Top Banner
LAB 1 ANSWERS 1 LAB 1 SIMPLE INSTALLATION OPTIONS EXERCISE 1-1: INSTALLING AND ACTIVATING MICROSOFT WINDOWS XP PROFESSIONAL MANUALLY 4. The END-USER LICENSE AGREEMENT FOR MICROSOFT SOFT- WARE page appears. Read the agreement and answer the following questions. QUESTION What is the maximum number of processors that are licensed to use Windows XP Professional at a time on a single work- station? ANSWER Only two processors are licensed to use Windows XP Professional at a time on a single workstation. QUESTION How many days do you have to activate the software after it has been installed (assuming that you are not using a Volume Licensing Product Key [VLK], which precludes activation)? ANSWER After Windows XP Professional has been installed, you have 30 days to activate it. This can be done over the Internet or by phone. QUESTION If you upgrade from Windows 2000 Professional to Windows XP Professional, can you still use Windows 2000 Professional on another workstation or as a dual boot option on the same workstation? ANSWER According to Section 9 of the license agreement, once you upgrade, you are no longer eligible to use the product from which you upgraded.
102
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Lab Manual Answers

LAB 1 ANSWERS 1

LAB 1SIMPLE INSTALLATION OPTIONS

EXERCISE 1-1: INSTALLING AND ACTIVATING MICROSOFT WINDOWS XP PROFESSIONAL MANUALLY

4. The END-USER LICENSE AGREEMENT FOR MICROSOFT SOFT-WARE page appears. Read the agreement and answer the following questions.

QUESTION What is the maximum number of processors that are licensed to use Windows XP Professional at a time on a single work-station?

ANSWER

Only two processors are licensed to use Windows XP Professional at a time on a single workstation.

QUESTION How many days do you have to activate the software after it has been installed (assuming that you are not using a Volume Licensing Product Key [VLK], which precludes activation)?

ANSWER

After Windows XP Professional has been installed, you have 30 days to activate it. This can be done over the Internet or by phone.

QUESTION If you upgrade from Windows 2000 Professional to Windows XP Professional, can you still use Windows 2000 Professional on another workstation or as a dual boot option on the same workstation?

ANSWER

According to Section 9 of the license agreement, once you upgrade, you are no longer eligible to use the product from which you upgraded.

Page 2: Lab Manual Answers

2 LAB 1

11. Verify that Format The Partition Using The NTFS File System or Format The Partition Using The NTFS File System (Quick) is selected, according to your instructor, and then press ENTER.

NOTE Using the Quick option is substantially faster. However, that option is not recommended unless you are sure of the health of the hard drive. Using the normal format option can reveal a number of problems that the hard drive might have, and it is strongly recommended in a real-world environment. In this case, however, your instructor might want you to use the Quick option to save time.

QUESTION What formatting options are available in Windows XP Pro-fessional Setup?

ANSWER

There are four formatting options available, two for NTFS and two for FAT. You can also choose Quick for each. The FAT option actually formats the hard drive using FAT32, which is an upgrade over the old 16-bit FAT file system. NTFS is a more secure and robust file system, and it is strongly recommended that all Windows XP installations use NTFS unless there is a compelling reason to use FAT.

EXERCISE 1-2: TAKING THE TOUR

4. On the Windows XP Basics page, click each of the icons on the left, as seen in the following figure.

L01ht01.bmp

Page 3: Lab Manual Answers

LAB 1 ANSWERS 3

QUESTION What does clicking on each of the icons do?

ANSWER

Clicking on each of the icons summons an image of the item being used. There is no explanatory text.

EXERCISE 1-3: USING THE HELP AND SUPPORT CENTER

Using the Pick A Help Topic Feature

5. On the Getting Older Programs To Run On Windows XP page, read the introductory section.

QUESTION What two options are suggested to get programs written for older versions of Windows to run properly?

ANSWER

The two options suggested to run programs written for older versions of Windows to run properly are

1. Run the Program Compatibility Wizard, or set compatibility settings manually.

2. Update your program, drivers, or hardware.

Using Search

3. In the Search Results pane, click Getting Older Programs To Run On Windows XP.

QUESTION What is different about the text presented as a result of the search compared with the text displayed as a result of navigating to the same document using hyperlinks?

ANSWER

When search is used, the search string elements are highlighted in the text.

Page 4: Lab Manual Answers

4 LAB 1

Using the Pick A Task Feature

8. The My Computer Information – General page will appear, and your computer will be probed for information.

QUESTION From the information on the My Computer Information – General page, what IPX address is your computer assigned?

ANSWER

No IPX address is assigned, because the IPX protocol is not installed.

LAB REVIEW QUESTIONS

1. If your computer is not able to boot from CD-ROM, what should you do to install Windows XP from CD-ROM, assuming that no operating system is currently installed?

ANSWER

The following readeraid is part of the list. If you cannot boot from the CD-ROM drive, and no operating system is currently installed, you should boot from a floppy system disk or other device that provides CD-ROM drive support, and then run Winnt32.exe, which is located in the I386 folder on the Windows XP Professional Installation CD.

2. During manual installation of Windows XP Professional you are asked if you want to use typical or custom network settings. If you do not use custom settings, will an IP address be configured?

ANSWER

Yes, an IP address will be configured when you use typical settings. First, your computer will attempt to contact a DHCP server and request an IP address from it. If that fails, your computer will be assigned an address by Automatic Private IP Addressing (APIPA), which will begin with the octets 169.254.

3. In previous versions of Microsoft Windows, the area on the right end of the taskbar was called the system tray. What is the new name accord-ing to the Windows XP Basics section of the tour?

ANSWER

The new name for the system tray is the notification area.

Page 5: Lab Manual Answers

LAB 1 ANSWERS 5

4. According to the Windows XP Basics section of the tour, where should you go to handle many system tasks, such as configuring User Accounts?

ANSWER

The tour recommends that you configure many system settings through Control Panel.

5. According to the Connected Home And Office section of the tour, can multiple user accounts be active simultaneously?

ANSWER

Yes, in Windows XP, multiple user accounts can be active at the same time. For example, while one user is logged on, another user’s account could download e-mail messages in Microsoft Outlook.

6. What feature in Windows XP offers the user help on many tasks and problems?

ANSWER

The Help And Support Center, which can be accessed by selecting Help And Support from the Start menu. It can also be launched by pressing F1 while the desktop is active.

Page 6: Lab Manual Answers

LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 6

LAB 2ADVANCED INSTALLATION OPTIONS

EXERCISE 2-1: CREATING AN UNATTENDED ANSWER FILE USING SETUP MANAGER

11. On the Type Of Setup page, ensure that Unattended Setup is selected and then click Next. On the Product To Install page, ensure that Win-dows Unattended Installation is selected. Click Next.

QUESTION What are the three types of setup that Setup Manager offers, and what is each for? (Hint: you can use the Help files that you extracted from the Deploy cabinet file to find the answer.)

ANSWER

The three types are■ Unattended Setup Creates an answer file that provides

answers to Windows Setup so that you don’t have to.■ Sysprep Setup Creates an answer file for a setup mode

named Mini-Setup. This option is used when the deployment is being performed by applying an image to the target comput-ers’ hard drives with an image created on a computer with sim-ilar hardware (to the target computers’ hardware) and a fully deployed Windows installation. This is the most efficient method of deploying Windows XP to many computers.

■ Remote Installation Services (RIS) Creates an answer file that is used in a setup that uses RIS. The RIS server provides the installation files to a remote installation client on the tar-get computer, which can use an answer file to make the RIS installation unattended.

46. Windows Setup Manager created a batch file on your desktop named Unattend.bat. Right-click the file, and select Edit. Assuming that your CD-ROM drive is drive D, it should look like the following:

@rem SetupMgrTag

@echo off

rem

rem This is a SAMPLE batch script generated by Setup Manager Wizard.

rem If this script is moved from the location where it was generated, it

may have to be modified.

rem

set AnswerFile=.\unattend.txt

Page 7: Lab Manual Answers

7 LAB 2

set SetupFiles=D:\i386

D:\i386\winnt32 /s:%SetupFiles% /unattend:%AnswerFile%

QUESTION The batch file contains the following command, which launches Winnt32.exe (Windows Setup):

D:\i386\winnt32 /s:%SetupFiles% /unattend:%AnswerFile%

From what you can see in the batch file, make an educated guess as to what the /s and /unattend parameters specify.

ANSWER

The /s parameter specifies the location of the Windows Setup files, and the /unattend parameter specifies an answer file to be used by Windows Setup.

EXERCISE 2-3: UPDATING WINDOWS XP

Determining the Service Pack

2. In the Computer Properties dialog box, ensure that the General tab is selected.

QUESTION According to the System Properties dialog box, what ser-vice pack is installed?

ANSWER

Service Pack 2 is installed, as indicated in the System section of the System Properties dialog box, in the General tab.

EXERCISE 2-5: VIEWING THE INSTALLATION LOGS

4. In the Good folder, double-click the Setuperr.log document to open it.

QUESTION What is contained in the good Setuperr.log file?

ANSWER

Nothing. The Setuperr.log file from the good installation contains no entries.

7. Open the Setuperr.log file.

Page 8: Lab Manual Answers

LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 8

QUESTION Error 126 is returned by the LoadLibrary frequently in this log. What does error 126 indicate, according to the log file?

ANSWER

Error 126 returned by the LoadLibrary means that the specified module could not be found.

13. In the Good folder, open Setupact.log.

QUESTION When do you think the Setupact.log file is created during setup? (Hint: look at the first line.)

ANSWER

The Setupact.log file is created at the beginning of the GUI phase of setup.

15. In the Find dialog box, in the Find What text box, type system stabil-ity. Click Find Next.

QUESTION Did the line This file may be necessary to maintain system stability appear in the log file, as it did in the corresponding bad log file many times?

ANSWER

No, the line This file may be necessary to maintain system stabil-ity does not appear in the good log file Setupact.log.

NOTE With all the errors recorded in the logs about setup, it would be mandatory to redo the installation in this instance.In actuality, the computer with the bad install seemed stable in moderate testing. However, it used the old Windows 2000–style user interface instead of the Windows XP interface. It also claimed that it had Service Pack 1 installed in the System Properties dialog box, when the service pack was actually only partially installed.The errors during installation were created by removing the installa-tion CD during the GUI phase of setup, about halfway through. At this point, most installation files had been cached, so installation did not fail entirely. When setup complained that some files were needed, the Cancel button was clicked.

Page 9: Lab Manual Answers

9 LAB 2

LAB REVIEW QUESTIONS

Estimated completion time: 15 minutes1. In this lab, you used Windows Setup Manager to create an unattended

answer file for Windows XP Professional. Does Windows Setup Manager also support Windows XP Home Edition?

ANSWER

Yes, Windows Setup Manager supports both Windows XP Professional and Windows XP Home Edition.

2. You are creating an answer file for unattended setup using Windows Setup Manager. What type of user interaction should you choose if you want the end user to be able to see the options specified in the answer file but not be able to change them?

ANSWER

Read Only. The Read Only user interaction option provides all the answers in the answer file, and the end user can see the options but cannot change them.

3. When creating an unattended answer file using Windows Setup Man-ager, the user is solicited for a password for the Administrator account. What protection is offered in the user interface against this password being compromised?

ANSWER

Windows Setup Manager allows you to encrypt the password in the answer file by selecting the Encrypt The Administrator Password In The Answer File check box.

4. The beginning of Exercise 2-2 instructed you to rename the Unat-tended.txt file to Winnt.sif. What is the point of renaming this file?

ANSWER

When launching Windows Setup by booting from the installation CD, Setup checks to see if an answer file named Winnt.sif (.sif stands for setup installation file) is on drive A. The file must be named Winnt.sif or it will not be used. Alternatively, if you start Winnt32.exe (Windows Setup) manually, you can specify any file as an answer file using the /unattend parameter.

Page 10: Lab Manual Answers

LAB 2 ANSWERS: ADVANCED INSTALLATION OPTIONS 10

5. What log file logs the errors during installation of Windows XP?

ANSWER

The Setuperr.log file logs errors during installation of Windows XP.

6. Where are the setup installation logs stored? (Hint: use Search from the Start menu, and search for Setuperr.log.)

ANSWER

The setup log files are stored in the C:\Windows folder or, more generally, the %windir% folder.

