.
7. In the Offer Remote Assistance Properties dialog box, select
Enabled.
8. Click Show.
9. In the Show Contents dialog box, click Add.
10. In the Add Item dialog box, in the Enter The Item To Be Added
text box, type Contoso\Studentyy and then click OK.
11. In the Show Contents dialog box, click OK.
12. In the Offer Remote Assistance Properties dialog box, click OK.
13. Close the Group Policy console.
14. Log off and log back on with your Contoso student account.
LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 67

IMPORTANT Complete the following steps on your computer.


1. Log on to Contoso with your student account.
2. From the Start menu, select Help And Support Center.
3. In the Help And Support Center, in the Search text box, type
offer remote assistance and then press ENTER.
4. In the Search Results pane, click Offer Remote Assistance.
5. On the Offer Remote Assistance page, in the Type Or Paste
The Computer Name Or IP Address text box, type Computeryy
and then click Connect.
6. In the drop-down list, select CONTOSO\Studentxx and then
click Start Remote Assistance.
7. An offer of Remote Assistance should appear on your part-
ner’s computer. Click No, and close all open windows on both
computers.

LAB CHALLENGE 10-2: USING THE REPAIR FEATURE


Estimated completion time: 15 minutes
A user at Contoso has lost connectivity to the Internet and other computers on
the network. When this occurs, technicians at Contoso are trained to try using
the Repair option to see if the problem can be fixed quickly.

When a Repair command is issued, the following occurs:

■ If Dynamic Host Configuration Protocol (DHCP) is configured, the


DHCP lease is renewed: ipconfig /renew
■ Address Resolution Protocol (ARP) cache is flushed: arp -d

■ Purge and reload of the NetBIOS name cache: nbtstat -R

■ NetBIOS name update is sent: nbtstat -RR

■ Domain Name System (DNS) cache is flushed: ipconfig /flushdns

■ DNS name registration: ipconfig /registerdns

■ IEEE 802.1X Authentication Restart (for Windows XP Service Pack 1


and later)

To complete this lab challenge:

1. Use the Repair feature in the context menu of your Local Area Connec-
tion network connection.
2. Execute all the separate commands of the Repair feature manually by
using the command prompt and the IP Protocol (TCP/IP) Properties
dialog box.
68 LAB 10 ANSWERS

ANSWER

1. In the Network Connections window, right-click Local Area


Connection and select Repair.
2. In the Repair Local Area Connection message box, click Close.
3. Minimize the Network Connections window.
4. From the Start menu, select Run.
5. In the Run dialog box, in the Open text box, type cmd and then
press ENTER.
6. At the command prompt, type arp -d and press ENTER.
7. At the command prompt, type nbtstat -R and press ENTER.
8. At the command prompt, type nbtstat -RR, and press ENTER.
9. At the command prompt, type ipconfig /flushdns and press
ENTER.
10. At the command prompt, type ipconfig /registerdns and
press ENTER. An example of all these commands being run is
shown in the following figure.

GL10ht05.bmp

11. From the taskbar, restore the Network Connections window.


12. Right-click Local Area Connection, and select Properties.
13. In the Local Area Connection Properties dialog box, on the
Authentication tab, clear the Enable IEEE 802.1x Authentica-
tion For This Network check box. Click OK.
14. Right-click Local Area Connection, and select Properties.
15. In the Local Area Connection Properties dialog box, on the
Authentication tab, select the Enable IEEE 802.1x Authenti-
cation For This Network check box. Click OK.
NOTE Steps 11 through 15 are a re-creation of the last step that the
Repair button executes: IEEE 802.1X Authentication Restart.
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 69

LAB 11
CONFIGURING TCP/IP ADDRESSING AND SECURITY

EXERCISE 11-1: CREATING SUBNETS

Creating Subnets
7. In the Internet Protocol (TCP/IP) Properties dialog box, in the IP
Address text box, in the Subnet Mask text box, type 255.255.255.252.

QUESTION Assuming the address space is Class C, how does this


subnet mask apportion the remaining available 8 bits between subnet
addresses and host addresses?

ANSWER

The subnet mask of 255.255.255.252 on a Class C subnet leaves 6 bits


to define the subnet address space, and 2 bits to define the host
address space for each subnet.

8. In the IP Address text box, for the first three octets type 192.168.0 and
enter the fourth octet according to the following table. (Ensure that
you and your partner assign consecutive fourth octets.)

Student Number Fourth Octet


1 5
2 6
3 9
4 10
5 13
6 14
7 17
8 18
9 21
10 22
11 25
12 26
13 29
14 30
15 33
16 34
70 LAB 11 ANSWERS

Student Number Fourth Octet


17 37
18 38
19 41
20 42
21 45
22 46
23 49
24 50
25 53
26 54
27 57
28 58
29 61
30 62
31 65
32 66
33 69
34 70
35 73
36 74
37 78
38 79
39 82
40 83
41 86
42 87
43 90
44 91
45 94
46 95
47 98
48 99
49 102
50 103

QUESTION The subnet mask that you used specifies 2 bits for the host
portion of the IP address. After subtracting 2 for reserved addresses,
how many possible addresses can 2 bits represent on each subnet?
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 71

ANSWER

2 bits can represent 2n, or 22, possible addresses. However, two of these
(in binary) are 00 and 11, which are reserved. This leaves 01 and 10 (deci-
mal equivalents are 1 and 2) to represent the host addresses in each
subnet.

Testing the Subnet


3. In the command prompt window, at the command prompt, type ping
192.168.0.j and then press ENTER.

QUESTION Is the ping successful?

ANSWER

The ping is successful because 192.168.0.j is in the same subnet.

4. Find the IP address of a student who is not your partner, and ping that
IP address.

TIP When using the command prompt window, you can press the Up
Arrow key to display the previous command, and then press ENTER to exe-
cute it, or you can modify the command and then press ENTER to execute
the modified version.

