labs

¡Supera tus tareas y exámenes ahora con Quizwiz!

You are the IT administrator for the CorpNet domain. You have decided to use groups to simplify the administration of access control lists. Specifically, you want to create a group containing the department managers. In this lab, your task is to use Active Directory Users and Computers to complete the following actions on the CorpDC server: In the Users container, create a group named Managers. Configure the group as follows:Group scope: GlobalGroup type: Security Make the following users members of the Managers group: Organization UnitUsernameAccountingMark WoodsResearch-DevPat BentonMarketing\MarketingManagersJuan SuarezResearch-Dev\ResearchManagersArlene KimblySales\SalesManagersMark BurnesSupport\SupportManagersShelly Emery

8.2.7

You are an IT administrator for your company. One of the company's top executives, Isabel, has complained that her computer takes longer to start up over the past few months. This morning, when Isabel powered on her computer, it started, but had several error messages. In this lab, your task is to use the System Configuration tool (MSconfig.exe) to configure Isabel's computer to boot as follows: Disable all non-Microsoft services from starting at startup. Disable all startup programs that have a high or medium startup impact. Do not restart Isabel's computer.

11.9.3

You need to customize how Windows Update checks for and installs updates on the ITAdmin desktop system in your organization. In this lab, your task is to: Configure Windows Update to:Install updates for other Microsoft products when Windows is updated.Allow the installation of feature updates to be deferred 60 days.Allow quality updates to be deferred 30 days. Configure Windows to automatically download manufacturers' apps and custom icons for devices.

12.1.4

You would like to have the ability to to restore your computer to a previous point in time should an error occur. You would also like the ability to restore previous versions of files where possible. In this lab, your task is to configure and enable system protection as follows: Set a maximum of 5% of disk space for restore points on the C: volume. Set a maximum of 7% of disk space for restore points on the D: volume. Create a manual restore point and give it a name of your choosing.

12.3.3

You recently upgraded the Exec computer from Windows 8 to Windows 10. To protect valuable data, you need to implement backups on this computer. In this lab, your task is to configure automatic backups for the Exec computer as follows: Save the backup to the Backup (E:) volume. Back up files daily. Keep backup files for 6 months. Back up the entire Data (D:) volume. Make a backup now.

12.4.4

Zoey has been hired by your organization. She will be using the computer named Office1, and she needs a local account. In this lab, your task is to create Zoey's local user account using the Windows Settings application. While creating the new account, use the following information: User information:Username: ZoeyPassword: eyeLoveS@ccer Security questions: Security QuestionAnswer1. What was your first pet's name?Spot2. What's the name of the city where you were born?Cambridge3. What's the name of the city where your parents met?London

8.2.4

During a security audit, you discovered that the Susan user account on the Office2-lap Windows 10 notebook doesn't have a password assigned to it. This notebook is used to deliver sales presentations at client sites, so you want to assign a strong password to this account to prevent unauthorized users from accessing data on the system. The laptop is logged into the Susan account. In this lab, your task is to complete the following: Use the Windows Settings application to access user account settings. Assign a password of p@ssword2 to the Susan user account.

8.2.5

Listen to simulation instructions You are the IT administrator for a corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. You have created an Active Directory structure based on the company's departmental structure. While creating the structure, you added a Workstations OU in each of the departmental OUs. After further thought, you decide to use one Workstations OU for the entire company. As a result, you need to delete the departmental Workstations OUs. In this lab, your task is to delete the following OUs on CorpDC: Within the Marketing OU, delete the Workstations OU. Within the Research-Dev OU, delete the Workstations OU. Within the Sales OU, delete the Workstations OU.

4.2.7

Susan produces your organization's monthly magazine. While working on an upcoming issue, Susan accidentally deleted significant portions of the layout image. She also made extensive changes to the cover artwork, but has now been asked to discard the changes and use the original artwork. Susan has asked you to help her recover older versions of her files in the Pictures library so she can still meet her publishing deadline. In this lab, your task is to complete the following: Using the Settings app, access the program needed to restore files from a current backup. From the File History dialog, restore the following files: FileFile Version to RestorePictures\Layouts\June2020_Issue.jpgWednesday, March 16, 2020 11:15 AMPictures\Images\coverart.jpgWednesday, March 16, 2020 12:15 PM

12.5.2

While performing administrative tasks on the Office1 computer, you notice that User Account Control (UAC) notifications are not being displayed when privilege escalation is required. The company policy specifies that UAC notifications should only be displayed when applications try to make changes to the computer, not when the Administrator user makes changes to Windows settings. In this lab, your task is to configure UAC settings to comply with the company standards and best meet the needs of the Office1 computer.