Page 11: Lab Manual Answers

LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 11

LAB 3MANAGING DISKS AND FILE SYSTEMS

EXERCISE 3-1: FORMATTING A PARTITION

12. On the Select Partition Type page, ensure that Primary Partition is selected, read the description provided, and then click Next.

QUESTION How many primary partitions can a basic disk contain?

ANSWER

A basic disk can contain four primary partitions, or three primary parti-tions and one extended partition.

EXERCISE 3-2: CONVERTING FAT32 PARTITIONS TO NTFS

10. In the Computer Management console, in the graphical view pane, right-click the DATA (L:) partition and then select Open.

QUESTION Did the data on the partition survive the conversion from FAT32 to NTFS?

ANSWER

Yes. Converting from FAT32 or FAT to NTFS does not cause data loss. However, before making any fundamental changes to a hard drive, it is recommended that you back up any important data.

EXERCISE 3-3: CONVERTING A BASIC DISK TO A DYNAMIC DISK

13. In the Disk Management message box, click Yes to reconnect.

QUESTION In the graphical view pane, what word has changed in the Disk 0 graphical representation?

ANSWER

The description under the label Disk 0 has changed from Basic to Dynamic.

Page 12: Lab Manual Answers

12 LAB 3 ANSWERS

EXERCISE 3-4: EXAMINING DRIVE PROPERTIES

4. Click the Volumes tab.

QUESTION How many volumes are on Drive 0?

ANSWER

There are two volumes on Drive 0; C and L (DATA).

EXERCISE 3-5: USING NTFS COMPRESSION

8. In the Brochure Images Properties dialog box, click OK.

QUESTION What color is the font for the Brochure Images folder?

ANSWER

The font is blue, which is the default color for compressed files or folders.

16. In the Shared Documents folder, right-click Picture1.bmp and then select Properties.

QUESTION How large is the Picture1.bmp file on the disk?

ANSWER

The file is 12 MB on the disk.

20. In the Brochure Images folder, right-click Picture1.bmp and then select Properties.

QUESTION The image file has been moved into a folder using NTFS com-pression. Why isn’t the file any smaller?

ANSWER

Uncompressed files moved into an NTFS compressed folder do not inherit the NTFS compression.

28. Right-click Picture1.bmp, and then select Properties.

Page 13: Lab Manual Answers

LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 13

QUESTION What is the size on disk of the Picure1.bmp file now?

ANSWER

It is smaller than 12 MB, about 722 kilobytes (KB).

QUESTION Why did the file shrink, when it remained full size when it was moved?

ANSWER

Files that are copied into a compressed folder inherit the compressed attribute.

EXERCISE 3-6: USING EFS ENCRYPTION

6. Click OK in the Sensitive Data Properties dialog box.

QUESTION What color is the font used for the Sensitive Data folder?

ANSWER

The color is green, which is the default color for encrypted folders or files.

14. Open the Sensitive Text.txt text file.

QUESTION Can you read the Sensitive Text.txt file?

ANSWER

Yes, the Sensitive Text.txt file is readable.

29. In the Sensitive Data folder, open Sensitive Text.txt.

QUESTION What occurs when you try to open the Sensitive Text.txt file?

ANSWER

You are informed in a Notepad message box that access is denied.

Page 14: Lab Manual Answers

14 LAB 3 ANSWERS

LAB REVIEW QUESTIONS

Estimated completion time: 15 minutes1. What formatting file system options does Windows XP offer for hard

drives using basic disks?

ANSWER

Fat 32 and NTFS.

2. When you converted the disk on your partner’s computer to a dynamic disk, what type of volumes were created from the existing primary partitions?

ANSWER

The primary partitions are automatically converted into simple volumes during the conversion.

3. Once you instruct Windows to convert a basic disk to a dynamic disk, you are warned that you will no longer be able to do what on any vol-umes on the converted disk?

ANSWER

Windows warns that you will not be able to start other installed operat-ing systems from any of the volumes on the disk.

4. What happens when you move an unencrypted and uncompressed file into an EFS encrypted folder or to an NTFS compressed folder?

ANSWER

A file moved into a compressed folder from the same NTFS volume remains uncompressed, whereas a file moved into a compressed folder from a different NTFS volume becomes compressed. A file moved from any NTFS volume into an encrypted folder becomes encrypted.

5. What happens when you lose or remove a certificate issued for EFS?

ANSWER

You cannot decipher EFS-encrypted data without the corresponding certificate. If you lose the certificate for some reason, you will need a data recovery agent to recover the data.

Page 15: Lab Manual Answers

LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 15

6. When specifying disk quotas, for which two events can you enable logging?

ANSWER

You can log an event when the warning level of the quota is exceeded or when the user exceeds the limit.

LAB CHALLENGE 3-1: USING DISK TOOLS

You are working at the corporate help desk at Contoso, supporting users by phone. You have a user that complains that it seems to take longer to load large Microsoft Excel files than it used to on his computer. He also reports that he received an error while trying to load an Excel file the other day, but when he rebooted, it loaded fine.

He has plenty of empty space on his hard drive. You ask him if he has ever defrag-mented his hard drive, and he says that he has not. You have him print a report of the fragmentation status of his hard drive, and this is what it says:

Volume Data (D:)

Volume size = 49.34 GB

Cluster size = 4 KB

Used space = 16.64 GB

Free space = 32.71 GB

Percent free space = 66 %

Volume fragmentation

Total fragmentation = 46 %

File fragmentation = 92 %

Free space fragmentation = 0 %

File fragmentation

Total files = 8,222

Average file size = 3 MB

Total fragmented files = 2,208

Total excess fragments = 20,280

Average fragments per file = 3.46

Pagefile fragmentation

Pagefile size = 0 bytes

Total fragments = 0

Folder fragmentation

Total folders = 756

Fragmented folders = 28

Excess folder fragments = 222

Master File Table (MFT) fragmentation

Total MFT size = 22 MB

MFT record count = 9,005

Percent MFT in use = 39 %

Total MFT fragments = 3

Page 16: Lab Manual Answers

16 LAB 3 ANSWERS

--------------------------------------------------------------------------------

Fragments File Size Most fragmented files

848 83 MB \User Data\Owen\Documents\Work\als-272\

year_end_data.xls

251 50 MB \User Data\Owen\Documents\War of the Species

Project\Rhino Models\Deer\tutorial\Financial_projections.xls

134 536 KB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10

100 6 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006069.cpl

100 6 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004549.cpl

100 6 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008065.cpl

86 6 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\8\ch08da_p1.pdf

86 5 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\2\ch02da_p1.pdf

83 164 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006180.msi

83 164 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008486.msi

83 164 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008176.msi

75 5 MB \System Volume Information\_restore

{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021414.exe

69 35 MB \User Data\Owen\Documents\War of the Species

Project\New Folder (3)\dragon 002.3dm

68 4 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\4\ch04da_p1.pdf

60 4 MB \User Data\Owen\Documents\Work\als-296\

grouppolwp.doc

60 23 MB \User Data\Owen\Documents\War of the Species

Project\Rhino Models\elephant\Elephant 3-xxx.3dm

59 4 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006167.dll

59 4 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008473.dll

59 4 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\6\ch06da_p1.pdf

59 4 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008163.dll

58 4 MB \System Volume Information\_restore

{63100537-12E8-49FB-99DE-1483BB9C654D}\RP243\A0021415.dll

55 3 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0006078.exe

55 3 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0004558.exe

55 3 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0008074.exe

54 3 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\10\ch10da_p1.pdf

51 3 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP5\A0005236.dll

51 3 MB \System Volume Information\_restore

{A1768CD3-D50E-4D89-BF76-492D52D2A6F2}\RP10\A0006948.dll

51 3 MB \User Data\Owen\Documents\Work\als-296\

Labs\11\WinXP\Display\nv4_disp.dll

50 3 MB \User Data\Owen\Documents\Work\als-272\

Pages Reviews\5\ch05da_p1.pdf

49 3 MB \User Data\Owen\Documents\Work\als-296\

Labs\11\WinXP\AudioUtl\SSWAV06.WAV

Page 17: Lab Manual Answers

LAB 3 ANSWERS: MANAGING DISKS AND FILE SYSTEMS 17

QUESTION Excel files use the .xls extension. Of how many fragments are the two .xls files in the Most Fragmented Files list composed?

ANSWER

The year_end_data.xls file is separated into 848 fragments, and the Financial_projections.xls file is divided into 251 fragments.

QUESTION What is the fragmentation percentage of all files on the volume?

ANSWER

The file fragmentation percentage is 92 percent.

After looking at the fragmentation status of his hard drive, you decide to run Chdsk first and then perform a defragmentation of his hard drive.

To complete this lab challenge, you must do the following:

1. Run Chdsk on drive D.

2. Output fragmentation information on drive D to a file on your desktop, and view the information.

3. Defragment drive D.

ANSWER

To complete the lab challenge, follow these steps:

1. Log on with your local Administrator account. (The password is P@ssw0rd.)

2. From the Start menu, select My Computer.3. In the My Computer dialog box, right-click DATA (L:) and then

select Properties.4. In the DATA (L:) Properties dialog box, in the Tools tab, click

Check Now.5. In the Check Disk Data (L:) dialog box, select the Automati-

cally Fix File System Errors check box.6. Select the Scan For And Attempt Recovery Of Bad Sectors

check box. Click Start.NOTE Selecting the Scan For And Attempt Recovery Of Bad Sectors check box can make this procedure take considerably longer, depending on the size of the volume. Your instructor might tell you to leave this check box cleared if you are short on time.

Page 18: Lab Manual Answers

18 LAB 3 ANSWERS

7. In the Checking Disk DATA (L:) message box, click OK.8. In the DATA (L:) Properties dialog box, click Defragment Now.9. In the Disk Defragmenter window, ensure that DATA (L:) is

selected and click Analyze.10. In the Disk Defragmenter message box, click View Report.11. In the Analysis Report dialog box, click Save As.12. In the Save Defragmentation Report dialog box, in the naviga-

tion pane on the left, click Desktop. Click Save.13. In the Analysis Report dialog box, click Close.14. In the Disk Defragmenter window, click Defragment.15. In the Disk Defragmenter message box, click Close.NOTE Because the DATA (L:) drive was not fragmented, defragmenta-tion went very quickly. Defragmenting a large, fragmented drive can take many hours.

16. Close all open Windows.17. On the Desktop, double-click VolumeL.txt.18. Look over the VolumeL.txt document, and then close it.

Page 19: Lab Manual Answers

LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 19

LAB 4MANAGING DEVICES AND PERIPHERALS

EXERCISE 4-1: INSTALLING HARDWARE AUTOMATICALLY USING THE ADD HARDWARE WIZARD

Adding a Hardware Device Using the Add Hardware Wizard

4. Restore the Device Manager window.

QUESTION Has the Floppy Disk Drive device been restored in the Device Manager tree?

ANSWER

Yes, the floppy disk drive device has been restored in the Device Manager tree.

EXERCISE 4-2: INSTALLING HARDWARE MANUALLY USING THE ADD HARDWARE WIZARD

11. Restore the Device Manager window.

QUESTION In the device tree, what device exists under Modems?

ANSWER

A Standard 56000 bps Modem exists under the Modems node in the device tree.

EXERCISE 4-3: EXAMINING HARDWARE RESOURCES IN DEVICE MANAGER

Examining Devices by Type

3. In the Mouse Properties page, click the Resources tab.

QUESTION What resources does the mouse use?

Page 20: Lab Manual Answers

20 LAB 4 ANSWERS

ANSWER

The mouse generally uses IRQ 12. Answers may vary.

6. In the Keyboard Properties dialog box, click the Resources tab.

QUESTION What resources does your keyboard use?

ANSWER

The standard resources for a PS/2 keyboard are I/O Ranges of 0060 and 0064 (for which the ranges are listed as 0060 – 0060 and 0064 – 0064, but this just means that one value defines the range), and an IRQ of 01. Answers may vary.

8. Examine the resources for your floppy disk controller, and answer the following question:

QUESTION What resources does your floppy disk controller use?

ANSWER

The floppy disk controller uses I/O Ranges 03F0 – 03F5 and 03F7, IRQ 6, and DMA 2. (Answers may vary.)

9. Examine the resources for your network adapter, and answer the following question:

QUESTION What resource type does your network adapter use that the other devices we have examined did not use?

ANSWER

The network adapter uses memory. The memory resource is represented as a range (Memory Range) in hexadecimal that denotes a contiguous section of random access memory (RAM) that is reserved for use by the device.