QUESTION The host IP address that you specified in the Ping command
exists on the classroom network, so why does Ping give a Destination
Host Unreachable message?

ANSWER

The destination host is unreachable because it exists in a different sub-


net from your subnet.

EXERCISE 11-2: CREATING SUPERNETS


2. In the Local Area Connection Properties dialog box, select Internet
Protocol (TCP/IP) and then click Properties.

QUESTION The current subnet mask is 255.255.255.252 or


11111111.11111111.11111111.11111100 in binary. The new subnet mask is going to
be 11111111.11111111.11111111.11111000 in binary. What is the value of this mask
represented in decimal?
72 LAB 11 ANSWERS

ANSWER

The value of 11111111.11111111.11111111.11111000 in decimal is 255.255.255.248.

Testing the Supernet


1. In the command prompt window, at the command prompt, type ping
192.168.0.j and then press ENTER.

QUESTION Was the ping successful?

ANSWER

The ping was successful because 192.168.0.j is in the same subnet.

EXERCISE 11-3: CONFIGURING FIREWALLS

Configuring Exceptions

Excepting Ping, the ICMP Echo Request


2. In the command prompt window, at the command prompt, type ping
10.1.1.yy and then press ENTER.

QUESTION Windows Firewall on your computer and your partner’s


computer are both set to allow no exceptions. When you try to ping your
partner’s computer, is the ping defeated by the firewall on your computer
or on your partner’s computer?

ANSWER

Windows Firewall blocks unsolicited incoming network traffic. It does not


affect outgoing traffic, so the failure of the ping must be a result of Win-
dows Firewall on your partner’s computer.

Configuring Logging
1. In the Windows Firewall dialog box, on the Advanced tab, in the
Security Logging section, click Settings.

QUESTION What is the path of the log file?

ANSWER

The Windows Firewall log file path is C:\Windows\pfirewall.log.


LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 73

LAB REVIEW QUESTIONS

IMPORTANT Questions 1 and 2 refer to the IP address and the subnet


mask that you assigned in Exercise 11-1, “Creating Subnets.”

1. What is the binary equivalent of the subnet mask and the IP address
that you assigned to your computer?
ANSWER

The subnet mask is 11111111.11111111.11111111.11111100. The first three octets of


your IP address are: 11000000.10101000.00000000. The fourth octet
varies depending on your student number according to the following table.

Student Number Fourth Octet


1 00000101
2 00000110
3 00001001
4 00001010
5 00001101
6 00001110
7 00010001
8 00010010
9 00010101
10 00010110
11 00011001
12 00011010
13 00011101
14 00011110
15 00100001
16 00100010
17 00100101
18 00100110
19 00101001
20 00101010
21 00101101
22 00101110
23 00110001
24 00110010
25 00110101
74 LAB 11 ANSWERS

Student Number Fourth Octet


26 00110110
27 00111001
28 00111010
29 00111101
30 00111110
31 01000001
32 01000010
33 01000101
34 01000110
35 01001001
36 01001010
37 01001110
38 01001111
39 01010010
40 01010011
41 01010110
42 01010111
43 01011010
44 01011011
45 01011110
46 01011111
47 01100010
48 01100011
49 01100110
50 01100111

2. Using the AND operator, use your binary IP address and subnet mask
to calculate your network address, and then convert it to decimal.
ANSWER

Your network address is 192.168.0.q, where q is determined according to


the following table.

Student Number Fourth Octet


1 4
2 4
3 8
4 8
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 75

Student Number Fourth Octet


5 12
6 12
7 16
8 16
9 20
10 20
11 24
12 24
13 28
14 28
15 32
16 32
17 36
18 36
19 40
20 40
21 44
22 44
23 48
24 48
25 52
26 52
27 56
28 56
29 60
30 60
31 64
32 64
33 68
34 68
35 72
36 72
37 76
38 76
39 80
40 80
41 84
76 LAB 11 ANSWERS

Student Number Fourth Octet


42 84
43 88
44 88
45 92
46 92
47 96
48 96
49 100
50 100

3. Your IP address is a subnetted Class C address of 192.168.0.30/28.


How many hosts can exist on this subnet, after subtracting two for
reserved addresses (all 0s and all 1s)?
ANSWER

Fourteen hosts can exist in each subnet with a 28-bit subnet mask. The
formula is 2n – 2, where n is the number of binary digits of host address
space (32 – 28 = 4 = n).

4. You have installed Windows Firewall on your home network and want
to play a game over the local area network. You have added the game to
the exceptions list, but want to further restrict access to the computers
that will be involved specifically. How can you do this?
ANSWER

You can define the scope of the exception to include only the IP addresses
that you specify. This is done by accessing the Change Scope dialog box
(Exceptions tab of Windows Firewall | Edit | Change Scope | Custom List).

5. You run a simple Web server on a workstation running Windows XP


behind Windows Firewall. You suspect that it has been under attack
and that Windows Firewall has successfully thwarted the attacks.
When you look at the Pfirewall log, it has many entries, including suc-
cessful connections, and it is hard to sort through all of them. How can
you reduce the number of entries in the log but still see if there are
dropped packets that might be attempted attacks?
ANSWER

In the Log Settings dialog box (Windows Firewall | Advanced tab | Security
Logging | Settings), clear the Log Successful Connections check box, and
leave the Log Dropped Packets check box selected.
LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 77

LAB CHALLENGE 11-1: CREATING A SIX-HOST SUBNET


Contoso has been given a Class C address by its ISP for a new satellite division. This
division is going to be broken up into smaller subnets that will communicate with
each other through routers when necessary. You want each subnet to have six hosts.

To complete this lab challenge:

1. Subnet 192.168.2.0 into subnets that can accommodate six hosts each.
2. Join with six classmates (or however many are available), and config-
ure your TCP/IP settings to communicate on this subnet.
3. Use the Ping command to confirm that all hosts on this network can
communicate, and ensure that pings to other networks fail.
4. Restrict the file and printer sharing exception in Windows Firewall to
include only your subnet.
5. Return your system to the 10.1.1.0/24 network.