7.2.6

Your organization's receptionist inadvertently deleted a large portion of a departmental expense report and then saved the file. The report contained very important information, and the receptionist needs you to restore the most recent version of the file. You need to perform this without affecting any of the other files in the D:\Finances directory of the receptionist's Windows 10 laptop. In this lab, your task is to restore the most recent previous version of the 2020Report.xlsx file located in D:\Finance\Reports on the receptionist's laptop. As you complete this lab: Determine the current modified date for the file. Answer Question 1. Restore the file to the most recent previous version. Determine the new modified date. Answer Question 2.

12.5.3

You recognize that the threat of malware is increasing. As such, you would like to use Windows Virus & Threat Protection to protect your computer from malware. In this lab, your task is to enable and configure Windows Virus & Threat Protection as follows: Add a file exclusion for D:\Graphics\cat.jpg. Add a process exclusion for welcome.scr. Locate the current threat definition version number. Answer Question 1. Check for updates. Answer Question 2. Perform a quick scan.

13.2.2

You have just started college and have set up a desktop computer in your dorm. Your computer will be used for online research, interacting with friends using social media, and managing your finances through your bank's website. You are concerned about privacy and security. Additionally, you don't want to be distracted by unwanted popup ads. In this lab, your task is to configure Internet Explorer's settings as follows: Configure how cookies are handled as follows:Accept first-party cookies.Block third-party cookies.Always allows session cookies.Configure an exception to always allow cookies from MyBank.com. Allow pop-ups when managing your money through MyBank.com. Set a blocking level for all other pop-ups to High. Add additional internet security by setting the security level for the Internet zone to High.

2.6.7

You use Internet Explorer as your web browser on the desktop computer in your dorm room. You are concerned about privacy and security while surfing the web. You are also concerned about exploits that harvest data from your Internet Explorer browsing history. In this lab, your task is to delete all items from your Internet Explorer browser history, including: Favorite website data Temporary internet files and website files Cookies and website data History Download History Form data Passwords Tracking Protection, ActiveX Filtering, and Do Not Track

2.6.8

You are the IT administrator for a small corporate network. You have just installed Active Directory on a new Hyper-V guest server named CorpDC. Now you need to create an Active Directory Organizational Unit (OU) structure based on the company's departmental structure. In this lab, your task is to create the following organizational units (OUs) on the CorpDC server and ensure that each is protected from accidental deletion: Beneath the CorpNet.xyz domain, create the following OUs:AccountingAdminsMarketingResearch-DevServersSupportWorkstationsSales Within the Sales OU, create the following OUs:SalesManagersTempSales

4.2.6

You work as the IT security administrator for a small corporate network. The employee in Office 1 is working on a very sensitive project. Management is concerned that if the hard drive in the computer were stolen, sensitive information could be compromised. As a result, you have been asked to encrypt the entire System volume. The Office1 computer has a built-in TPM on the motherboard. In this lab, your task is to configure BitLocker drive encryption as follows: From within the computer's BIOS, turn on and activate TPM Security. From Windows, turn on BitLocker for the System (C:) drive. Back up the recovery key to the \\CorpServer\BU-Office1 folder. Encrypt the entire System (C:) drive. Use the new encryption mode. Run the BitLocker system check.