Page 21: Lab Manual Answers

LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 21

Examining Resources by Type and Connection

2. Expand Interrupt Request (IRQ), as shown in the following figure:

GL04ht04.bmp

QUESTION Assuming the computer from which the preceding image was captured is correctly configured, can a PCI IRQ be used by more than one device?

ANSWER

Yes, PCI IRQs can be used by more than one device. Therefore, a double entry for a PCI IRQ is not necessarily indicative of a conflict. However, ISA (Industry Standard Architecture) IRQs can only handle a single device, and so a double entry for an ISA IRQ would indicate an IRQ conflict.

EXERCISE 4-4: PRINTING DEVICE MANAGER DATA TO A TEXT FILE

Printing Device Manager Summary Data

9. In the Run dialog box, in the Open text box, type Notepad C:\DevicesSummary.txt and then press ENTER. The text within Notepad will be similar to the following sample output.

Resource Summary Report - Page: 1

******************** SYSTEM SUMMARY ********************

Windows Version: Windows 5.1 Service Pack 2 (Build 2600)

Registered Owner: Student08

Registered Organization: Classroom

Computer Name: COMPUTER08

Machine Type: AT/AT COMPATIBLE

Page 22: Lab Manual Answers

22 LAB 4 ANSWERS

System BIOS Version: Nvidia - 42302e31

System BIOS Date: 05/02/03

Processor Type: x86 Family 6 Model 10 Stepping 0

Processor Vendor: AuthenticAMD

Number of Processors: 1

Physical Memory: 1024 MB

******************** DISK DRIVE INFO ********************

Drive A:

Type: 3.5" 1.44MB floppy disk drive

Total Space: 1,474,560 bytes

Heads: 2

Cylinders: 80

Sectors Per Track: 18

Bytes Per Sector: 512

Drive C:

Type: Fixed disk drive

Total Space: 27,036,459,008 bytes

Free Space: 8,034,979,840 bytes

Heads: 255

Cylinders: 9729

Sectors Per Track: 63

Bytes Per Sector: 512

Drive D:

Type: CD-ROM drive

Total Space: 557,842,432 bytes

Drive L:

Type: Fixed disk drive

Total Space: 52,979,023,872 bytes

Free Space: 34,936,680,448 bytes

Heads: 255

Cylinders: 9729

Sectors Per Track: 63

Bytes Per Sector: 512

******************** IRQ SUMMARY ********************

IRQ Usage Summary:

(ISA) 0 System timer

(ISA) 1 Standard 101/102-Key or Microsoft Natural PS/2 Keyboard

(ISA) 4 Communications Port (COM1)

(ISA) 6 Standard floppy disk controller

(ISA) 8 System CMOS/real time clock

(ISA) 9 Microsoft ACPI-Compliant System

(PCI) 11 NVIDIA nForce PCI System Management

(ISA) 12 PS/2 Compatible Mouse

(ISA) 13 Numeric data processor

(ISA) 14 Primary IDE Channel

(ISA) 15 Secondary IDE Channel

(PCI) 18 Realtek RTL8139 Family PCI Fast Ethernet NIC

(PCI) 19 NVIDIA GeForce FX 5200

(PCI) 20 Standard Enhanced PCI to USB Host Controller

(PCI) 20 NVIDIA(R) nForce(TM) Audio Codec Interface

(PCI) 21 Standard OpenHCD USB Host Controller

(PCI) 22 Standard OpenHCD USB Host Controller

(PCI) 22 NVIDIA(R) nForce(TM) MCP Audio Processing Unit

(Dolby(R) Digital

Page 23: Lab Manual Answers

LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 23

******************** DMA USAGE SUMMARY ********************

DMA Usage Summary:

2 Standard floppy disk controller

4 Direct memory access controller

******************** MEMORY SUMMARY ********************

Resource Summary Report - Page: 2

Memory Usage Summary:

[000A0000 - 000BFFFF] PCI bus

[000A0000 - 000BFFFF] NVIDIA nForce2 AGP Host to PCI Bridge

[000A0000 - 000BFFFF] NVIDIA GeForce FX 5200

[000C0000 - 000DFFFF] PCI bus

[40000000 - FEBFFFFF] PCI bus

[D0000000 - D7FFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge

[D0000000 - D7FFFFFF] NVIDIA GeForce FX 5200

[D8000000 - DBFFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge

[DC000000 - DDFFFFFF] NVIDIA nForce2 AGP Host to PCI Bridge

[DC000000 - DCFFFFFF] NVIDIA GeForce FX 5200

[DE000000 - DFFFFFFF] PCI standard PCI-to-PCI bridge

[DF000000 - DF0000FF] Realtek RTL8139 Family PCI Fast Ethernet NIC

[E0000000 - E007FFFF] NVIDIA(R) nForce(TM) MCP Audio Processing Unit (Dol

[E0080000 - E0080FFF] Standard OpenHCD USB Host Controller

[E0081000 - E0081FFF] NVIDIA(R) nForce(TM) Audio Codec Interface

[E0083000 - E0083FFF] Standard OpenHCD USB Host Controller

[E0084000 - E00840FF] Standard Enhanced PCI to USB Host Controller

******************** IO PORT SUMMARY ********************

I/O Ports Usage Summary:

[00000000 - 00000CF7] PCI bus

[00000000 - 0000000F] Direct memory access controller

[00000010 - 0000001F] Motherboard resources

[00000020 - 00000021] Programmable interrupt controller

[00000022 - 0000003F] Motherboard resources

[00000040 - 00000043] System timer

[00000044 - 0000005F] Motherboard resources

[00000060 - 00000060] Standard 101/102-Key or Microsoft Natural PS/2 Keyb

[00000061 - 00000061] System speaker

[00000062 - 00000063] Motherboard resources

[00000064 - 00000064] Standard 101/102-Key or Microsoft Natural PS/2 Keyb

[00000065 - 0000006F] Motherboard resources

[00000070 - 00000073] System CMOS/real time clock

[00000074 - 0000007F] Motherboard resources

[00000080 - 00000090] Direct memory access controller

[00000091 - 00000093] Motherboard resources

[00000094 - 0000009F] Direct memory access controller

[000000A0 - 000000A1] Programmable interrupt controller

[000000A2 - 000000BF] Motherboard resources

[000000C0 - 000000DF] Direct memory access controller

[000000E0 - 000000EF] Motherboard resources

[000000F0 - 000000FF] Numeric data processor

[00000170 - 00000177] Secondary IDE Channel

[000001F0 - 000001F7] Primary IDE Channel

[00000274 - 00000277] ISAPNP Read Data Port

[00000279 - 00000279] ISAPNP Read Data Port

[00000290 - 00000297] Motherboard resources

[00000376 - 00000376] Secondary IDE Channel

[00000378 - 0000037F] Printer Port (LPT1)

Page 24: Lab Manual Answers

24 LAB 4 ANSWERS

[000003B0 - 000003BB] NVIDIA nForce2 AGP Host to PCI Bridge

[000003B0 - 000003BB] NVIDIA GeForce FX 5200

[000003C0 - 000003DF] NVIDIA nForce2 AGP Host to PCI Bridge

[000003C0 - 000003DF] NVIDIA GeForce FX 5200

[000003F0 - 000003F5] Standard floppy disk controller

[000003F6 - 000003F6] Primary IDE Channel

[000003F7 - 000003F7] Standard floppy disk controller

Resource Summary Report - Page: 3

[000003F8 - 000003FF] Communications Port (COM1)

[000004D0 - 000004D1] Motherboard resources

[00000800 - 00000805] Motherboard resources

[00000A79 - 00000A79] ISAPNP Read Data Port

[00000D00 - 0000FFFF] PCI bus

[00004000 - 0000407F] Motherboard resources

[00004080 - 000040FF] Motherboard resources

[00004200 - 0000427F] Motherboard resources

[00004280 - 000042FF] Motherboard resources

[00004400 - 0000447F] Motherboard resources

[00004480 - 000044FF] Motherboard resources

[00005000 - 0000503F] Motherboard resources

[00005100 - 0000513F] Motherboard resources

[0000C000 - 0000CFFF] PCI standard PCI-to-PCI bridge

[0000C000 - 0000C0FF] Realtek RTL8139 Family PCI Fast Ethernet NIC

[0000D400 - 0000D4FF] NVIDIA(R) nForce(TM) Audio Codec Interface

[0000D800 - 0000D87F] NVIDIA(R) nForce(TM) Audio Codec Interface

[0000E400 - 0000E41F] NVIDIA nForce PCI System Management

[0000F000 - 0000F00F] Standard Dual Channel PCI IDE Controller

NOTE Answer the following questions according to the preceding sample output. (Do not use the file that you created.)

QUESTION What two devices share IRQ 22?

ANSWER

The Standard OpenHCD USB Host Controller and the NVIDIA nForce MCP Audio Processing Unit share IRQ 22.

QUESTION What two controllers use a DMA channel?

ANSWER

The Standard Floppy Disk Controller and the Direct Memory Access Con-troller each use a DMA channel.

QUESTION What memory range is the graphics adapter assigned (Nvidia GeForce FX 5200)?

ANSWER

Page 25: Lab Manual Answers

LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 25

The graphics adapter is assigned the memory range DC000000 – DCFFFFFF.

EXERCISE 4-6: VIEWING A CONFLICT WARNING IN DEVICE MANAGER

Viewing the Conflict in Device Manager

2. Open Device Manager.

QUESTION What does the flag that is attached to the Communica-tions Port (COM1) device look like?

ANSWER

The Communications Port (COM1) device is marked with a warning flag (a yellow disk containing a black exclamation point). When it is opened (or refreshed), Device Manager automatically expands all nodes that contain devices that are flagged.

6. In the Communications Port (COM1) dialog box, click the Resources tab.

QUESTION What information concerning the resource settings is conveyed on the Resources tab?

ANSWER

The Resources tab indicates that the device cannot find enough free resources, and that to use the device, you will need to disable one of the other devices on the system.

LAB REVIEW QUESTIONS

Estimated completion time: 15 minutes1. What is the easiest and most common way to add hardware to a

computer?

ANSWER

The Add Hardware Wizard, accessed through Control Panel, is the most common and easiest way to add a hardware device (although most mod-ern devices are automatically detected and installed by Windows XP).

Page 26: Lab Manual Answers

26 LAB 4 ANSWERS

2. What are the four view types offered in Device Manager?

ANSWER

The four view types offered in Device Manager are Devices By Type, Devices By Connection, Resources By Type, and Resources By Connection.

3. What are the six summaries that a Device Manager System Summary printout is divided into?

ANSWER

When you print a Device Manager System Summary, it is divided into the following six summaries: System Summary, Disk Drive Info, IRQ Summary, DMA Usage Summary, Memory Summary, and IO Port Summary.

4. In Device Manager, when viewing devices by type, devices are con-tained under nodes denoting the device type. According to the printed output from Device Manager, what are these groupings by type of devices called?

ANSWER

Devices are grouped into classes. For example, the COM1 port is part of the class Ports (COM & LPT).

5. What is the feature of Windows XP that allows a user to create and start different sets of hardware configuration settings?

ANSWER

Hardware Profiles allow the creation and selection at startup of different sets of hardware configurations.

LAB CHALLENGE 4-1: UNDERSTANDING HEXADECIMAL MEMORY RANGES

Contoso has hired an engineering firm to create an electronic device that helps to record and collect data at car accident sites. The data can then be downloaded to a computer via the USB port. The device is nearly finished, and they want to beta test it at Contoso. Part of the testing is to ensure that the device drivers are work-ing properly, and they have asked a technician at Contoso (you) to install the device on various computers and record the memory location used by the driver. They explain a little bit about what they need the data for, and ask you if you understand hexadecimal. You say that you don’t, but resolve to understand it bet-ter so that you can better understand what you are doing for the engineering con-sultants.

Page 27: Lab Manual Answers

LAB 4 ANSWERS: MANAGING DEVICES AND PERIPHERALS 27

Hexadecimal is a base-16 numbering system, just as decimal is a base-10 number-ing system. Decimal uses the symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9 to represent the values 0 through 9, and similarly, hexadecimal uses the symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F to represent the values 0 through 15. This is summa-rized in the following chart.

The decimal (base-10) number 1,583 can be broken down as follows:

3 * 100 +

8 * 101 +

5 * 102 +

1 * 103,

which equals 3 + 80 + 500 + 1000, or 1,583.