IMPORTANT If you do not complete step 5, future labs will not work
correctly.

ANSWER

You must discuss with six classmates (or fewer) which subnet in the
192.168.2.0/29 address space you want to exist, and then configure your
IP address accordingly. The options are (using the last octet): 9 through
14, 17 through 22, 25 through 30, and so on.
Once you have assigned your IP address, use the subnet mask
255.255.255.248.
Ping hosts within your IP address subnet range, as you did earlier in this
lab, to check connectivity. Also ping other classmates configured in a
different 192.168.2.0/29 subnet.
To restrict the file and printer sharing in Windows Firewall to the local
subnet:
1. In the Windows Firewall dialog box, on the Exceptions tab,
select File And Printer Sharing, and then click Edit.
2. In the Edit A Service dialog box, click Change Scope.
3. In the Change Scope dialog box, select My Network (Subnet)
Only. Click OK.
4. In the Edit A Service dialog box, click OK.
5. In the Windows Firewall dialog box, click OK.
Once you have tested your new subnet, be sure to restore the previous
TCP/IP settings to the 10.1.1.0/24 network and to disable Windows
Firewall.
78 LAB 12 ANSWERS

LAB 12
MANAGING INTERNET EXPLORER CONNECTIONS
AND SECURITY

EXERCISE 12-2: INTERNET SECURITY

Internet Content Zones and Security Settings


2. Select Local Intranet, and then click Default Level. Repeat for Trusted
Sites and Restricted Sites.

QUESTION What are the default security levels for each Web content
zone?

ANSWER

The default security levels for the Web content zones are as follows:
■ Internet: Medium
■ Local Intranet: Medium-Low
■ Trusted Sites: Low
■ Restricted Sites: High
4. In the Security Settings dialog box, scroll until you find the entry Use
Pop-Up Blocker.

QUESTION What is the default setting in the Trusted Sites Web


content zone for the pop-up blocker?

ANSWER

The default setting for the pop-up blocker in the Trusted Sites Web
content zone is Disable.

EXERCISE 12-3: MAINTAINING INTERNET EXPLORER

Setting Cookie Options to Secure Privacy


1. In the Internet Options dialog box, on the Privacy tab, in the Settings
section, move the slider to High.

QUESTION What two sets of cookies does this setting block?

ANSWER

The two sets of cookies that are blocked at the High setting are cookies
that do not have a compact privacy policy and cookies that use person-
ally identifiable information without your explicit consent.
LAB 12 ANSWERS: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 79

2. Click Advanced.

QUESTION Although it is currently inactive, what option do you have


concerning session cookies? (Session cookies are cached only while a user
is connected to the issuing server and are deleted when the user closes
the session.)

ANSWER

You have the option to Always Allow Session Cookies. This can be a conve-
nient setting because session cookies are usually used to cache data
that you submit so that you do not have to submit it again during that
session.

EXERCISE 12-4: USING GROUP POLICY TO CONFIGURE


INTERNET EXPLORER
12. Open Internet Explorer.

QUESTION What does the title bar read in Internet Explorer?

ANSWER

The title bar in Internet Explorer reads: “Microsoft Corporation –


Microsoft Internet Explorer provided by Contoso”.

LAB REVIEW QUESTIONS


1. What protocol that can be administered by either a DHCP or a DNS
server provides a way for clients to receive the address of a proxy
server?
ANSWER

The Web Proxy Auto-Discovery (WPAD) protocol allows clients to receive


proxy addresses from DNS or DHCP servers.

2. List the four Web content zones in order of the least secure to the most
secure.
ANSWER

The four Web content zones in order of the least secure to the most
secure are Trusted Sites, Local Intranet, Internet, and Restricted Sites.
80 LAB 12 ANSWERS

3. What is the name of the small files that Web servers can store on your
computer to record information, and what are the two types?
ANSWER

Cookies are small files that can be stored by Web servers on clients to
store information. The two types of cookies are session and persistent.

4. A user has his computer configured to download certain Web pages


while he is online so that they will be available while he is offline. How-
ever, when he signs off Internet Explorer and starts it again, the files
are not available. What setting on the Advanced tab of the Internet
Options dialog box could cause this?
ANSWER

Offline files are stored with other temporary Internet files. The Empty
Temporary Internet Files Folder When Browser Is Closed setting will delete
these files when Internet Explorer is closed.

5. A user had a hard drive that was too full. She upgraded the hard drive
to a larger size, and she says that Internet Explorer is now faster. Why
would this be?
ANSWER

Internet Explorer caches Web elements, such as images, so that it can


obtain local copies rather than redundantly downloading offline copies
when it needs the elements. The user’s hard drive was probably too full to
accommodate this cache, so Internet Explorer was slow. Also, full hard
drives can cause performance problems for other reasons.

LAB CHALLENGE 12-1: USING INTERNET EXPLORER


AS AN FTP CLIENT
Your company has outsourced graphic design to a firm in Kazakhstan. The firm’s
designers have completed a round of proofs for a new concept in direct mail mar-
keting materials and have placed portable document format (PDF) files of the
proofs at the firm’s File Transfer Protocol (FTP) location.

You need to use Internet Explorer as an FTP client to retrieve the proofs.

To complete this lab challenge, do the following:

1. Install the FTP component of Internet Information Services (IIS).


2. Place two text files named Proof1.txt and Proof2.txt in the default FTP
folder.
LAB 12 ANSWERS: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 81

3. Log on with your student account, and access the FTP site on your
partner’s computer. Retrieve the Proof1 and Proof2 text files from your
partner’s FTP site to your desktop.

ANSWER

To install the FTP component of IIS, complete the following steps.


NOTE Before you begin the following steps, load your Microsoft Win-
dows XP installation CD into the CD-ROM drive. If the Welcome To
Microsoft Windows XP window appears, close it.