10.4.5

You are a freshman at a university. You are new to this area, so you want to use the Windows 10 location service for directions to stores and information about weather. In this lab, your task is to enable the Windows 10 location service and allow the following apps to use this service: Microsoft Edge Weather Maps

10.5.3

You have just started a new job. You have been given a laptop that belonged the person who previously held your position. You want to modify the power plan settings to meet your preferences. In this lab, your task is to configure the power settings using the following parameters: Set the following as the default behavior for the power and sleep buttons and lid settings (for all existing power plans):On battery: HibernatePlugged in: Sleep Set the computer to use the High Performance power plan. Modify the High Performance power plan settings as follows: On batteryPlugged inTurn off the display:5 minutes1 hourPut the computer to sleep:30 minutes5 hoursWhen the lid is closed:HibernateDo Nothing

10.6.6

You will be flying to another location to give a presentation to the board of trustees. While traveling, you will be using your computer on battery power to finalize your presentation. You hope to be able to plug in your machine while giving your presentation, but you're not sure if this will be possible. You want to create a power plan that won't interfere with your presentation if you cannot plug the machine into a power source. In this lab, your task is to create a custom power plan using the following specifications: Create a custom power plan called Presentation based on the Balanced plan. Configure the new plan using the following settings: On BatteryPlugged InTurn off the display:1 hourNeverPut the computer to sleep:2 hoursNever Make the new power plan the current plan and configure the hard disk settings as follows: On BatteryPlugged InTurn off hard disk:15 minutes0 minutesLow battery action:HibernateDo nothing

10.6.7

The Archives folder on your server is shared with the other computers on your network. The share name is Archives. When client computers access a file in the shared folder, you want them to automatically cache a copy of the file. In this lab, your task is to configure the offline settings for the Archives folder as follows: Allow automatic caching of the H:\Archives folder's files. Allow caching of program files to optimize performance.

10.7.8

You plan to use AppLocker to control which applications users can run on their desktop systems. You are testing this ability on the Office1 computer to determine which AppLocker settings are needed. The rules that you have created are not being enforced. As a result, you have determined that you need to enable the service used to enforce the AppLocker rules. Prior to this test, you made a backup using the Backup and Restore console. You noticed that backups were not being created for open files. You need to enable the service that manages Volume Shadow copies so you can back up open files in the future. In this lab, your task is to set the following services to start automatically and then start the services: Application Identity Volume Shadow Copy

11.1.4

Your computer has a single paging file managed by the system on the system volume (C:). To increase system performance, you would like to move the paging file to the D: volume. In this lab, your task is to: Disable the automatically managed page file. Delete the paging file on the C: drive. Create a paging file on the D: drive using the following settings:Initial size = 2048Maximum size = 3072 Reboot to apply changes.

11.6.3

You are a network technician for a large corporate network. An employee named Jacob is having trouble connecting to a required website. Before you spend too much time troubleshooting this issue, you want to see if Jacob's computer can connect to the internet service provider. Jacob works in another building across campus, and you don't have time to walk to his office. In this lab, your task is to test Jacob's connection to the ISP using remote PowerShell commands. As Jacob, enable PowerShell remoting on the Office2 computer. As the network technician, on the ITAdmin computer, use remote PowerShell to run the tracert 65.86.1.1 command on Jacob's computer. Answer the question.

11.7.4

You need to customize the Remote Desktop settings on your computer to allow Tom Plask, a help desk technician, remote access to your computer. In this lab, your task is to complete the following: Enable Remote Desktop. Allow Tom Plask to connect to your computer using a Remote Desktop connection. Verify that the firewall ports for Remote Desktop are opened appropriately.

11.8.4

You are having difficulty using a particular application and have called the Help Desk team for assistance. The Help Desk would like to use the Remote Assistance feature to watch what you are doing and show you what steps you should take to rectify the issue. In this lab, your task is to: Enable Remote Assistance, including the ability to allow it to be controlled remotely. Configure the invitations settings as follows:Invitations valid for 1 hour.Invitation only allowed for computers using Windows Vista or later.

11.8.9

You are the network system administrator for your company. You are concerned about protecting the domain credentials used in your Windows 10 Enterprise environment. You know that, by default, Windows stores credentials in the Local Security Authority (LSA), which is a process in memory. If attackers are able to gain privileged access to an endpoint, they can query the LSA for the secrets in memory and compromise a hash or ticket. The compromised item could be used in a Pass-The-Hash or Pass-The-Ticket attack to elevate privileges further and move laterally within your organization. To help protect these credentials, you have decided to use Windows Credential Guard's virtualization-based security. In this lab, your task is to complete the following on the CorpDC server: For the CorpNet.xyz/Default Domain Policy, enable Device Guard's Virtualization Based Security. Configure Virtualization Based Security using the following specifications:Use a platform security level that only supports computers that do not have DMA hardware.Enforce kernel mode memory protections and ensure that the Code Integrity path is protected. Make sure this setting cannot be disabled remotely.Make sure that Credential Guard cannot be disabled remotely.Enable Secure Launch Configuration.