The same can be done in hexadecimal, but using 16s (because it is base 16) instead of 10s. For example, the number D93E would be:

E * 160 +

3 * 161 +

9 * 162 +

D * 163

which equals (14 * 1) + (3 * 16) + (9 * 256) + (13 * 4096), or 55,614.

After installing the new device on the first test computer, you find that it has reserved the memory range E0085000 through E0085FFF for its use.

To complete this lab challenge, you need to write down the conversion to decimal for the hexadecimal values E0085000 and E0085FFF. You then need to verify your results using Microsoft Calculator. (Hint: switch to Scientific view when using Calculator.)

ANSWER

Convert E0085000 and E0085FFF to decimal by hand using the follow-ing process. The numbers E0085000 and E0085FFF are different only by the last three digits FFF. So if we calculate E0085000, we only need add FFF to get the value for E0085FFF.

Here is the conversion to decimal for E0085000:

0 * 160 +

0 * 161 +

0 * 162 +

5 * 163 +

8 * 164 +

0 * 165 +

0 * 166 +

E * 167,

Hexadecimal Digit 0 1 2 3 4 5 6 7 8 9 A B C D E FDecimal Value 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Page 28: Lab Manual Answers

28 LAB 4 ANSWERS

which, using Calculator (from the Start menu, point to All Programs, Accessories, and then select Calculator), equals 20,480 + 524,288 + 3,758,096,384, or 3,758,641,152. To get the decimal equivalent for E0085FFF, add FFF:

F * 160 +

F * 161 +

F * 162,

which equals 15 + 240 + 3840, or 4,095. So E0085FFF equals 3,758,641,152 + 4,095, or 3,758,645,247.

To check this work using Calculator:

1. Start Calculator.2. In Calculator, from the View menu, select Scientific.3. Select Hex in the top row of options.4. Using your mouse, type E0085000 and then select Dec. Our

first value, 3,758,641,152, appears.5. Select Hex. Type E0085FFF and then select Dec. Our second

value, 3,758,645,247, appears.

Page 29: Lab Manual Answers

LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 29

LAB 5CONFIGURING AND MANAGING THE USER EXPERIENCE

EXERCISE 5-1: SETTING DISPLAY PROPERTIES

Desktop Items

6. In the Display Properties dialog box, click OK.

QUESTION What two items appear on the desktop when you click Apply?

ANSWER

A shortcut to My Documents and a white window with the text “Sample Web Page” both appear.

10. Right-click the embedded Web page, and then select Refresh.

QUESTION What happens when you click Refresh?

ANSWER

The Web page reloads, and the word Change appears.

Display Settings

1. In the Display Properties dialog box, on the Settings tab, examine the settings and answer the following questions.

QUESTION What is the highest and lowest screen resolution offered?

ANSWER

The range of screen resolutions offered depends on the display adapter and monitor drivers. An example answer is 800 by 600 to 2048 by 1536.

QUESTION What Color Quality settings are available?

ANSWER

The Color Quality offerings vary depending on the display adapter driver. An example answer is Medium (16 bit) and Highest (32 Bit).

Page 30: Lab Manual Answers

30 LAB 5 ANSWERS

6. Select the Troubleshoot tab.

QUESTION What settings are available on this tab?

ANSWER

The Hardware Acceleration slider and the Enable Write Combining check box are the available settings on this tab.

EXERCISE 5-2: THE TASKBAR AND THE START MENU

The Taskbar

2. Right-click each option in the Taskbar Appearance section, select What’s This?, and answer the following questions.

QUESTION A user often has a large number of windows open at the same time. The taskbar becomes crowded with all the corresponding taskbar buttons, and the user would like to mitigate the clutter. What option would you recommend that he set?

ANSWER

He should select the Group Similar Taskbar Buttons check box. This will group taskbar buttons opened by the same program into a single group if the taskbar becomes crowded.

QUESTION A user wants the full use of the screen, but cannot “get rid of the bar at the bottom of the screen.” Which two settings could you recommend the user change to fix this?

ANSWER

The user could clear the Lock The Taskbar check box, which would allow the user to hide the taskbar manually. Alternatively, the user could select the Auto-Hide The Taskbar check box, which would automatically hide the taskbar and reveal it when the mouse was brought to the taskbar area.

QUESTION What option allows the user to choose from a list of short-cuts located on the taskbar?

ANSWER

The Show Quick Launch check box will display the Quick Launch toolbar on the taskbar. The Quick Launch toolbar allows the user to display the desktop or launch an application with a single click.

Page 31: Lab Manual Answers

LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 31

The Start Menu

12. From the Start menu, point to All Programs.

QUESTION Where does the Calculator appear in the Start menu?

ANSWER

The Calculator appears in the top section of the All Programs list.

14. Locate the Calculator shortcut in the Start menu.

QUESTION Where has the Calculator shortcut moved to in the Start menu?

ANSWER

The Calculator shortcut has moved to the bottom section of the All Programs list.

19. Locate the Calculator shortcut in the Start menu.

QUESTION How do you launch the Calculator from the Start menu now?

ANSWER

From the Start menu, point to All Programs, Accounting, and then select Calculator.

EXERCISE 5-3: CONFIGURING MULTIPLE LANGUAGES AND LOCATIONS

8. In the Regional And Language Options dialog box, select the Regional Options tab.

QUESTION You are on a business trip to Kazakhstan. How do you con-figure services to provide you with local information?

ANSWER

In the Regional And Language Options dialog box, on the Regional Options tab, in the Location section, in the drop-down list, select Kazakhstan.

Page 32: Lab Manual Answers

32 LAB 5 ANSWERS

EXERCISE 5-4: CONFIGURING ACCESSIBILITY

Keyboard Accessibility Settings

4. In the Accessibility Options dialog box, on the Keyboard tab, read the descriptions of the keys options and browse the settings of each, and then answer the following questions.

QUESTION A user has nerve degeneration and often hits a key more than once by accident. What accessibility key option can help to mitigate this problem?

ANSWER

The FilterKeys option will allow Windows to ignore brief or repeated key-strokes or slow the repeat rate. This can help to mitigate problems where the user involuntarily presses a key repeatedly, has difficulty pressing keys briefly, or accidentally presses keys for short periods.

QUESTION The FilterKeys offers two settings related to repeating a keystroke when the key is held down. What are the two settings?

ANSWER

The two settings are Repeat Delay and Repeat Rate.

QUESTION What is the keyboard shortcut for FilterKeys?

ANSWER

The keyboard shortcut is to hold down the RIGHT SHIFT key for eight seconds.

QUESTION A user is unable to press two keys simultaneously (for example, CTRL+C to copy). What accessibility key option can help the user?

ANSWER

The StickyKeys option allows a user to avoid having to press two keys simultaneously to apply a modifier key.

QUESTION When using StickyKeys, how do you lock a modifier key?

Page 33: Lab Manual Answers

LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 33

ANSWER

You can lock a modifier key in StickyKeys by pressing it twice.

QUESTION What is the keyboard shortcut for activating StickyKeys?

ANSWER

The keyboard shortcut for activating StickyKeys is pressing the SHIFT key five times.

Sound Accessibility Settings

2. Click an open space in the desktop to make it active, and then press Q. Your desktop will flash twice. Clear the Use SoundSentry check box.

QUESTION What other option is on the Sound tab, and what does it do?

ANSWER

The other option on the Sound tab is Use ShowSounds. Use ShowSounds requests that programs display captions for the speech and sounds that they make. The programs must have this functionality built-in for this option to work.

Display Accessibility Settings

2. Once you have observed the high-contrast setting, clear the Use High Contrast check box, and then click Apply.

QUESTION What other options are on the Display tab, and what do they do?

ANSWER

The other options on the Display tab are the Blink Rate and the Width, which adjust how fast the cursor blinks and how wide it is.

Mouse Accessibility Settings

2. Ensure that NUM LOCK is turned on, and use the 4, 8, 6, and 2 keys to navigate the mouse cursor to the Settings button, and then press the PLUS SIGN (+).

Page 34: Lab Manual Answers

34 LAB 5 ANSWERS

QUESTION What is the keyboard shortcut for MouseKeys?

ANSWER

The keyboard shortcut for MouseKeys is LEFT ALT + LEFT SHIFT + NUM LOCK.

LAB REVIEW QUESTIONS

Estimated completion time: 15 minutes1. A user’s mouse cursor is represented as a bug, instead of the familiar

arrow. Which tab of the Display Properties dialog box should the user visit to fix this problem?

ANSWER

The Themes tab. Themes allow the user to set a combination of the back-ground, a set of sounds, icons, and other elements by selecting a single theme.

2. A user has set a picture of her son as the background image on her desktop. However, the image is horribly distorted; the face is three times as wide as it is tall. What is wrong, and how can you fix it?

ANSWER

The desktop background image (a picture of her son) is set to stretch to fit the desktop. It needs to be set to be centered without any stretching. In the Display Properties dialog box, on the Desktop tab, change the Posi-tion drop-down list from Stretch to Center.

3. Knowing from what location you organize the Start menu for an indi-vidual user, where do you think you can organize the Start menu for all users of a Windows XP installation?

ANSWER

You can organize the Start menu for all users by accessing C:\Documents And Settings\All Users\Start Menu. Or, you can right-click the Start menu, and then select Open All Users or Explore All Users.

4. A user who spends half his time in New York and the other half in Paris wants to add French as an alternative input language on his computer. What option in Control Panel should he choose?

ANSWER

To add French as an alternative input language, he should choose Date, Time, Language, And Regional Options in Control Panel.

Page 35: Lab Manual Answers

LAB 5 ANSWERS: CONFIGURING AND MANAGING THE USER EXPERIENCE 35

LAB CHALLENGE 5-1: CREATING A CUSTOM DESKTOP

The head of the human resources department tells you a story of a study where a random sample of workers was given brighter overhead lights. Productivity went up. The researchers increased lighting more, and productivity went up again. After increasing brightness to a very high level a third time and finding another increase in productivity, they lowered the brightness of the lights of a different group, which also resulted in increased productivity!

The conclusion was that the attention given to the employees, not the altering of light levels, is what increased productivity. In the spirit of this study, the human resources department wants to track the productivity of users who receive cus-tomized desktops that look and feel different from the default. They want to see whether productivity is altered, and how long changes in productivity last.

You have been asked to create the custom desktop that will be used for testing. This lab challenge is open ended and has no correct answer, but consider doing some or all of the following:

■ Use a different theme.

■ Change the desktop background image.

■ Create a custom screen saver.

■ Change the default font.

■ Relocate the taskbar.

■ Modify the organization of the Start menu.

Once you have modified your local student account to create a custom desktop, be sure to change the essential behaviors back to the default so that future labs will work.

ANSWER

Lab Challenge 5-1 has no single correct answer; just create a custom desktop (with your local student account) using the techniques you learned in Lab 5. Once you are done, restore the default settings so that future labs will work as written.

Page 36: Lab Manual Answers

36 LAB 6 ANSWERS

LAB 6CONFIGURING AND MANAGING PRINTERS

EXERCISE 6-1: INSTALLING A SHARED PRINTER

Installing a Shared Printer

20. Open the Test.txt file.

QUESTION What do the first two lines of the Test.txt document contain (ignoring nonalphanumeric characters)?

ANSWER

The first two lines of the Test.txt document contain “Windows XP” and “Printer Test Page.”

QUESTION According to the Test.txt file, in what format is the data that is sent to the printer?

ANSWER

The format of the data sent to the printer is Raw.

EXERCISE 6-2: ACCESSING SHARED PRINTERS

Accessing a Shared Printer through the Network

15. In the \\Computerxx window, in the address text box, type C:\Documents And Settings\Studentxx.CONTOSO and press ENTER.

QUESTION When you print to file on a shared printer on another com-puter, by default, is the document printed to a file on the local computer or on the computer hosting the printer?

ANSWER

When you print to file on a shared printer on another computer, by default, the document is printed to file on the local computer.

Searching for a Printer in Active Directory

10. Select the Can Print Color check box, and then click Find Now.

Page 37: Lab Manual Answers

LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 37

QUESTION How many printers at Contoso are available that can print color?

ANSWER

There are no color printers available at Contoso.

12. In the Printers tab, in the Location text box, type Room yy and then click Find Now.

QUESTION What printer is available in Room yy?

ANSWER

Printer3 is available in Room yy.

Using the Add Printer Wizard to Add a Network Printer

3. On the Local Or Network Printer page, answer the following question, and then click Next.

QUESTION What is the only option available to your student account on Contoso, and why are the other options unavailable?