1. Ensure that you are logged on with your local Administrator


account.
2. From the Start menu, select Control Panel.
3. In Control Panel, click Add Or Remove Programs.
4. In the Add Or Remove Programs window, click Add/Remove Win-
dows Components.
5. In the Windows Components Wizard, in the Components list
box, select Internet Information Services (IIS) (not its check
box) and then click Details.
6. In the Internet Information Services (IIS) dialog box, select the
File Transfer Protocol (FTP) Service check box. Click OK.
7. In the Windows Components Wizard, click Next.
8. The Configuring Components page will appear and indicate
progress.
9. On the Completing The Windows Components Wizard page, click
Finish.
10. Close the Add Or Remove Programs window.
11. Close Control Panel.
To create the Proof1 and Proof2 text files on the FTP site, complete the
following steps:
1. From the Start menu, select My Computer.
2. Browse to C:\Inetpub\ftproot.
3. From the File menu, point to New and then select Text
Document.
4. For the name of the text document, type Proof1.txt and then
press ENTER.
5. Create a Proof2.txt file in the same way.
6. Log off.
To use Internet Explorer as an FTP client to transfer the Proof1 and
Proof2 text files, complete the following steps:
1.Log on with your Contoso student account (the password is
P@ssw0rd).
2. From the Start menu, select Internet Explorer.
82 LAB 12 ANSWERS

IMPORTANT Wait until you partner has completed the previous step
before continuing.

3. In Internet Explorer, in the Address text box, type ftp://


computeryy and then press ENTER.
4. In the Ftp://Computeryy page, select Proof1 and Proof2 (hold-
ing down the CTRL key to select more than one item), and from
the Edit menu, select Copy.
5. Close Internet Explorer.
6. On your desktop, right-click an empty space and then click
Paste.
LAB 13 ANSWERS: MANAGING USERS AND GROUPS 83

LAB 13
MANAGING USERS AND GROUPS

EXERCISE 13-1: CREATING USERS AND GROUPS

Testing a New Account


17. In the command prompt window, at the command prompt, type
whoami.

QUESTION What reply is displayed when you execute the Whoami


command?

ANSWER

When you execute the Whoami command, the reply COMPUTERXX\SteveL


is displayed.

EXERCISE 13-2: ASSIGNING USER RIGHTS

Assigning User Rights by User


1. Double-click the clock in the notification area.

QUESTION What is conveyed in the message that appears?

ANSWER

The message informs you that you do not have the privilege level required
to change the system time.

Understanding User Rights Application


2. From the Start menu, select Shut Down.

QUESTION The Members Of tab in the BobK Properties dialog box


states that BobK is a member only of the Bldg1 Users group. We did not
assign the Bldg1 Users group to the Shut Down The System right, so why
is the Shut Down option available in the drop-down list?

ANSWER

The Shut Down option is available because when you log on to the work-
station locally, you become a part of the Interactive Users dynamic group,
which is part of the Users group, which allows you to shut down the system.
84 LAB 13 ANSWERS

15. From the Start menu, select Shut Down.

QUESTION What options are available in the Shut Down Windows


dialog box?

ANSWER

The only available option in the Shut Down Windows dialog box is Log Off BobK.

EXERCISE 13-3: CONFIGURING ROAMING PROFILES

Testing the Roaming User Profile


5. Double-click Bldg1Profiles, and then double-click SteveL.

QUESTION Why are no files saved in the SteveL folder when we have
specified that as the location for profile data for your partner’s SteveL
local account?

ANSWER

The profile is cached locally until you log off. Once SteveL logs off from your
partner’s computer, the profile will be saved to C:\Bldg1Profiles\SteveL on
your computer.

8. In the My Computer window, browse to C:\Bldg1Profiles\SteveL.

QUESTION Are there files in this folder now?

ANSWER

Yes, files appear in C:\Bldg1Profiles\SteveL because the SteveL account


was logged off from your partner’s computer, and the cached profile was
saved on your computer.

LAB REVIEW QUESTIONS


1. Do you add users to a group by accessing the user’s properties or by
accessing the group’s properties?
ANSWER

To add a user to a group, you may either access the user’s or the group’s
properties.
LAB 13 ANSWERS: MANAGING USERS AND GROUPS 85

2. Eight users from disparate groups require NTFS permissions to read


and write to files in a shared folder located on a file server. The users
are from varying groups and have varying permissions and rights.
What is the best way to give them access to the folder?
ANSWER

To grant access to the shared resource to the eight users from dispar-
ate groups, create a new group, and give the group the Read and Write
NTFS permissions for the folder. Then add each of the users to the new
group.

3. You add a user to a group that you have created with a specific set of
rights for a new project. How can adding the user to this group affect
the user’s membership in other groups?
ANSWER

Adding a user to a group cannot subtract the user’s membership from


another group. However, it can in effect add the user to another group (or
groups) if the group the user is added to is a member of another group
(or groups).

4. It is conventional to state that rights are assigned to users or groups.


How is this incorrect?
ANSWER

To say that a user or group is assigned a right is incorrect if interpreted


literally, because users and groups are actually assigned to rights, not
vice versa.

5. You want members of the Contoso domain to be able to access their


desktops no matter where they log on from into the domain. What do
you need to configure to accomplish this?
ANSWER

You need to configure roaming profiles, which allow you to store users’
documents and settings, including their desktops, on a file share. This
allows users to access their desktops (and other items) from any com-
puter that can access the file share where the profile is stored.

LAB CHALLENGE 13-1: SCRIPTING WITH THE NET USER


AND NET LOCALGROUP COMMANDS
You need to configure workstations at 20 different Contoso branch locations with
a predetermined set of groups and members of the groups.
86 LAB 13 ANSWERS

Rather than doing this manually, you have decided to create a batch file using the
Net Localgroup command.