13.3.4

You work in the IT department. You need to protect your company's computers from malware that uses exploits to spread and infect systems. As part of your protection strategy, you are using Microsoft's Windows Defender Exploit Guard protection. After doing extensive testing, you have determined that all of the exploit protection settings can be turned on without any adverse effects. In this lab, your task is to ensure that all exploit protection system setting will be turned on for all computers using a Group Policy.To complete this task, use the following information: On ITAdmin: Configure the required exploit protection settings. Export the settings to the shared GPO folder located on the CorpDC server. While exporting, use the default filename. On CorpDC: In the CorpNet.xyz domain, create a GPO named Exploit Protection. Enable and configure the Exploit Protection GPO to use the C:\GPO\Settings.xml file located on this machine.

13.4.4

You are a member of the IT team for your company. Part of your company's security strategy is to implement Microsoft's Windows Defender Application Control (WDAC) to restrict the applications that users are allowed to run on their systems. In this lab, your task is to use PowerShell to create a code integrity policy (CIP) on the Office2 computer (a golden system). Then you will create and implement a group policy object (GPO) to implement this policy company-wide. Use the following while completing this lab: Policy File Information: When running the command to create the code integrity policy, use the -Level Pca and -UserPEs flags. Scan the entire C:\ drive. Name file final binary policy MyCIP.bin Copy the MyCIP.bin policy to the CorpDC computer and save it in the WDAC file share. The C:\WDAC folder on CorpDC is shared as WDAC. GPO Information: On CorpDC, in the CorpNet.xyz domain, create a GPO named WDAC . For Device Guard, enable and configure the Deploy Windows Defender Application Control setting to use the code integrity policy file you saved.

13.6.4

You have a new laptop that is running Windows 10. You notice a security message indicating that Windows Firewall has been disabled. The laptop is currently connected to your organization's network, and the Domain network profile settings are in effect. You plan to travel this week and connect the laptop to various airport Wi-Fi hotspots. You need to enable Windows Firewall for any public network. In this lab, your task is to configure Windows Firewall as follows: Turn on the Windows Firewall for the Public network profile only. In addition to the programs and ports currently allowed, allow the following service and programs through the firewall for the Public network profile only:A service named Key Management ServiceAn application named Arch98An application named Apconf

13.8.4

You have been asked to install and configure a new printer for the salesperson working in Office 1. The printer has been connected to the LPT2 port on the computer. Because parallel port printers are not Plug and Play compatible nor automatically detected by the operating system, you need to manually create a printer object for this printer. In this lab, your task is to configure a printer object for the printer locally connected to the Office1 computer's LPT2 port using the following specifications: Printer manufacturer: Canon Printer model: Canon Inkjet E500 series Printer name: Sales Do not share the printer. Configure the new printer as the default printer.

2.5.3

An HP LaserJet printer was recently shared throughout your network. You need to connect to the new shared printer and prevent Windows from changing the default printer. In this lab, your task is to: Turn off Windows management of the default printer. Add the shared HPLaserJet printer. Configure the HPLaserJet printer as the default printer.

2.5.4

You have connected a printer directly to the Office1 computer. Now you need to share this computer with other users on the network. In this lab, your task is to share the printer on the Office1 computer and then add the shared printer to the Office2 computer as follows: On Office1:Share the HP LaserJet 3050 PCL 6 printer using the share name HPLaserJet (no space in the name).While sharing the computer:Allow clients to render print jobs on their own computers.List the printer in the directory. On Office2:Add the shared HPLaserJet printer connected to Office1 to the list of available printers.Make HPLaserJet the default printer.