ANSWER

The only option available is to add A Network Printer, Or A Printer Attached To Another Computer. The other options are not available because they require the Manage Printers permission, which the Contoso student accounts lack.

EXERCISE 6-4: MANAGING DOCUMENTS IN THE PRINT QUEUE

23. In the Connect To Computerxx.Contoso.Local dialog box, enter your local Administrator credentials and then click OK.

QUESTION In the HP LaserJet 4 window, which of the three documents in the printer queue has a status of printing?

ANSWER

The Internet Jokes.rtf document, which is the last document listed in the queue, has a status of printing.

Page 38: Lab Manual Answers

38 LAB 6 ANSWERS

QUESTION Does the fact that a file not at the top of the queue is printing before others listed above it indicate that its priority number is higher or lower (assuming that the priority assigned to the documents is responsible for the out–of-order printing)?

ANSWER

It indicates that the priority number is higher because higher numbers mean higher priority.

EXERCISE 6-5: PRINTER PERMISSIONS

6. In the Enter Network Password dialog box, in the User Name text box, type StudentAdmin, and in the Password text box, type P@ssw0rd. Click OK.

QUESTION You are currently logged on as an administrator. Why can’t you use your current credentials to add your student account?

ANSWER

The scope of the local administrator account does not extend to domain administration. The Contoso student account is a member of the Contoso domain and therefore cannot be added by an administrator account that covers only the local computer.

LAB REVIEW QUESTIONS

1. Almost all printer-related tasks begin by accessing the same location where you can view all the printers on the local computer. What is the name of this location, and from where can you get to it?

ANSWER

The name of the location is Printers And Faxes, and it can be accessed from the Start menu or from Control Panel.

2. When configuring Internet printing, what component of Windows do you need to partially install?

ANSWER

To use Internet printing, you need to install components of Internet Infor-mation Services (IIS).

Page 39: Lab Manual Answers

LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 39

3. You are technical support agent at Contoso. Because you are moving continually from site to site fixing problems, you often do not have access to a computer. So that you can check your e-mail messages, you have purchased a Pocket PC that connects to the Contoso network via a wireless connection. You want to be able to easily administer printers from your Pocket PC. How can you accomplish this?

ANSWER

You can install Internet printing, which will allow you to manage network printers via the Web browser on your Pocket PC.

4. On all printers, by default the Everyone group (which includes all users) is allowed the Print permission. If you were to select the Deny option for the Print permission on the printer for your student account, would you be able to print on that printer? Why or why not?

ANSWER

No, you would not be able to print because Deny permissions always take precedence over Allow permissions.

5. Because of high printing volume, the graphics design department has recently been given five new printers, all identical. A colleague of yours successfully installed all the printers, but the users complain that they don’t have a good way of deciding which printer to send their docu-ments to distribute the load evenly. How can you fix this?

ANSWER

You can ensure that the load is distributed evenly by configuring printer pooling. This will create only one logical printer for the users to print to, which will distribute print jobs to all five printers evenly. Also, you might want to configure a cover page that identifies the document and its source.

LAB CHALLENGE 6-1: SETTING UP FAXING

Currently, Contoso uses a standard fax machine at the front desk. The fax machine is old and is continually requiring maintenance, and the printing quality is degrading quickly.

You have decided to create a fax printer on a computer at the front desk that is currently configured as a print server.

Page 40: Lab Manual Answers

40 LAB 6 ANSWERS

To complete this lab challenge, do the following:

■ Install a standard 56,000 bps modem

■ Enable faxing

■ Install a fax (logical fax)

■ Configure the fax with the following parameters:

❑ Phone number 100-123-4567

❑ TSID and CSID of Contoso 100-123-4567

❑ Uses HP LaserJet 4 printer

❑ Stores a copy of faxes in C:\Faxes

ANSWER

To set up faxing complete the following steps:1. Log on with your local Administrator account.2. Install a standard 56,000 bps modem (referring to Lab 4,

Exercise 4-2, “Installing Hardware Manually Using the Add Hardware Wizard,” if necessary) if one is not already installed.

3. Ensure that your Windows XP Installation CD is in your CD-ROM drive.

4. From the Start menu, select Printers And Faxes.5. In the Printers And Faxes window, in the Printer Tasks pane,

select Set Up Faxing.6. The Configuring Components page will appear during installa-

tion, and then disappear.7. In the Printers And Faxes window, in the Printer Tasks pane,

click Install A Local Fax Printer.8. The Printers And Faxes window will update to show the Fax

icon. Double-click Fax.9. In the Location Information dialog box, in the What Area Code

(Or City Code) Are You In Now text box, type 100 and then click OK.

10. In the Phone And Modem Options dialog box, click OK.11. In the Fax Configuration Wizard, on the Welcome page, click

Next.12. On the Sender Information Page, in the Your Full Name text

box, enter fictitious information and click Next, or just click Next.

13. On the Select Device For Sending Or Receiving Faxes page, ensure that the Enable Send check box is selected, and select the Enable Receive check box. Click Next.

Page 41: Lab Manual Answers

LAB 6 ANSWERS: CONFIGURING AND MANAGING PRINTERS 41

14. On the Transmitting Subscriber Identification (TSID) page, in the TSID text box, type 100-123-4567 Contoso and then click Next.

15. On the Called Subscriber Identification (CSID) page, in the CSID text box, type 100-123-4567 Contoso and then click Next.

16. On the Routing Options page, select the Print It On check box, and in the drop-down list select HP LaserJet 4.

17. Select the Store A Copy In A Folder check box, and then click Browse.

18. In the Browse For Folder dialog box, browse to Local Disk (C:) and then click Make New Folder.

19. Type Faxes for the name of the folder, and then press ENTER. Click OK.

20. In the Fax Configuration Wizard, on the Routing Options page, click Next.

21. On the Completing The Fax Configuration Wizard page, click Finish.

LAB CHALLENGE 6-2: CONFIGURING MULTIPLE PRINTERS FOR DIFFERENT PRIORITIES AND SCHEDULES

The HP LaserJet 4 in the main hallway is a very busy printer, and people often have to wait a long time for their documents to print.

Currently, all documents sent to the printer are queued on a first-come, first-served basis. You need to create two new logical printers, one that prints at maximum priority and one that prints during off-hours. This way, employees can select the high-priority printer if they need to print a document quickly, or they can select the off-hours printer if they do not need the document until the next, day. Also, really long documents can be sent to the off-hours printer to keep the print device from being occupied printing long documents during working hours.

To complete this lab challenge, do the following:

■ Install an HP LaserJet 4 Printer that points to the HP LaserJet 4 print device on the LPT1 port (which is a fictitious print device), and set it to print with a priority of 99. Name this printer High Priority-HP LaserJet 4. Make the share name HighPri.

■ Install an HP LaserJet4 Printer that points to the HP LaserJet 4 print device on the LPT1 port, and set it to print only between 6 P.M. and 7 A.M. Name this printer HP Off Hours-HP LaserJet4. Make the share name OffHours.

Page 42: Lab Manual Answers

42 LAB 6 ANSWERS

ANSWER

To configure the two new printers, complete the following steps.

1. Log on with your local Administrator account.2. Install and share the printers. Use the TCP/IP port pointing

to 10.1.1.152 (referring to Lab 6, Exercise 6-1, “Installing a Shared Printer,” if necessary). You will not need to create a new TCP/IP port; the correct port has already been created. Ensure that the printers you add are not set to be the default printers.

3. In the Printers And Faxes window, right-click High Priority-HP LaserJet 4 and then select Properties.

4. In the High Priority-HP LaserJet 4 Properties dialog box, in the Advanced tab, in the Priority spin box, type 99 and then click OK.

5. In the Printers And Faxes window, right-click Off Hours-HP LaserJet 4 and then select Properties.

6. In the Off Hours-HP LaserJet 4 Properties dialog box, in the Advanced tab, select Available From.

7. In the first Available From text box, select 6 PM, and in the second, select 7 AM. Click OK.

Page 43: Lab Manual Answers

LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 43

LAB 7CONFIGURING AND MANAGING NTFS SECURITY

EXERCISE 7-1: CONFIGURING NTFS PERMISSIONS

Configuring Permissions

8. In the Select Users, Computers, Or Groups dialog box, in the Enter The Object Names To Select (Examples) text box, type Computerxx\Accountants and then click Check Names. Click OK.

QUESTION What three permissions for Accountants are set to Allow by default?

ANSWER

The Read & Execute, List Folder Contents, and Read permissions are all assigned to the group Accountants (or any other group) when it is added.

9. In the Group Or User Names list, select Users and then click Remove.

QUESTION Why can’t you remove the Users group?

ANSWER

Because the folder is set to inherit permissions, and the Users group has rights in the parent folder (drive C), which it is inheriting. You cannot remove a group or user from a folder’s permissions when it is set to inherit permissions.

Testing Permissions

12. Double-click AllenB’s Document.

QUESTION Can you read the contents of AllenB’s Document?

ANSWER

Yes, you can read AllenB’s Document.

14. From the File menu, select Save.

QUESTION Can you save the changes you made to AllenB’s Document?

Page 44: Lab Manual Answers

44 LAB 7 ANSWERS

ANSWER

No, you do not have permission to write to the file.

QUESTION Why were you able to save changes to the file when you were logged on as AllenB, but not JayH, when you are both members of the Accountants group?

ANSWER

The Accountants group does not have the Write permission, so being a member of that group does not grant you permission to write to any file. But the Creator Owner group is allowed the Write permission, so AllenB is allowed to change the file because he is a member of the Creator Owner group for the file.

QUESTION We assigned the Accountants group the Create Files / Write Data special permission on the Share 1 On Volume 1 folder. Why isn’t the Write Data portion of this permission enough to allow you to write as JayH to a file created by another user, as long as it is in the Share 1 On Volume 1 folder?

ANSWER

The Write Data portion of the Create Files / Write Data special permis-sion has no effect at all when applied to a folder. The Write Data portion will affect only files, whereas the Create Files portion applies only to folders.

EXERCISE 7-2: UNDERSTANDING NTFS PERMISSIONS

Effective Permissions

6. In the Select User, Computer, Or Group text box, in the Enter The Object Name To Select (Examples) text box, type Computerxx\Accountants and then click Check Names. Click OK.

QUESTION What are the effective permissions that are granted to the Accountants group for the Share 1 On Volume 1 folder?

ANSWER

The effective permissions are Transverse Folders / Execute Files, List Folders / Read Data, Read Attributes, Read Extended Attributes, Create Files / Write Data, and Read Permissions.

Page 45: Lab Manual Answers

LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 45

8. In the Select User, Computer, Or Group text box, in the Enter The Object Name To Select (Examples) text box, type Computerxx\Administrator and then click Check Names. Click OK.

QUESTION What are the effective permissions that are granted to the local Administrator account for the Share 1 On Volume 1 folder?

ANSWER

The Administrator has all effective permissions.

15. In the Select User, Computer, Or Group text box, in the Enter The Object Name To Select (Examples) text box, type Computerxx\AllenB and then click Check Names. Click OK.

QUESTION The Accountants group only explicitly allows a subset of all permissions, but AllenB has all effective permissions for the file AllenB’s Document. Why?

ANSWER

The Creator Owner group has full permissions, and AllenB created the file and owns it.

Understanding the Relationship Between Permissions and Special Permissions

5. Select the Allow check box for the Modify permission.

QUESTION What other Allow check boxes are selected when you select the Modify check box?

ANSWER

The Allow check boxes for the Read & Execute, List Folder Contents, Read, and Write permissions are automatically selected when the Allow check box for the Modify permission is selected.

6. Clear all the check boxes, and then select the Allow check box for the Read & Execute permission.

QUESTION When you select the Allow check box for the Read & Execute permission, what other Allow check boxes are selected?

Page 46: Lab Manual Answers

46 LAB 7 ANSWERS

ANSWER

The Allow check boxes for the List Folder Contents and Read permissions are selected automatically when you select the Allow check box for the Read & Execute permission.

9. Use the Permission Entry For Share 1 On Volume 1 dialog box, as shown in the following figure, to answer the inline questions that follow it.

GL07ht03.bmp

QUESTION What special permissions constitute the Read & Execute permission?

ANSWER

The Traverse Folder / Execute File, List Folder / Read Data, Read Attributes, Read Extended Attributes, and Read Permissions special permissions constitute the Read & Execute permission.