To complete this lab challenge, do the following:

1. Create a batch file that:


a. Creates a Management and Staff local users group.
b. Adds Patricia Doyle and Anna Lidman to the Management group,
with the usernames PatriciaD and AnnaL, respectively.
c. Adds Jeff Stamler and Dale Sleppy to the Staff group, with the
usernames JeffS and DaleS, respectively.
d. Prints to the screen a list of the local groups and group membership.
2. Run the batch file successfully, and log on with one user from each group.

TIP A batch file is a text file that contains commands that are exe-
cuted one at a time as if they were being typed directly into a command
prompt window. You can create a batch file by saving a text file as
name.bat. You can then run the batch file by typing path:name.bat at a
command prompt (for example, C:\Example.bat).
Chapter 13 of the textbook covers the use of the Net Localgroup
command. You can also get information by typing net localgroup /?
at a command prompt or by using the Help And Support Center
(search for Net localgroup).

ANSWER
1. Ensure that you are logged on locally with your Administrator
account.
2. From the Start menu, point to Accessories, and then select
Notepad.
3. In Notepad, type the following:
@REM Create the groups
net localgroup Management /add
net localgroup Staff /add

@REM Create and activate the users


net user PatriciaD P@ssw0rd /add /active:yes
net user AnnaL P@ssw0rd /add /active:yes
net user JeffS P@ssw0rd /add /active:yes
net user DaleS P@ssw0rd /add /active:yes

@REM Add the users to the Management group


net localgroup Management PatriciaD AnnaL /add

@REM Add users to the Staff group


net localgroup Staff JeffS DaleS /add

@REM Lists the local groups


net localgroup

4. From the File menu, select Save As.


5. In the Save As dialog box, in the File Name text box, type
“c:\addgroups.bat” and then click OK.
LAB 13 ANSWERS: MANAGING USERS AND GROUPS 87

6. Close Notepad.
7. Open a command prompt window.
8. At the command prompt, type cd c:\ and then press ENTER.
9. At the command prompt, type Addgroups.bat and then press
ENTER. The following text is an example from Computer07 of
the results.
C:\Documents and Settings\Administrator>cd c:\

C:\>addgroups.bat

C:\>net localgroup Management /add


The command completed successfully.

C:\>net localgroup Staff /add


The command completed successfully.

C:\>net user PatriciaD P@ssw0rd /add /active:yes


The command completed successfully.

C:\>net user AnnaL P@ssw0rd /add /active:yes


The command completed successfully.

C:\>net user JeffS P@ssw0rd /add /active:yes


The command completed successfully.

C:\>net user DaleS P@ssw0rd /add /active:yes


The command completed successfully.

C:\>net localgroup Management PatriciaD AnnaL /add


The command completed successfully.

C:\>net localgroup Staff JeffS DaleS /add


The command completed successfully.

C:\>net localgroup

Aliases for \\COMPUTER07

-------------------------------------------------------------
----
*Administrators
*Backup Operators
*Guests
*HelpServicesGroup
*Management
*Network Configuration Operators
*Power Users
*Remote Desktop Users
*Replicator
*Restricted Users
*Staff
*Users
The command completed successfully.

10. Log off and log on as either PatriciaD or AnnaL.


11. Log off and log on as either JeffS or DaleS.
88 LAB 14 ANSWERS

LAB 14
MANAGING COMPUTER SECURITY CONFIGURATION

EXERCISE 14-2: UNDERSTANDING SECURITY TEMPLATES

Examining Security Templates


8. In the Console1 console, in the console tree, expand Security Templates,
C:\Windows\Security\Templates, Compatws, and then select
Restricted Groups, as shown in the following figure.

GL14ht02.bmp

QUESTION What built-in group does the Compatws security template


contain in the Restricted Groups folder?

ANSWER

The Power Users group is restricted in the Compatws security template,


which means that if this security template is applied, members of the
Power Users group will be removed from that group, unless they appear in
a special list. Double-click Power Users in the details pane to see where
this list is configured. Click Cancel when done.

11. In the %SystemDrive%\ Properties dialog box, click Edit Security.

QUESTION From examining the Security For %SystemDrive%\ dialog


box, what type of policy does the File System node seem to be responsible
for defining in a template?

ANSWER

The File System node defines NTFS permissions (in this case, it contains
the default NTFS permissions for the system drive on a Microsoft Win-
dows XP system).
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 89

14. In the console tree, examine the Setup Security template node.

QUESTION In the Setup Security template, who is allowed the user right
Take Ownership Of Files Or Other Objects (Hint: User Rights Assignment
node)?

ANSWER

The Administrators group.

Examining Security Templates Using Notepad


5. Select the Compatws.inf file, and then click Open.

QUESTION In the previous task, a question about the Power Users


being a restricted group in the Compatws security template was asked.
What lines of code in the Compatws.inf file are likely responsible for the
fact that Power Users are a restricted group in the template?

ANSWER

The lines of code under [Group Membership] are the lines responsible for
the fact that in the Compatws template, the Power Users group is a
restricted group. The lines read as follows:
%SceInfPowerUsers%__Memberof =
%SceInfPowerUsers%__Members =

QUESTION The Compatws security template has by far more entries


for one group of items than any other. What set of items is that?

ANSWER

The Registry or Registry Keys have more entries than any other group of
items in the Compatws security template.

EXERCISE 14-4: USING THE SECURITY CONFIGURATION


AND ANALYSIS TOOL

Using the Security Configuration And Analysis Tool


for Analysis
11. In the console tree, expand Security Configuration And Analysis, expand
Local Policies, and then select Audit Policy.

QUESTION In the details pane, what does the red X flag on the Audit
Account Logon Events policy icon denote? (Hint: look at the items in the
Database Setting and Computer Setting column.)
90 LAB 14 ANSWERS

ANSWER

It denotes that the policy currently is defined both in the database and
the current configuration, but that the value is not the same.