2.5.5

You are a member of your company's IT team. Your company has decided to make Microsoft Edge the default web browser. Since the change was made, you have discovered that several websites that employees use require Internet Explorer (IE) 8 to properly render. To allows easy access to IE 8, you have decided to implement Enterprise Mode for both IE and Microsoft Edge. In this lab, your task is to enable and configure Enterprise Mode on the CorpDC server for both IE and Microsoft Edge using the following parameters: Create a new group policy in the CorpNet.xyz domain named Enterprise Mode. For the Enterprise Mode policy:Enable the setting required to give all users on every computer the ability to access Enterprise Mode from the IE tools menu.For both IE and Microsoft Edge, enable and configure the settings that will give all users on every computer the ability to use the C:\EnterpriseMode\Weblist.xml site list file.

2.6.11

You have been asked to perform administrative tasks for a computer that is not a member of a domain. You want to stop the system from displaying User Account Control (UAC) prompts when the administrator performs a task that requires administrative permissions. You also want to prevent the standard user accounts on the system from elevating permissions. In this lab, your task is to configure the UAC policies as follows: Policy NameSettingUser Account Control: Behavior of the elevation prompt for standard usersAutomatically deny elevation requestsUser Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode Elevate without prompting

7.2.7

You have been asked to add a VPN connection on a laptop computer in your organization. The sales team uses this computer to deliver sales presentations. They need to establish a secure connection to the company network while working on the road. You need to choose a VPN type that operates using firewall ports that are commonly left open. You also need to use the most secure password-based authentication possible without using a smart card. In this lab, your task is to configure and establish a VPN connection on the Office2-Lap using the following information: Add a VPN Connection as follows:VPN provider: Windows (built-in)Connection name: SalesVPNServer name or address: 198.10.20.12VPN type: Secure Socket Tunneling Protocol (SSTP)(SSTP works by encapsulating PPP traffic over the SSL channel of the HTTPS protocol. This type of VPN runs on port 443, which is typically left open in most network firewalls.)Type of sign-in info: User name and passwordDon't allow Windows to remember authentication credentials Set VPN security properties to meet the following requirements:VPN type: Secure Socket Tunneling Protocol (SSTP)Authentication: Microsoft: Secured password (EAP-MSCHAP v2) (encryption enabled)(This is the most secure password-based authentication protocol.) Connect to the VPN as follows:Username: MaryS49Password: Sm@rt72#

4.3.6

You have decided to upgrade your network adapter to a Gigabit Ethernet adapter. You have already installed the network card into a free PCI slot and downloaded the latest drivers from the manufacturer's website. At this point, both the new Gigabit Ethernet adapter and the original Fast Ethernet adapter are installed on your computer. Rather than remove the slower network adapter, you decide to leave it in your computer. However, you do not want Windows to use the network adapter. In this lab, your task is to use Device Manager to complete the configuration of your network adapters as follows: Update the device driver for the Broadcom network adapter using the driver saved in the D:\drivers folder. Disable the Realtek network adapter.

5.1.4

You have recently experienced the following issues on your computer: The new Broadcom network adapter you recently installed is experiencing very slow transfer speeds. The drivers for the video card were recently updated, and now your computer is crashing periodically. You suspect that the new drivers may be the cause. In this lab, your task is to use Device Manager to resolve network adapter issues as follows: Disable the Broadcom network adapter until a fix can be found. Enable the RealTek network adapter to take the place of the Broadcom adapter. Update the drivers for the RealTek network adapter using Microsoft Update. Find the current driver date for the display adapter. Answer Question 1. Roll back the display driver to its previous version. Answer Question 2.

5.1.8

You are managing the development of a new product version. You need to copy the project schedule to your OneDrive account so that you can access it wherever you are. You have already set up and logged in to your Microsoft online user account to use with your Windows 10 system. In this lab, your task is to copy the C:\Projects\Widget2.0\ProjSched.docx file to the Documents folder within your OneDrive account.

5.5.7

The Ethernet 2 adapter in your computer is physically connected to the lab network using a wired connection, as shown in Exhibits. This adapter is currently configured to use DHCP for its IP address assignment. However, a DHCP server has not been implemented on the lab network, so you must assign a static IP address to this adapter. In this lab, your task is to assign the static IPv4 addressing information to the Ethernet 2 adapter in your computer as follows: For the host IP address, use the last valid IP address within the subnet. For the subnet mask, use the same subnet mask configured on the router in Exhibits. Configure default gateway and DNS server addresses using the information in Exhibits.