Copying and Moving Files with NTFS Permissions

9. In the Copy Of Share 1 On Volume 1 Properties dialog box, on the Security tab, examine the Group Or User Names list.

QUESTION Does the Accountants group appear in the list?

ANSWER

No, the Accountants group does not appear in the list. This means that the NTFS permissions were not copied to the new folder.

Page 47: Lab Manual Answers

LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 47

15. Examine the Security tabs in the Properties for the folders you moved and copied, and complete the following chart.

QUESTION

ANSWER

LAB REVIEW QUESTIONS

1. You have added an account to a group that has the Write permission for a folder, but you are still unable to write to the folder. What could be causing this?

ANSWER

The account is denied the Write permission through its membership to another Group or by account name explicitly. Deny permissions override Allow permissions.

Moved Within NTFS Volume

Copied Within NTFS Volume

Moved to Other NTFS Volume

Copied to Other NTFS Volume

Retained NTFS PermissionsDid Not Retain NTFS Permissions (inherited them from destination folder instead)

Moved Within NTFS Volume

Copied Within NTFS Volume

Moved to Other NTFS Volume

Copied to Other NTFS Volume

Retained NTFS Permissions

X

Did Not Retain NTFS Permissions (inherited them from destination folder instead)

X X X

Page 48: Lab Manual Answers

48 LAB 7 ANSWERS

2. When you block permission entries from being inherited from a parent, you are asked what you want to do with the current permis-sions that were inherited. What are the two options?

ANSWER

When you block permission entries from being inherited from a parent, you have the option of either copying the currently inherited permissions to the current object, or removing all inherited permissions and keeping only permissions that are explicitly defined at the object level.

3. What special permissions constitute the Write permission?

ANSWER

The Create Files / Write Data, Create Folders / Append Data, Write Attributes, and Write Extended Attributes special permissions constitute the Write permission.

4. A user belongs to six separate groups, all with different permissions. You are trying to figure out what permissions the user has by mapping them by hand. What is an easier way to find out what his permissions are when his membership to all the groups is taken into account?

ANSWER

An easy way to find his permissions is to use the Effective Permissions tab in the Advanced Security Settings dialog box.

5. A user has copied a data file using a CD burner from a Windows 98 computer and transferred the file to a Windows XP computer. When the application that uses the data file is started, an “access is denied” error appears and references the data file. What might be the problem?

ANSWER

When you save files to a CD-ROM, they are set to read-only. You need to allow the Write permission for the file to the appropriate users.

LAB CHALLENGE 7-1: USING THE COMMAND LINE WITH NTFS PERMISSIONS

Many users in the accounting department share computers depending on what tasks they are performing and the applications they are using. Each of these computers has a local Accountants user group, to which each user in the department belongs.

Page 49: Lab Manual Answers

LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 49

Each of the workstations has a folder on the root of drive C, named Share 2 On Volume 1, that needs to be accessible only to the Administrators group, the Accountants group, and the SYSTEM. You are not sure who can access the folder right now.

Rather than set the NTFS permissions for the folder on each of the 20 worksta-tions manually, you have decided to write a batch file that will change the settings using the Cacls command. You can then distribute the batch file either over the network or on a floppy disk to be run on each workstation.

To complete this lab challenge, do the following:

Write a batch file named Permissions.bat on the root of drive C that will:

1. List the permissions on the “Share 2 On Volume 1” folder.

2. Allow Full Control for the SYSTEM group, while replacing all existing permissions.

3. Allow Full Control for the Administrators group, while preserving existing permissions.

4. Allow Read and Write permissions for the Accountants group, while preserving existing permissions.

5. List the permissions after they have been changed.

6. Once the batch file is complete, run it successfully.

NOTE A batch file is text file that contains commands that are exe-cuted one at a time as if they were being typed directly into a command-prompt window. You can create a batch file by saving a text file as name.bat. You can then run the batch file by entering path:name.bat at a command prompt (for example, C:\Example.bat). Chapter 7 of the text-book book covers the use of the Cacls command. You can also get infor-mation by typing cacls /? at a command prompt or by using the Help and Support Center (search for Cacls).

ANSWER

To create the batch file and run it, complete the following steps:

1. Ensure that you are logged on with your local Administrator account.

2. From the Start menu, point to All Programs, Accessories, and then select Notepad.

3. In Notepad, type the following code. (The @REM are comments and will not affect the output of the program, and therefore do not need to be included.)

Page 50: Lab Manual Answers

50 LAB 7 ANSWERS

@REM Get to the root of C.

CD C:\

@REM List the current NTFS permissions of the Share 2 On

Volume 2 folder- quotes are necessary due to spaces.

CACLS "Share 2 On Volume 1"

@REM Allow the SYSTEM group and the Administrators group full

control. Because the /E switch was not used in the first

instance, all existing permissions are removed.

CACLS "Share 2 On Volume 1" /G SYSTEM:F

CACLS "Share 2 On Volume 1" /E /G Administrators:F

@REM Allow Accountants the Read and Write permissions.

Because the /E switch is used, this adds to existing

permissions (it doesn't replace them).

CACLS "Share 2 On Volume 1" /E /G Accountants:R

CACLS "Share 2 On Volume 1" /E /G Accountants:W

@REM Lists the current permissions for the Share 2 On

Volume 1 folder.

CACLS "Share 2 On Volume 1"

4. From the File menu, select Save As.5. In the Save As dialog box, in the File Name text box, type

“C:\Permissions.bat” and then press ENTER.6. Close Notepad.7. From the Start menu, select Run.8. In the Run dialog box, in the Open text box, type cmd and then

press ENTER.9. At the command prompt, type C:\Permissions.bat and then

press ENTER. Answer Yes to any queries. Your output should look like the following:C:\Documents and Settings\Administrator>C:\Permissions.bat

C:\Documents and Settings\Administrator>CD C:\

C:\>CACLS "Share 2 On Volume 1"

C:\Share 2 On Volume 1 BUILTIN\Administrators:(OI)(CI)F

NT AUTHORITY\SYSTEM:(OI)(CI)F

COMPUTER07\Administrator:F

CREATOR OWNER:(OI)(CI)(IO)F

BUILTIN\Users:(OI)(CI)R

BUILTIN\Users:(CI)(special access:)

FILE_APPEND_DATA

BUILTIN\Users:(CI)(special access:)

FILE_WRITE_DATA

C:\>CACLS "Share 2 On Volume 1" /G SYSTEM:F

Are you sure (Y/N)?y

processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1" /E /G Administrators:F

processed dir: C:\Share 2 On Volume 1

Page 51: Lab Manual Answers

LAB 7 ANSWERS: CONFIGURING AND MANAGING NTFS SECURITY 51

C:\>CACLS "Share 2 On Volume 1" /E /G Accountants:R

processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1" /E /G Accountants:W

processed dir: C:\Share 2 On Volume 1

C:\>CACLS "Share 2 On Volume 1"

C:\Share 2 On Volume 1 NT AUTHORITY\SYSTEM:(OI)(CI)F

BUILTIN\Administrators:(OI)(CI)F

COMPUTER07\Accountants:(OI)(CI)

(special access:)

READ_CONTROL

SYNCHRONIZE

FILE_GENERIC_READ

FILE_GENERIC_WRITE

FILE_GENERIC_EXECUTE

FILE_READ_DATA

FILE_WRITE_DATA

FILE_APPEND_DATA

FILE_READ_EA

FILE_WRITE_EA

FILE_EXECUTE

FILE_READ_ATTRIBUTES

FILE_WRITE_ATTRIBUTES

Page 52: Lab Manual Answers

52 LAB 8 ANSWERS

LAB 8CONFIGURING AND MANAGING SHARED FOLDERS

EXERCISE 8-1: SHARING A FOLDER ON THE NETWORK

Sharing a Folder with the Create A Shared Folder Wizard

3. In the Computer Management console, in the console tree, under System Tools, expand Shared Folders, and then select Shares.

QUESTION What shares currently exist?

ANSWER

The shares ADMIN$, C$, IPC$, L$, and Print$ all exist. They are all admin-istrative shares and are hidden. Share names followed by a dollar sign ($) are hidden from network browsing.

10. In the Shared Folder Permissions dialog box, select Customize Permission.

QUESTION What four permissions settings are offered for the shared folder?

ANSWER

The four permissions settings offered for the shared folder are as follows:1. All Users Have Read-Only Access.2. Administrators Have Full Access; Other Users Have Read-Only

Access.3. Administrators Have Full Access; Other Users Have No Access.4. Customize Permissions.

EXERCISE 8-2: ACCESSING SHARED FOLDERS

Accessing Shared Folders Through My Network Places

7. Open Windows Explorer, and browse to Accounting Data on Computeryy.

QUESTION What occurs when you try to access the shared folder Accounting Data on your partner’s computer?

ANSWER

When you try to access the shared folder Accounting Data on your part-ner’s computer, you receive a message indicating that access is denied.

Page 53: Lab Manual Answers

LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 53

9. In Windows Explorer, browse to C:\Accounting Data.

QUESTION Why are you able to access the shared folder Accounting Data on your computer, but you are not able to access the same folder on your partner’s computer, when the share and NTFS permissions are identical?

ANSWER

You are not able to access the shared folder Accounting Data on your partner’s computer because the share permissions allow access only to the Accountants and Domain Administrators groups. However, these permissions only affect access over the network and do not affect con-nections to the folder made locally. Therefore, you can access the folder locally because it is allowed by the NTFS permissions.

Mapping a Drive to a Network Folder

10. In the tree view, expand My Network Places, Entire Network, Microsoft Win-dows Network, Contoso, Computerxx, and then select Sales Projections.

QUESTION Summarize what the message box states.

ANSWER

The message box states that no more connections can be made because as many connections as the computer can accept have been made.

QUESTION The Sales Projections folder that we just tried to access is stored locally. Because share permissions apply only to resources accessed over the network, why were we unable to access the Sales Projections folder?

ANSWER

We were unable to access the folder, even though it is local, because we tried to access it via the network, not from the hard drive directly, and therefore the share permissions disallowed the connection because we set the connection limit to one. (Your partner is already connected to it via a mapped drive.)

EXERCISE 8-3: MONITORING SHARED FOLDERS

7. In the Computer Management console, in the console tree, under System tools, expand Shared Folders, and then select Sessions.

QUESTION How many open files are there in MZwilling’s current session?

Page 54: Lab Manual Answers

54 LAB 8 ANSWERS

ANSWER

There is one open file.

8. In the console tree, select Open Files.

QUESTION What folder is the open file located in?

ANSWER

The file is in the folder C:\Sales Projections.

EXERCISE 8-4: CONFIGURING SYNCHRONIZATION

7. Ensure that the \\Computeryy\Sales Projections On Computeryy check box is selected, and then click Properties.

QUESTION In the Offline Files folder, what documents are present?

ANSWER

The Projections 2006 – 2010 document is present.

LAB REVIEW QUESTIONS

1. How can you designate a share as an administrative share, which will cause it to be hidden?

ANSWER

Appending the share name with $ will designate it as an administrative share. Administrative shares do not appear as a network resource because ordinary users have no reason to view them.

2. You create a shared folder and allow only Domain Admins access to it. However, you find that you can access the folder on the file server when you log on as a Domain User. Why can you access the folder?

ANSWER

Shared folder permissions apply only when the folder is accessed over the network. If the folder is accessed locally, the shared permissions do not apply (but the NTFS permissions still apply).

3. How is the Synchronization Manager accessed?

Page 55: Lab Manual Answers

LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 55

ANSWER

To access the Synchronization Manager, from the Tools menu of Windows Explorer or a folder window, select Synchronize.

4. You work for a software company that sells tax software. They have been selling the same DOS-based application for 15 years because their clientele is used to it and can use it very efficiently. The software was designed before networking was available, and you need to store the data files on a file server rather than the local machine. However, the program will work only if the data designated by the software is stored on the root of a drive. How can you use the file server and satisfy the software’s requirement that it be able to store data on the root of a drive?

ANSWER

To make the shared folder on the file server look like a local drive to the client machine, you can map a network drive to the folder. This can be done by selecting Map Network Drive from the Tools menu of Windows Explorer.

LAB CHALLENGE 8-1: USING SCRIPTSTO CONFIGURE SHARES

Contoso has 20 separate locations in the United States, and each location is being equipped with a new file server. The file servers are going to have six shared fold-ers, which will have the same names regardless of location. You need to create a batch file that automatically creates these six shares. Once the shares are created, on-site technicians will set the permissions manually according to their needs.