12. In the console tree, select Security Options.

QUESTION In the details pane, what does the green check mark flag on
the Accounts: Guest Account Status policy icon denote?

ANSWER

It denotes that the policy currently is defined both in the database and
the current configuration and that the value is the same.

13. In the console tree, select System Services.

QUESTION Is there a flag on the Removable Storage service? If so,


describe it.

ANSWER

There is no flag marking this service.

19. Navigate to System Services under the Security Configuration And


Analysis node.

QUESTION What flag marks the Removable Storage service now?

ANSWER

The red X now marks the Removable Storage service because the policy
defined in the database was changed by the Bldg1ws security template
so that it is different from your computer’s current configuration.

Using the Security Configuration And Analysis Tool


for Configuration
6. In the console tree, under Security Configuration And Analysis,
expand Local Policies, and then select Audit Policy.

QUESTION In the details pane, why is there no longer a red X flag on the
Audit Account Logon Events policy icon?

ANSWER

Because the template has been applied, and the setting in the database
is no longer different from the setting configured on the computer.
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 91

EXERCISE 14-5: USING SECEDIT

Using Secedit to Validate a Template File


5. In the command prompt window, at the command prompt, type
secedit /validate Example.inf, and then press ENTER.

QUESTION What problem did the Secedit tool report?

ANSWER

Secedit reported that “This will cause an error not expected in section
System Access.”

EXERCISE 14-6: CONFIGURING LOGGING


5. In the details pane, double-click Audit Logon Events.

QUESTION By default, does the Audit Logon Events policy log success-
ful logons?

ANSWER

No, by default, the Audit Logon Events policy does not log successful
logons.

11. In the details pane, locate a Failure Audit with a Category of Account
Logon, as shown in the following figure. Double-click the event.

GL14ht06.bmp

QUESTION According to the Event Properties dialog box, what Event ID


is assigned to a failed, local logon attempt?

ANSWER

680 is the Event ID for a failed logon attempt.


92 LAB 14 ANSWERS

LAB REVIEW QUESTIONS


1. Currently, users are able to shut down a multiuser workstation without
logging on. This means that anybody can shut down the computer, as
long as nobody is logged on. You want to configure the workstation so
that it cannot be shut down when nobody is logged on. How can you
do this? (Hint: see Exercise 14-1.)
ANSWER

To prevent shutdown without logon, access the Local Security Settings


and disable the Shutdown: Allow System To Be Shut Down Without
Having To Log On security option.

2. In which type of file are security templates stored?


ANSWER

Security templates are stored in text files with the extension .inf.

3. When importing multiple templates into a database, how are conflicts


resolved?
ANSWER

The templates are applied cumulatively, and, in the case of direct


conflicts, the most recently loaded template’s settings win.

4. What are the four flags that are possible when using the Security
Configuration And Analysis snap-in, and what do they denote?
ANSWER
■ X in a red circle The policy is defined in both the database
and on the computer, and the values do not match.
■ Green check mark in a white circle The policy is defined in
both the database and on the computer, and the policies
match.
■ Question mark in a white circle The policy is not in the data-
base and therefore was not analyzed, or the user running the
analysis did not have sufficient rights to access the policy.
■ Exclamation point in a white circle The policy is defined in
the database, but does not exist on the computer.
5. You suspect that a user is logging on and trying to access network resources
that require credentials. Which auditing policy will help you to determine
if this is so, Audit Account Logon Events or Audit Logon Events?
ANSWER

The Audit Account Logon Events will help determine this. The Audit Logon
Events option audits Interactive (local) logons, and the Audit Account
Logon Events audits attempts to access network resources that require
credentials.
LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 93

LAB CHALLENGE 14-1: CREATING A SECURITY


TEMPLATE USING NOTEPAD
To better understand the syntax of a security template file, create a security
template in Notepad that configures the following (using an existing template
as a base):

■ Enforce password history for three passwords remembered


■ Minimum password length of five characters
■ Audit privilege use for failure
■ Allow Force Shutdown For A Remote System for Administrators
■ Allow Add Workstation To Domain for Authenticated Users

Once you have completed the template file, save it as Challenge.inf in the
C:\Windows\Security\Templates\Custom folder. Use the Secedit tool to validate
the file. Finally, ensure that the settings are as they should be by using the
Security Templates console that you created in Exercise 14-1.

ANSWER

The file should look similar to the following:


[Version]
signature="$CHICAGO$"

[System Access]
MinimumPasswordLength = 5
PasswordHistorySize = 3

[Event Audit]
AuditPrivilegeUse = 2

[Privilege Rights]
SeRemoteShutdownPrivilege = Administrators
SeMachineAccountPrivilege = Authenticated Users

Follow the procedure in the section entitled “Using Secedit to Validate a


Template File” in Exercise 14-5 to validate the .inf file that you create.
Using the Security Templates console, open the Challenge.inf template
and investigate the settings in the console tree that the Challenge.inf file
is supposed to configure. If the file was written correctly, each of the
settings that were to be configured will be reflected as such in the graph-
ical user interface (GUI).
94 LAB 15 ANSWERS

LAB 15
BACKING UP AND RESTORING SYSTEMS AND DATA

EXERCISE 15-1: USING THE BACKUP UTILITY

Backing Up Data and the System State


6. In the Backup utility, on the Backup tab, in the directory tree, select the
My Documents check box and the System State check box, as shown in
the following figure.

GL13ht01.bmp

QUESTION When System State is selected (the name and the check
box) in the directory tree, why are the check boxes in the detail pane
unavailable (grayed out)?

ANSWER

The System State is a collection of six separate items, which must be


backed up as a whole; it is not possible to select some components of the
System State data to backup, and not others.

8. In the Options dialog box, in the Default Backup Type drop-down list,
select Differential.

NOTE You might want to select the other options and read the descrip-
tions, if you are unfamiliar with them.