6.3.4

You use an IPv4 network in your company. You want to begin the transition to IPv6 by statically assigning IP addresses to each computer in the network. You would like to configure the Office1 computer with an IPv4-mapped IPv6 address (an IPv6 address that holds an embedded IPv4 address), allowing this computer to communicate with other computers over the IPv4 network. In this lab, your task is to configure the Ethernet network adapter with the following IPv4-mapped IPv6 address: Use ::FFFF:192.168.0.62 as the IPv6 address. Use 64 as the subnet prefix length. Do not configure a default gateway.

6.3.7

You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignments. The employee in Office 2 reports that his workstation (Office2) can communicate with some computers on the network, but not on the internet. In this lab, your task is to diagnose and fix Office2's connectivity problem using the following troubleshooting and configuration tools: From Office2:Use the ping command to test connectivity to the following computers:CorpServerAnswer Question 1.65.86.1.1 (the internet service provider)Answer Question 2.

6.4.7

You need to make a connection to the company's wireless network on the Recept-Lap laptop computer in your organization. In this lab, your task is to connect to a wireless network using the following settings: Connect to the CorpNet-Wireless network. Use St@y_out! as the security key. Allow the network to be discoverable by other PCs on the network.

6.6.4

You need to optimize your Windows system by disabling unnecessary services and applications at startup. You also need to ensure that necessary services are enabled and automatically start when the system boots. In this lab, your task is to complete the following: Prevent the following services from loading at system startup:Function Discovery Resource PublicationLink-Layer Topology Discovery MapperSNMP TrapTelephony Prevent the following applications from running at system startup:Compy DVD AppsDIRE Event MonitorSM66 Win32 Utility Start the following services and configure them to start automatically when the system starts:Bluetooth Support ServicePrint SpoolerRouting and Remote Access

7.1.6

This lab allows you to demonstrate a basic level of competency using the Windows operating system. You will practice pinning applications to the Start menu and taskbar, using the Settings app, creating shortcuts on the Desktop, and running desktop applications. In this lab, your task is to: Pin Groove Music to the Start menu. Pin OneNote to the taskbar. Unpin Microsoft Edge from the taskbar. Use Settings to view detailed system information. Answer the first three questions. Use Settings to set the display resolution to 1600 x 900. Set the screen saver to Blank and specify that it activate after 15 minutes of inactivity. Use Computer Management to determine which users have been created for this system. Answer the last question. On the desktop, create a shortcut to the Event Viewer.

7.1.8

You are the IT Administrator for a small corporate network. To enable central management of network resources, you recently added an Active Directory domain on the CorpDC server . Now, you need to populate user accounts in the domain. In this lab, your task is to create the following user accounts on CorpDC in their applicable OUs: Organization UnitUserMarketing\MarketingManagersJuan SuarezSales\PermSalesSusan SmithSales\SalesManagersMark BurnesSales\TempSalesBorey Chan Create each account using the following standards and specifications: Account name: First name and Last name User logon name: firstinitial + [email protected] Initial password: 1234asdf$ Require the user to change the password at the next logon. For the temporary sales employee (Borey Chan):Limit the logon hours to 8:00 a.m. to 5:00 p.m., Monday through Friday.Expire the account on 31 December of the current year.