To complete this lab challenge, do the following:

1. Write a batch file named SharedFolders.bat that uses the Net Share command to share the following folders. The share name and folder name should be the same, and the folders should be located in C:\Standard Shares\.

❑ Financial

❑ Marketing

❑ Support

❑ Miscellaneous

❑ Legal

❑ Customer Support

Page 56: Lab Manual Answers

56 LAB 8 ANSWERS

2. Run the batch file.

3. Verify that your partner has successfully run the batch file by accessing the shared folders on your partner’s computer from a Run dialog box.

TIP A batch file is text file that contains commands that are executed one at a time as if they were being typed directly into a command-prompt window. You can create a batch file by saving a text file as name.bat. You can then run the batch file by entering path:name.bat at a command prompt (for example, C:\Example.bat). Chapter 8 of the text book covers the use of the Net Share command. You can also get information by typing net share /? at a command prompt or by using the Help and Support Center (searching for Net Share). To create a directory at the command line, use the Md command. For example, to create the folder Standard Shares, type md “C:\Standard Shares”. You will need to create each folder before you share it.

ANSWER

To create the batch file and run it, complete the following steps:1. Ensure that you are logged on with your local Administrator

account.2. From the Start menu, point to All Programs, Accessories, and

then select Notepad.3. In Notepad, type the following code. (The @REM are comments

and will not affect the output of the program, and therefore they do not need to be included.)@REM Create the "Standard Shares" folder and the folders within it

md "C:\Standard Shares"

md "C:\Standard Shares\Financial"

md "C:\Standard Shares\Marketing"

md "C:\Standard Shares\Support"

md "C:\Standard Shares\Miscellaneous"

md "C:\Standard Shares\Legal"

md "C:\Standard Shares\Customer Support"

@REM Share the folders

net share Financial="c:\Standard Shares\Financial"

net share Marketing="c:\Standard Shares\Marketing"

net share Support="c:\Standard Shares\Support"

net share Miscellaneous="c:\Standard Shares\Miscellaneous"

net share Legal="c:\Standard Shares\Legal"

net share "Customer Support"="c:\Standard Shares\Customer Support"

4. From the file menu, select Save.5. In the Save As dialog box, in the File Name text box, type

“C:\ShareFolders.bat” and then press ENTER.6. From the Start menu, select Run.7. In the Run dialog box, in the Open text box, type cmd and then

press ENTER.8. In the command prompt window, at the command prompt, type

cd C:\ and then press ENTER.

Page 57: Lab Manual Answers

LAB 8 ANSWERS: CONFIGURING AND MANAGING SHARED FOLDERS 57

9. At the command prompt, type ShareFolders and then press ENTER. The batch file will run.

10. Once you partner has completed step 9, open a Run dialog box, and in the Open text box, type \\10.1.1.yy and then press ENTER. You should see all the newly shared folders in the \\10.1.1.yy folder.

LAB CHALLENGE 8-2: USING WEB FOLDERS

You have decided to create an intranet site where you can post documents that you want domain users to be able to access as read-only. To do this, you need to install the World Wide Web Service and supporting components within Internet Information Services (IIS).

To complete this lab challenge, perform the following steps:

1. Install the World Wide Web Service component of Internet Information Services (IIS).

2. Create and share as a Web folder C:\Intranet Share with the alias Intranet Share. Make sure that the Read and Directory Browsing access permis-sions are assigned to the folder.

3. Once your partner has completed the first two tasks, ensure that you can access http://Computeryy/Intranet Folder from your Contoso stu-dent account.

ANSWER

The following steps will complete the lab challenge:NOTE Before you begin the following steps, load your Windows XP instal-lation CD into the CD-ROM drive. If the Welcome To Microsoft Windows XP window appears, close it.

1. Ensure that you are logged on with your local Administrator account.

2. From the Start menu, select Control Panel.3. In Control Panel, click Add Or Remove Programs.4. In the Add Or Remove Programs window, click Add/Remove

Windows Components.5. In the Windows Components Wizard, in the Components list

box, select Internet Information Services (IIS) (not its check box) and then click Details.

6. In the Internet Information Services (IIS) dialog box, select Word Wide Web Service (not its check box) and then click Details.

7. In the World Wide Web Service dialog box, select the World Wide Web Service check box. Click OK.

Page 58: Lab Manual Answers

58 LAB 8 ANSWERS

NOTE If you completed other labs, the World Wide Web Service check box might already be selected. In this case, click Cancel.

8. In the Internet Information Services dialog box, click OK.9. In the Windows Components Wizard, click Next.

10. The Configuring Components page will appear and indicate progress.

11. On the Completing The Windows Components Wizard page, click Finish.

12. Close the Add Or Remove Programs dialog box.13. Close the Control Panel.14. From the Start menu, select My Computer.15. In the My Computer window, double-click Local Disk (C:).16. In the Local Disk (C:) window, from the File menu, point to New

and then select Folder.17. For the name of the folder, type Intranet Share and then

press ENTER.18. Right-click Intranet Share, and then select Properties.19. In the Intranet Share Properties dialog box, in the Web Sharing

tab, select Share This Folder.20. In the Edit Alias dialog box, select the Directory Browsing

check box and then click OK.21. In the Intranet Share Properties dialog box, click OK.22. Log off and log back on to Contoso with your student account.23. From the Start menu, select Internet Explorer.IMPORTANT Wait until your partner has completed the previous step before continuing.

24. In Internet Explorer, in the Address text box, type http://Computeryy/Intranet Share.

25. The Computeryy - /Intranet Share/ page should appear.

Page 59: Lab Manual Answers

LAB 9 ANSWERS: SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL 59

LAB 9SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL

EXERCISE 9-2: ASSESSING PRODUCT COMPATIBILITY

Checking System Information with Computer Management

13. In the details pane, expand Display Adapters, Network Adapters, and Processors, as shown in the following figure.

GL09ht02.bmp

QUESTION Does Computer08 in the preceding figure meet the processor requirements for Fruit Stand 3-D: The Final Fig?

ANSWER

Yes, it meets the processor requirements.

15. In the details pane, right-click drive C and select Properties, as shown in the following figure.

GL09ht03.bmp

Page 60: Lab Manual Answers

60 LAB 9 ANSWERS

QUESTION Does Computer08 in the preceding figure have enough space on drive C to install Fruit Stand 3-D: The Final Fig?

ANSWER

No, it has only 1.57 gigabytes (GB) free, and 2 GB are required.

17. In the Computer Management (COMPUTERyy) Properties dialog box, on the General tab, read the Computer section to determine how much RAM your partner’s computer has. The General tab is displayed for Computer08 in the following figure.

GL09ht04.bmp

QUESTION Does Computer08 in the preceding figure have enough RAM to run Fruit Stand 3-D: The Final Fig?

ANSWER

Yes, it has 1 GB and only 256 megabytes (MB) are required.

Using the Windows Catalog

3. On the Software page, in the Search text box, type Litware and then click Go.

QUESTION Did Litware appear in the Windows Catalog?

ANSWER

No, Litware did not appear in the Windows Catalog. This omission does not mean that Litware is incompatible with Windows XP; it just means that it has not been listed in the Windows Catalog or certified by Microsoft as compatible.

Page 61: Lab Manual Answers

LAB 9 ANSWERS: SUPPORTING APPLICATIONS IN WINDOWS XP PROFESSIONAL 61

LAB REVIEW QUESTIONS

1. What is the difference between assigning and publishing software to users through Group Policy?

ANSWER

Assigning software either installs the software upon logon or creates a shortcut for the software in the Start menu but waits to install it until it is invoked. Publishing software makes the software available through Add Or Remove Programs.

2. What is the difference between assigning and publishing software to computers through Group Policy?

ANSWER

Software cannot be published to computers through Group Policy. Assigning software to computers causes the software to be installed on the next startup.

3. You have received a critical upgrade to a program used throughout the Accounting division at Contoso. All employees of the Accounting divi-sion of Contoso are in the same OU. You want the computers of all the users who are using the current version to have it uninstalled and to have the new version installed automatically. The new version is pack-aged in a standalone MSI package. How can you use Group Policy to do this?

ANSWER

You need to edit a group policy object (GPO) attached to the OU and assign the new MSI package to the GPO. You need to edit the properties of the MSI package distribution and on the Upgrades tab specify that the new software is replacing the old software, and that the old software needs to be uninstalled. Also, to make the deployment automatic, you need to set the software to install on logon.

4. A program used in the Accounting division is outdated, and when it runs, it uses only the top-left portion of the screen. What setting on the Compatibility tab might mitigate this problem?

ANSWER

The Run In 640 x 480 Screen Resolution setting might fix this problem by reducing the resolution so that the application fits in the screen correctly.

Page 62: Lab Manual Answers

62 LAB 9 ANSWERS

5. What resource provided by Windows offers a list of programs that have been certified to work with Windows XP, and what is its URL?

ANSWER

The Windows Catalog provides a list of programs and compatibility levels with Windows XP. Its URL is http://www.microsoft.com/windows/catalog.

LAB CHALLENGE 9-1: ASSIGNING SOFTWARE TO COMPUTERS THROUGH ACTIVE DIRECTORY

The call center at Contoso is going to be using new software that should be available to all users on the call center workstations. Rather than distributing through Group Policy to users, you need to distribute to computers. The computers should install the software the next time that they are restarted.

IT administration has decided that the SDP should be different from the SDP containing the Litware software, so you will need to create a new SDP.

To complete this lab challenge, you need to perform the following steps:

1. Create an SDP at C:\ProsewareSDP with appropriate permissions.

2. Copy Proseware1.0.msi to the SDP from C:\Lab Manual\Lab 9.

3. Edit the Software Distribution GPO attached to the Call Center xx group to assign Proseware1.0 from \\Computerxx\ProsewareSDP.

4. Restart your computer, and verify the installation of Proseware1.0.

ANSWER

To create a new SDP, use the same technique as outlined earlier in Exercise 9-1 in the “Creating an SDP” section. The creation is identical, except for the name, to that of the SDP you created in that exercise. Copy Proseware1.0.msi to the SDP from C:\Lab Manual\Lab 9.

To edit the GPO, open the Group Policy Management console using Contoso\StudentAdmin credentials (the password is P@ssw0rd), and then perform the following steps:

1. In the Group Policy Management console, expand Software Distribution [SERVER.Contoso.Local] Policy, Computer Config-uration, Software Settings, and select Software Installation.

2. From the Action menu, point to New and then select Package.3. In the Open dialog box, browse to Call Center yy On Computer xx.4. Double-click Proseware1.0.5. In the Deploy Software dialog box, click OK.6. Restart your computer, and log on to Contoso as Studentxx.7. From the Start menu, point to Programs and then select

Proseware1.0.8. Read the Windows Script Host message box and then click OK.

Page 63: Lab Manual Answers

LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 63

LAB 10CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK

EXERCISE 10-3: OBTAINING AN IP ADDRESS

Obtaining an IP Address Through APIPA

8. At the command prompt, type ipconfig /all and then press ENTER.

QUESTION What are the first two octets of the IP address, and what do they tell you about the source of the IP address?

ANSWER

The first two octets are 169 and 254, which tells you that the IP address is an APIPA-assigned address.

Using an Alternate IP Address

10. At the command prompt, type ipconfig /all and then press ENTER.

QUESTION What is the Autoconfiguration IP Address as reported by Ipconfig /all?

ANSWER

The Autoconfiguration IP Address as reported by Ipconfig /all is 192.168.1.xx.

QUESTION Why isn’t the preferred DNS server address 192.168.1.200, as specified on the Alternate Configuration tab?

ANSWER

The preferred DNS server is not 192.168.1.200 because the value wasset statically and did not use DHCP. Therefore, it did not change. Tomake this work according to the task scenario, you would have to setthe static value of the preferred DNS server address to 192.168.1.200. However, for the purposes of the lab, leave it as is.

Obtaining an IP Address Through DHCP

3. At the command prompt, type ipconfig /all and press ENTER.

Page 64: Lab Manual Answers

64 LAB 10 ANSWERS

QUESTION The Ipconfig /all command reveals the IP address of the DHCP server. What is it?

ANSWER

The IP address of the DHCP server is 10.1.1.200.

EXERCISE 10-4: USING THE HELP AND SUPPORT CENTER NETWORK DIAGNOSTICS

6. Once the options are set, click Scan Your System. The more computers that are on the network, the longer the scan will take.