QUESTION Assume this is the third differential backup of these selec-


tions that you have made since the last normal backup. To restore this
information to the state of this backup, how many of the four backups
(the normal and the three differential) will you have to restore?
LAB 15 ANSWERS: BACKING UP AND RESTORING SYSTEMS AND DATA 95

ANSWER

You will have to restore two: the original normal backup and the last
differential backup.

QUESTION Given that you have selected Differential backup, what type
of backup method will be applied to the System State information?

ANSWER

The System State is always backed up in normal mode, regardless of the


setting elsewhere. Therefore, in this case, the My Documents folder will be
backed up differentially, and the System State information will be backed
up normally.

17. The Backup Progress dialog box will appear and indicate progress.
This task can take anywhere from 5 minutes to 15 minutes or more.

QUESTION When the backup is under way, you might notice in the
Status text box that the message “Preparing to backup using shadow
copy” appears. What is shadow copy, and why is it being used?

ANSWER

A shadow copy is a special copy of a file. This can be useful for several
purposes, but in this context, some files cannot be backed up because
other processes are using them. By creating a shadow copy that is
not being used by other processes, the Backup utility can back up the
shadow copy rather than the real copy. When the backup and thus
the restore are performed, the shadow copy is treated as if it were the
original copy.

EXERCISE 15-2: STARTING THE RECOVERY CONSOLE


7. At the command prompt, type chkdsk /? and then press ENTER.

QUESTION What are the two switches for Chkdsk?

ANSWER

The two switches are /P and /R, which force a check on a drive not flagged
as dirty, and attempt to recover readable information on bad sectors,
respectively.
96 LAB 15 ANSWERS

LAB REVIEW QUESTIONS


1. What is backed up when you select the System State for backup?
ANSWER

When you select the System State for backup, three separate compo-
nents are backed up: Boot Files, COM+ Class Registration Database, and
the Registry.

2. What are the five backup types, and how does each relate to the archive
attribute? (Hint: The archive attribute is set to denote a file for backup
and can be cleared to mark the file as backed up. Given this informa-
tion, you can deduce the treatment of the archive attribute for each
backup type by reading its description in the Options dialog box in the
Backup utility.)
ANSWER

The five types of backups and their relationships to the archive attribute
are as follows:
■ Normal: All files are backed up that are selected, regardless of
the archive attribute. Once the files are backed up, the archive
attribute is cleared.
■ Copy: All files selected are backed up, and the archive attribute
is ignored completely.
■ Differential: Selected files with the archive attribute set
are backed up, and the archive attribute is not modified after
backup.
■ Incremental: Selected files with the archive attribute set are
backed up, and the archive attribute of the backed up files is
cleared.
■ Daily: All files created or modified during the day are backed
up. The archive attribute is not used or modified.
3. There are three options when restoring a backup set as to where the
files are to be restored. What are the options, and what do they do?
ANSWER

The three location options for restored files in the Backup utility are Orig-
inal Location, Alternate Location, and Single Folder. The first two loca-
tions do what their names imply, and they retain the original folder
structure. The Single Folder option restores all files in the backup set to
the same folder, regardless of their locations in the original directory
structure.
LAB 15 ANSWERS: BACKING UP AND RESTORING SYSTEMS AND DATA 97

4. You are about to install third-party drivers for a legacy device that does
not have signed drivers. You are suspicious of the drivers. What feature
can you use so that you can easily undo the configuration if it fails?
ANSWER

You can use the System Restore feature, by creating a system restore
point before you install the drivers. If the configuration fails, you can roll
back your system to the system restore point.

LAB CHALLENGE 15-1: SCHEDULING BACKUP JOBS


A multiuser, standalone computer has noncritical user data stored on it. It is not
necessary to bother with a comprehensive backup plan for the system, but you
do want to back up user documents and settings and the system state once a
week on Thursdays at 3 A.M. The computer has a second, largely unused drive, to
which you are going to back up the files. You can then burn the backup file
to DVD, if you want.

To complete this lab challenge:

1. Create a backup job that creates a backup file named Backup.bkf to the
L drive every Thursday at 3 A.M., starting with January 1, 2004.
2. The backup job should not run unless the computer has been idle for
more than 10 minutes so that if a user is putting in a late night, he will
not be interrupted by a backup job.
3. The backup should be of type Normal so that a full data set is created
at each backup session.

ANSWER

To complete this lab challenge, do the following steps:


1. Ensure you are logged on locally with your Administrator
account.
2. Open the Backup utility.
3. On the Schedule Jobs tab, click the arrows in the appropriate
direction to get to January, 2004.
4. In the calendar, click Thursday the 1st so that it is active, and
then click Add Job.
5. In the Backup Wizard, on the Welcome page, click Next.
6. On the What To Backup page, select Backup Selected Files,
Drives, Or Network Data and then click Next.
98 LAB 15 ANSWERS

7. On the Items To Backup page, in the directory tree, expand My


Computer and then select the System State check box.
8. Expand Local Disk C: and then select the Documents And
Settings check box. Click Next.
9. On the Backup Type, Destination, And Name page, click
Browse.
10. In the Save As dialog box, click My Computer on the left, and
then double-click Data (L:).
11. In the File Name text box, type Backup.bkf and then press
ENTER.
12. On the Backup Type, Destination, And Name page, click Next.
13. On the Type Of Backup page, ensure that in the Select The
Type Of Backup drop-down list Normal is selected and then
click Next.
14. On the How To Back Up page, select the Verify Data After
Backup check box, and then click Next.
15. On the Backup Options page, click Next to accept the default
setting.
16. On the When To Backup page, ensure that Later is selected,
and in the Schedule Entry section, in the Job Name text box,
type Normal. Click Set Schedule.
17. In the Schedule Job dialog box, on the Schedule tab, in the
Schedule Task drop-down list, select Weekly.
18. In the Start Time spin box, select 3:00 AM.
19. In the Schedule Task Weekly section, select the Thu check box
and clear the Mon check box.
20. On the Settings tab, select the Only Start The Task If The
Computer Has Been Idle For At Least check box. In the spin
box, ensure that 10 is selected. Click OK.
21. In the Set Account Information page, in the Run As text box,
ensure that COMPUTER07\Administrator is entered. In the
Password and Confirm Password text boxes, type P@ssw0rd.
Click OK.
22. On the When To Back Up page, click Next.
23. On the Set Account Information page, in the Run As text box,
ensure that COMPUTER07\Administrator is entered. In the
Password and Confirm Password text boxes, type P@ssw0rd.
Click OK.
24. On the Completing The Backup Wizard page, click Finish.
25. In the Backup utility, the calendar should be marked with a
backup icon for every Thursday.
26. Close the Backup utility.
LAB 16 ANSWERS: MANAGING PERFORMANCE 99