8.2.6

You are the IT administrator for a small corporate network. You are using Active Directory on the CorpDC server to provide central management for network resources. Organizational Units (OUs) in the domain have been created to represent the departments in your company. User and computer accounts are in their respective departmental OUs. Over the past few days, several personnel changes have occurred that require changes to the user accounts. In this lab, your task is to use the following information to make the necessary user account changes on CorpDC: For the Accounting department: Disable the Mark Woods account.He has accepted a job at another company. His account will remain disabled until his replacement can be found. Due to a forgotten password, the Mary Barnes account was locked.You need to:Reset the password to asdf1234$.Require a password change at the next logon.Unlock the account. For the Research-Dev department: Enable Pat Benton's account.She is returning from maternity leave. Her account was disabled to prevent logon while she was away. Update Andrea Simmons account information has she was recently married.New account name: Andrea SockoConfigure the account as follows:First name: AndreaLast name: SockoDisplay name: Andrea SockoBoth user logon names: asocko Adam Pascal quit and Stella Hanson was hired in his place. Stella will not start for another two weeks. Update Adam's account as follows:New account name: Stella HansonFirst name: StellaLast name: HansonDisplay name: Stella HansonBoth user logon names: shansonDisable the account to prevent logon until Stella starts. For the Support department: For all users in the Support OU (but not the SupportManagers OU), allow logon to only the Support computer.

8.2.8

You have been asked to perform administrative tasks for a computer that is not a member of a domain. To increase security and prevent unauthorized access to the computer, you need to configure specific password and account lockout policies. In this lab, your task is to use the Local Security Policy to configure the following password and account lockout policies: Configure password settings so that the user must:Cycle through 10 passwords before reusing an old one.Change the password every 90 days.Keep the password at least 14 days.Create a password at least 8 characters long.Create a password that meets complexity requirements such as using uppercase letters, lowercase letters, numbers, or symbols. Configure the account lockout policy to:Lock out any user who enters five incorrect passwords.Unlock an account automatically after 60 minutes.Configure the number of minutes that must elapse after a failed logon attempt to 10 minutes.

8.3.2

Zoey, a new employee working in London, has just been given a new Windows 10 computer. Because she will use this desktop system in conjunction with her Windows tablet, Zoey needs to authenticate to her systems using an online Microsoft account. This will give her the ability to use the same apps and settings regardless of which system she uses. In this lab, your task is to create a new Microsoft account for Zoey using the following information: OptionValueAccount [email protected]@ssw@rdFull nameZoelle AndersonCountry/regionUnited KingdomBirth date6 April 2002Email code1805

8.5.6

There are two groups of users who access the Office1 computer, Marketing and Research. Each group has a corresponding folder: E:\Marketing Data E:\Research Data In this lab, your task is to: Disable permissions inheritance for E:\Marketing Data and E:\Research Data and convert the existing permissions to explicit permissions. For each of the above folders, remove the Users group from the access control list (ACL). Add the Marketing group to the Marketing Data folder ACL. Add the Research group to the Research Data folder ACL. Assign the groups Full Control to their respective folders. Do not change any other permissions assigned to other users or groups.

8.6.5

At work, you share a computer with other users. You want to secure the contents of the Finances folder so that unauthorized users cannot view its contents. In this lab, your task is to: Encrypt the D:\Finances folder and all of its contents. Add the Susan user account as an authorized user for the D:\Finances\2019report.xls file.

8.9.5

To allow other users access to some content on your computer, you have decided to share two folders. To better control who has access to the data in these folders, you need to configure share and NTFS permissions. In this lab, your task is to share and configure the share and NTFS permissions for these folders as follows: Share FolderShare PermissionsD:\FinancesGive the groups Everyone and Accounting Read/Write permissions.Do not modify the Administrators group.D:\GraphicsGive the group Everyone Read/Write permissions. FolderNTFS PermissionsD:\FinancesConvert the inherited permissions into explicit permissions.Remove the groups Everyone and Users from the access control list to prevent all users from having access.Make sure the Accounting group has been assigned the Full Control permissions.D:\GraphicsDo not modify inherited permissions. (This gives all users Read access.)Remove the Full Control, Modify, and Write permissions from the group Everyone.Add the Marketing group and give this group the Modify permissions. A common strategy for combining NTFS permissions is to apply the least restrictive share permissions and then add more restrictive NTFS permissions. For example, assign Everyone Full Control (Read/Write) share permissions to the shared folder, then assign more restrictive NTFS permissions to control access. When you use Share with > Specific people and chose Read/Write, Full Control permissions are assigned.

9.1.8


Conjuntos de estudio relacionados

CH. 18 Osteoarthritis and rheumatoid arthritis

View Set

Group Insurance and Sources of Health Coverage

View Set

Principles of Marketing - MKTG350 Chapter 2

View Set