Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 12

Chapter 12

1.D. The dimmed screen and request to confirm your intent is a UAC prompt, which was first introduced in Windows Vista and refined in Windows 7. Nothing is wrong with your Microsoft Office media, and this does not indicate any need for configuring application compatibility options.
2.B. By default in Windows 7, you receive a UAC prompt only if you are using a nonadministrative user account. In Windows Vista, you always received a UAC prompt; in Windows 7, this is true only if you change the UAC settings and select the Always notify me when option. You never have to log off from a standard user account and log back on as an administrator; you merely have to supply an administrative password. The latter option occurs only if you’ve configured the Never notify me option in the UAC settings.
3.D. The red title bar and shield indicate that the program is a high-risk program that Windows has blocked completely. You cannot run it in its present form. No command buttons are provided on this message box, so it is impossible to click Yes to run the program.
4.C. By enabling the Admin Approval Mode for the Built-In Administrator account policy in Group Policy, you configure the built-in Administrator account to display UAC prompts in the manner as governed by the User Account Settings Control Panel applet setting in use. Configuring options in this applet without enabling the Admin Approval Mode for the Built-In Administrator account policy does not change the behavior of the built-in Administrator account, which by default does not display any UAC prompts.
5.C. You should enable the Behavior of the elevation prompt for standard users policy and then select the Automatically deny elevation requests option. This option prevents any applications that require administrative credentials from running. Either of the Prompt for credentials options would display a UAC prompt that requests an administrative password, but these would still allow these programs to run. Enabling the Only Elevate executables that are signed and validated policy would perform public key infrastructure signature checks on programs requiring elevated privileges but would still allow programs that pass this check to run.
6.A. Credential Manager is a Windows 7 utility that stores logon credentials and makes them available when needed. You can also use this utility to modify or remove existing credentials. Certificate Manager works only with certificates; it does not work with logon names or passwords. The Security tab of the Internet Options dialog box only enables you to configure security zones. The Content tab of the Internet Options dialog box enables you to use certificates for encrypted Internet connections and identification, but not usernames or passwords.
7.B. When you use Credential Manager to back up the credentials from one Windows 7 computer, it is then possible to restore this backup to a different computer so that you can use the credentials for logging on to this computer. You might be able to use Windows Backup, but this backs up far more than what is needed. Because you can use Credential Manager in this manner, it is not necessary to copy the credentials or to reenter them at the websites.
8.A, B, D. E. The Properties dialog box for a certificate enables you to perform all these functions. However, you cannot modify the validity period for the certificate; this action requires that you contact the issuer of your certificate, even if it is a local company certificate server.
9.E. The Store passwords using reversible encryption policy weakens security because it stores passwords in a format that is essentially the same as plain text. You should enable this policy only if needed for clients that cannot use normal encryption.
10.C. By default, the Backup Operators built-in group is granted the user rights for backing up and restoring files and directories, which enables Carolyn to perform these tasks. You could grant her the Back up files and directories user right and the Restore files and directories user right, but it is simpler to make her a member of the Backup Operators group, which is granted these rights by default. The Administrators group would give her more privileges than required. The Power Users group exists only for backward compatibility with Windows XP and older Windows versions; further, it would not give her the required privileges.
11.A. Distributed Cache mode of BranchCache enables users to cache copies of files and folders from the head office server to client computers without the need for a branch office server. Hosted Cache mode would require a Windows Server 2008 R2 server in the branch office. Copying the contents of the head office shared folder to a shared folder would be possible but would not keep this share up-to-date and would not likely minimize bandwidth needs. FRS also would not minimize bandwidth needs.
12.B. Because the branch office has a server available to all users, it is best to use BranchCache in the Hosted Cache mode. It would be possible to use the Distributed Cache mode, but when client computers containing cached content were offline, additional bandwidth would be used to access content on the head office server. Copying the contents of the head office shared folder to a shared folder would be possible but would not keep this share up-to-date and would not likely minimize bandwidth needs. FRS also would not minimize bandwidth needs.
13.B, D. You need to upgrade all client computers to Windows 7 Enterprise and upgrade the server to Windows Server 2008 R2. BranchCache is a new Windows 7 feature that requires client computers to be running Windows 7 Enterprise or Ultimate and requires servers to be running Windows Server 2008 R2. A lower level of either operating system will not work. It is not necessary to install DNS on the server, nor is it necessary to configure it as a file and print server.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free 10-Day Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint