Solutions to Chapter 4 Lab Exercises

Total Page:16

File Type:pdf, Size:1020Kb

Solutions to Chapter 4 Lab Exercises

Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Lab Manual Solutions Chapter 19

Solutions to Chapter 19 Lab Exercises

In this section, you’ll find solutions to the lab exercises, Lab Analysis Test, and Key Terms Quiz.

Lab Solution 19.01

Steps 1–2 These are actions to perform and do not require solutions.

Step 3 Fred can make a folder. Simple file sharing gives all accounts full access to the Shared Documents folder.

Step 4 Fred can open the Fred folder and the All Users folder. Attempting to open the others displays an Access is denied message.

Step 5 The administrator account can open any folder.

Steps 6–7 These are actions to perform and do not require solutions.

Step 8 The Welcome screen was designed as a much simpler alternative to the classic logon screen. While Windows works well in a complex domain-based environment, Microsoft recognizes that many users simply do not need the power of the classic logon. The classic logon gives a user the option to log on locally to the computer or to a domain, while the Welcome screen is only for local logon.

Step 9 With Fast User Switching enabled, a user logging off is prompted with two choices: Switch User or Log Off. Fast User Switching is handy when somebody needs to “borrow the computer for a minute,” or when one user needs to keep a program running while another user does something else. The downside to Fast User Switching is that it perceptibly slows down the system.

Lab Solution 19.02

Step 1 This step does not require a solution.

Step 2 When you created an account in that fashion, you were actually assigning it to either the Administrators group or the Users group. A “limited” account is a member of the Users group.

Copyright © 2007 by The McGraw-Hill Companies Page 1 of 4 Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Lab Manual Solutions Chapter 19

Step 3 The Local Users and Groups utility is flexible and provides at least two different ways to assign users to groups. The Power Users group is typically empty on a new Windows XP system.

Step 4 These are actions to perform and do not require solutions.

Step 5 Exactly what you see here varies by the system, but you should see at least CREATOR OWNER, Everyone, and System.

Step 6 When you click Modify, you get a number of NTFS permissions assigned automatically.

Steps 7–10 These are actions to perform and do not require solutions.

Step 11 Power Users get Read & Execute, List Folder Contents, and Read permissions.

Step 12 These are actions to perform and do not require solutions.

Lab Solution 19.03

Step 1 The JANET account’s password will not be accepted until it is at least seven characters long and contains upper- and lowercase characters as well as numbers. There is some flexibility here; for example, if the password is very long, it may not need both alpha and numeric characters.

Step 2 The entire goal of password history is to force users to use different passwords each time they change them. This is most commonly used when you set the maximum password age to something other than zero, making users change their passwords from time to time.

Step 3 Account lockout duration defines how long it will be before the user may attempt to log on again. Reset account lockout counter after determines how long the computer remembers the total number of failed logons, even if the user does log on successfully. For example, if you tried to log on twice and failed, but then logged on successfully, you still have two “strikes” against you. If you unsuccessfully attempt to log on again before this timer is done, you will then have three “strikes.”

Copyright © 2007 by The McGraw-Hill Companies Page 2 of 4 Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Lab Manual Solutions Chapter 19

Step 4 Fred is not a member of either Administrators or Power Users, so he will not be able to change the time. The best way to ensure that a policy change is successful is to test it—try asking Fred to attempt to change the system time.

Lab Solution 19.04

Step 1 Most of these scanner utilities are thorough and can take quite a long time—up to an hour on some systems.

Step 2 It’s extremely common for different spyware tools to find different threats. Most of the threats will be located in the registry or in the Cookies folder. Many malware programs are actually not threatening, so the anti-spyware makers generally use different threat levels to indicate an item’s likelihood to cause harm.

Step 3 Antivirus tools vary greatly in terms of their features. One item to watch out for is where they search. For example, Avast! (like many other programs) dynamically scans e-mail, instant messages, and Web pages as well as your memory and hard drive.

Answers to Lab Analysis Test

1. Jen just needs to give her mother’s user account a password. By default, Windows doesn’t show a logon screen if there is only one account (other than Administrator) and that account does not have a password.

2. He needs to log on as administrator and change the Local Security policy for his account. He could also just add himself to the Administrators or Power Users group.

3. He needs to turn off simple file sharing, create two folders, and configure NTFS permissions for his two co-users.

4. He could use simple file sharing and keep all of his personal information in folders on his desktop.

5. She needs to install good antivirus and anti-spyware programs and turn on her firewall.

Answers to Key Terms Quiz

1. Power Users

Copyright © 2007 by The McGraw-Hill Companies Page 3 of 4 Mike Meyers’ A+ Guide to Managing and Troubleshooting PCs Lab Manual Solutions Chapter 19

2. Read & Execute

3. Modify

4. exceptions

5. Local Security policy

Copyright © 2007 by The McGraw-Hill Companies Page 4 of 4

Recommended publications