LAB 16
MANAGING PERFORMANCE

EXERCISE 16-2: USING THE PERFORMANCE CONSOLE

Viewing Performance Statistics


9. Select the % Disk Write time counter in the counter pane, and then
press CTRL + H to highlight the line in the graph representing the
selected counter. An example of this is shown in the following
figure.

GL16ht04.bmp

QUESTION What two system resources were taxed the most during the
backup according to your data?

ANSWER

The % Disk Write Time and the % Processor Time counters indicated
that the physical disk and the processor were the most taxed resources
during the backup. The memory might have been taxed, depending on your
system.

EXERCISE 16-3: CONFIGURING PAGING FILES


20. In My Computer, double-click Local Disk (C:).

QUESTION Is the Pagefile.sys file still present?


100 LAB 16 ANSWERS

ANSWER

The Pagefile.sys file is no longer on drive C because it has been moved to


drive L (assuming you had enough room on your drive L to move it there).

QUESTION What is the size of the new Pagefile.sys file?

ANSWER

The size of the file is now static, so it is 1024 MB, or 1 GB (or whatever
value you set it to if you did not have 1024 MB available disk space).

LAB REVIEW QUESTIONS


1. Task Manager has graphs that track to resources. What are they?
ANSWER

Task Manager tracks CPU usage and page file usage.

2. The Performance console by default monitors three performance


counters. What are they?
ANSWER

By default, the Performance console monitors pages per second, average


disk queue length, and processor time.

3. A file server is becoming overloaded late in the afternoon, when the


call center employees tend to get a lot of calls. You work the morning
shift and are available during this time. How can you instruct the
Performance console to gather data for you while you are away?
ANSWER

You can schedule the creation of a counter log, and add any counters
that you wish to monitor to the log.

4. In what log does Event Viewer store log entries created by the Perfor-
mance console Alert function?
ANSWER

Alert log entries are stored in the Application log in Event Viewer.
LAB 16 ANSWERS: MANAGING PERFORMANCE 101

5. A user is running out of space on drive C. What is the name of the file
that acts as memory for the computer you can move to mitigate the
problem, and where do you configure its location?
ANSWER

The name of the file is Pagefile.sys. It is moved by accessing the Computer


Properties dialog box on the Advanced tab, clicking Settings in the
Performance section, selecting the Advanced tab in the Performance
Options dialog box, and clicking Change.

LAB CHALLENGE 16-1: CREATING A PERFORMANCE LOG


You have just been given a new computer system to put into your spacious
cubicle at Contoso, Ltd. You want to get some idea of its performance, so you
are going to create a performance log and complete some strenuous tasks.

To complete this lab, do the following:

1. Create your own counter log named ComputerxxPLog so that it


contains the three default counters that Performance monitor tracks,
along with the % Disk Time counter of the physical disk object.
2. Start the log, and begin a backup of the System State. Let it run for five
minutes.
3. Play 3-D Pinball for 15 minutes. (See what happens when you
complete 16 labs? You get to play 15 minutes of Pinball!)
4. Stop the log and view it. Notice the difference in resource use of
Backup versus Pinball.

ANSWER
1. Open the Performance console.
2. In the Performance console, in the console tree, expand Perfor-
mance Logs And Alerts and then select Counter Logs.
3. From the Action menu, select New Log Settings.
4. In the New Log Settings dialog box, in the Name text box, type
ComputerxxPLog and then press ENTER.
5. In the ComputerxxPLog dialog box, click Add Counters.
6. Add the following counters:
❑ % Processor Time (processor object)
❑ Pages/Sec (memory object)
❑ Avg. Disk Queue Length (physical disk object)
❑ % Disk Time (physical disk object)
7. In the Add Counters dialog box, click Close.
102 LAB 16 ANSWERS

8. In the ComputerxxPLog dialog box, on the Schedule tab, select


Manually (Using The Shortcut Menu). Click OK.
9. In the ComputerxxPLog message box, click Yes to create the
C:\PerfLogs folder.
10. In the Performance console, in the details pane, right-click
ComputerxxPLog and then select Start.
11. Minimize the Performance console.
12. Start a backup of the system state using the same technique
as in Exercise 16-2, “Using the Performance Console,” to create
system activity. Let the backup run for 5 minutes or to com-
pletion, whichever comes first.
13. From the Start menu, point to All Programs, Games, and then
select Pinball.
14. Play Pinball for 10 to 15 minutes, and then exit.
15. Restore the Performance console.
16. In the details pane, right-click ComputerxxPLog and then
select Stop.
17. In the console tree, select System Monitor.
18. Click the View Log Data button in the toolbar (the fourth icon
from the left).
19. In the System Monitor Properties dialog box, on the Source
tab, select Log Files and then click Add.
20. In the Select Log File dialog box, browse to C:\Perflogs and
then select ComputerxxPLog_000001.blg. Click Open.
21. In the System Monitor Properties dialog box, click OK.
22. In the Performance console, try to determine where in the
graph you switched from Backup to Pinball. Experiment with
viewing the data in different formats using the options in the
toolbar.

You might also like