QUESTION What is the default gateway according to the results of the diagnosis?

ANSWER

10.1.1.200.

EXERCISE 10-5: USING COMMAND-LINE DIAGNOSTICS

Using NSlookup

2. At the command prompt, type nslookup www.microsoft.com and press ENTER.

QUESTION What information does the NSlookup command convey in this instance?

ANSWER

It returns the IP addresses and aliases from a Domain Name System (DNS) server of the DNS name queried.

LAB REVIEW QUESTIONS

1. You are on a network with a DHCP server. Your computer boots and attempts to renew its lease on its IP address, but is unable to reach the DHCP server, which is down. You are assigned an APIPA address and cannot access the network. Later, the DHCP server is started and work-ing. What is the minimum action you need to take to receive a DHCP-assigned address?

Page 65: Lab Manual Answers

LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 65

ANSWER

No action is necessary. When an APIPA address is assigned, the DHCP client checks for an accommodating DHCP server every five minutes until it receives a DHCP address.

2. How can you tell an APIPA address at first glance?

ANSWER

APIPA addresses always begin with the octets 169 and 254.

3. Can the DHCP client be enabled to receive other IP parameters besides an address, such as the address of a DNS server?

ANSWER

Yes, DHCP can configure many options, including DNS server addresses.

4. What command-line diagnostic used in this lab asks the DNS server to resolve a name on to an IP address, or vice versa?

ANSWER

The Nslookup command was used as a diagnostic to look up and resolve a DNS name into an IP address.

5. You are logged onto your computer as an Administrator. You use Remote Assistance to take control over a user’s computer who is logged on as a Domain User. Whose security credentials take prece-dence when you are accessing his computer?

ANSWER

When you access a computer with remote assistance, the security cre-dentials of the logged-on account on the computer serving the remote desktop take precedence. In this case, you would have only Domain User credentials.

LAB CHALLENGE 10-1: OFFERING REMOTE ASSISTANCE

It is sometimes easier to offer an invitation for Remote Assistance than it is to explain to a client how to request Remote Assistance.

However, this is not allowed by default, and you will have to configure your com-puter to allow Remote Assistance to be offered. This can be done in a domain through Active Directory so that each computer does not need to be configured individually. But in this lab, you need to make the change locally through Group Policy.

Page 66: Lab Manual Answers

66 LAB 10 ANSWERS

To complete this lab challenge, do the following:

1. On your partner’s computer (Computeryy), run Gpedit.msc and enable the Offer Remote Assistance option in the Local Computer Policy\Computer Configuration\Administrative Templates\System\Remote Assistance folder. Allow Studentxx (your student account) to offer Remote Assistance.

2. Offer Remote Assistance to your partner’s computer through the Help And Support Center on your computer (Computerxx). Hint: Use the search function.

3. Confirm that the offer arrived on your partner’s computer.

IMPORTANT This lab challenge should first be completed by one stu-dent in the student pair, and then the other student in the pair. It cannot be completed by both simultaneously.

ANSWER

To modify Group Policy to allow offers of Remote Assistance, complete the following steps.

IMPORTANT The following should be completed on your partner’s computer.

1. Log on with your local Administrator account.2. From the Start menu, select Run.3. In the Run dialog box, type gpedit.msc and then press ENTER.4. In the Group Policy console, under Computer Configuration,

expand Administrative Templates, System, and then select Remote Assistance.

5. In the Details pane, select Offer Remote Assistance, and read the description that appears.

6. From the Action menu, select Properties.7. In the Offer Remote Assistance Properties dialog box, select

Enabled.8. Click Show.9. In the Show Contents dialog box, click Add.

10. In the Add Item dialog box, in the Enter The Item To Be Added text box, type Contoso\Studentyy and then click OK.

11. In the Show Contents dialog box, click OK.12. In the Offer Remote Assistance Properties dialog box, click OK.13. Close the Group Policy console.14. Log off and log back on with your Contoso student account.

Page 67: Lab Manual Answers

LAB 10 ANSWERS: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 67

IMPORTANT Complete the following steps on your computer.

1. Log on to Contoso with your student account.2. From the Start menu, select Help And Support Center.3. In the Help And Support Center, in the Search text box, type

offer remote assistance and then press ENTER.4. In the Search Results pane, click Offer Remote Assistance.5. On the Offer Remote Assistance page, in the Type Or Paste

The Computer Name Or IP Address text box, type Computeryy and then click Connect.

6. In the drop-down list, select CONTOSO\Studentxx and then click Start Remote Assistance.

7. An offer of Remote Assistance should appear on your part-ner’s computer. Click No, and close all open windows on both computers.

LAB CHALLENGE 10-2: USING THE REPAIR FEATURE

Estimated completion time: 15 minutesA user at Contoso has lost connectivity to the Internet and other computers on the network. When this occurs, technicians at Contoso are trained to try using the Repair option to see if the problem can be fixed quickly.

When a Repair command is issued, the following occurs:

■ If Dynamic Host Configuration Protocol (DHCP) is configured, the DHCP lease is renewed: ipconfig /renew

■ Address Resolution Protocol (ARP) cache is flushed: arp -d

■ Purge and reload of the NetBIOS name cache: nbtstat -R

■ NetBIOS name update is sent: nbtstat -RR

■ Domain Name System (DNS) cache is flushed: ipconfig /flushdns

■ DNS name registration: ipconfig /registerdns

■ IEEE 802.1X Authentication Restart (for Windows XP Service Pack 1 and later)

To complete this lab challenge:

1. Use the Repair feature in the context menu of your Local Area Connec-tion network connection.

2. Execute all the separate commands of the Repair feature manually by using the command prompt and the IP Protocol (TCP/IP) Properties dialog box.

Page 68: Lab Manual Answers

68 LAB 10 ANSWERS

ANSWER

1. In the Network Connections window, right-click Local Area Connection and select Repair.

2. In the Repair Local Area Connection message box, click Close.3. Minimize the Network Connections window.4. From the Start menu, select Run.5. In the Run dialog box, in the Open text box, type cmd and then

press ENTER.6. At the command prompt, type arp -d and press ENTER.7. At the command prompt, type nbtstat -R and press ENTER.8. At the command prompt, type nbtstat -RR, and press ENTER.9. At the command prompt, type ipconfig /flushdns and press

ENTER.10. At the command prompt, type ipconfig /registerdns and

press ENTER. An example of all these commands being run is shown in the following figure.

GL10ht05.bmp

11. From the taskbar, restore the Network Connections window.12. Right-click Local Area Connection, and select Properties.13. In the Local Area Connection Properties dialog box, on the

Authentication tab, clear the Enable IEEE 802.1x Authentica-tion For This Network check box. Click OK.

14. Right-click Local Area Connection, and select Properties.15. In the Local Area Connection Properties dialog box, on the

Authentication tab, select the Enable IEEE 802.1x Authenti-cation For This Network check box. Click OK.

NOTE Steps 11 through 15 are a re-creation of the last step that the Repair button executes: IEEE 802.1X Authentication Restart.

Page 69: Lab Manual Answers

LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 69

LAB 11CONFIGURING TCP/IP ADDRESSING AND SECURITY

EXERCISE 11-1: CREATING SUBNETS

Creating Subnets

7. In the Internet Protocol (TCP/IP) Properties dialog box, in the IP Address text box, in the Subnet Mask text box, type 255.255.255.252.

QUESTION Assuming the address space is Class C, how does this subnet mask apportion the remaining available 8 bits between subnet addresses and host addresses?

ANSWER

The subnet mask of 255.255.255.252 on a Class C subnet leaves 6 bits to define the subnet address space, and 2 bits to define the host address space for each subnet.

8. In the IP Address text box, for the first three octets type 192.168.0 and enter the fourth octet according to the following table. (Ensure that you and your partner assign consecutive fourth octets.)

Student Number Fourth Octet

1 52 63 94 105 136 147 178 189 2110 2211 2512 2613 2914 3015 3316 34

Page 70: Lab Manual Answers

70 LAB 11 ANSWERS

QUESTION The subnet mask that you used specifies 2 bits for the host portion of the IP address. After subtracting 2 for reserved addresses, how many possible addresses can 2 bits represent on each subnet?

17 3718 3819 4120 4221 4522 4623 4924 5025 5326 5427 5728 5829 6130 6231 6532 6633 6934 7035 7336 7437 7838 7939 8240 8341 8642 8743 9044 9145 9446 9547 9848 9949 10250 103

Student Number Fourth Octet

Page 71: Lab Manual Answers

LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 71

ANSWER

2 bits can represent 2n, or 22, possible addresses. However, two of these (in binary) are 00 and 11, which are reserved. This leaves 01 and 10 (deci-mal equivalents are 1 and 2) to represent the host addresses in each subnet.

Testing the Subnet

3. In the command prompt window, at the command prompt, type ping 192.168.0.j and then press ENTER.

QUESTION Is the ping successful?

ANSWER

The ping is successful because 192.168.0.j is in the same subnet.

4. Find the IP address of a student who is not your partner, and ping that IP address.

TIP When using the command prompt window, you can press the Up Arrow key to display the previous command, and then press ENTER to exe-cute it, or you can modify the command and then press ENTER to execute the modified version.

QUESTION The host IP address that you specified in the Ping command exists on the classroom network, so why does Ping give a Destination Host Unreachable message?

ANSWER

The destination host is unreachable because it exists in a different sub-net from your subnet.

EXERCISE 11-2: CREATING SUPERNETS

2. In the Local Area Connection Properties dialog box, select Internet Protocol (TCP/IP) and then click Properties.

QUESTION The current subnet mask is 255.255.255.252 or 11111111.11111111.11111111.11111100 in binary. The new subnet mask is going to be 11111111.11111111.11111111.11111000 in binary. What is the value of this mask represented in decimal?

Page 72: Lab Manual Answers

72 LAB 11 ANSWERS

ANSWER

The value of 11111111.11111111.11111111.11111000 in decimal is 255.255.255.248.

Testing the Supernet

1. In the command prompt window, at the command prompt, type ping 192.168.0.j and then press ENTER.

QUESTION Was the ping successful?

ANSWER

The ping was successful because 192.168.0.j is in the same subnet.

EXERCISE 11-3: CONFIGURING FIREWALLS

Configuring Exceptions

Excepting Ping, the ICMP Echo Request2. In the command prompt window, at the command prompt, type ping

10.1.1.yy and then press ENTER.

QUESTION Windows Firewall on your computer and your partner’s computer are both set to allow no exceptions. When you try to ping your partner’s computer, is the ping defeated by the firewall on your computer or on your partner’s computer?

ANSWER

Windows Firewall blocks unsolicited incoming network traffic. It does not affect outgoing traffic, so the failure of the ping must be a result of Win-dows Firewall on your partner’s computer.

Configuring Logging

1. In the Windows Firewall dialog box, on the Advanced tab, in the Security Logging section, click Settings.

QUESTION What is the path of the log file?

ANSWER

The Windows Firewall log file path is C:\Windows\pfirewall.log.

Page 73: Lab Manual Answers

LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 73

LAB REVIEW QUESTIONS

IMPORTANT Questions 1 and 2 refer to the IP address and the subnet mask that you assigned in Exercise 11-1, “Creating Subnets.”

1. What is the binary equivalent of the subnet mask and the IP address that you assigned to your computer?

ANSWER

The subnet mask is 11111111.11111111.11111111.11111100. The first three octets of your IP address are: 11000000.10101000.00000000. The fourth octet varies depending on your student number according to the following table.

Student Number Fourth Octet

1 000001012 000001103 000010014 000010105 000011016 000011107 000100018 000100109 0001010110 0001011011 0001100112 0001101013 0001110114 0001111015 0010000116 0010001017 0010010118 0010011019 0010100120 0010101021 0010110122 0010111023 0011000124 0011001025 00110101

Page 74: Lab Manual Answers

74 LAB 11 ANSWERS

2. Using the AND operator, use your binary IP address and subnet mask to calculate your network address, and then convert it to decimal.

ANSWER

Your network address is 192.168.0.q, where q is determined according to the following table.

26 0011011027 0011100128 0011101029 0011110130 0011111031 0100000132 0100001033 0100010134 0100011035 0100100136 0100101037 0100111038 0100111139 0101001040 0101001141 0101011042 0101011143 0101101044 0101101145 0101111046 0101111147 0110001048 0110001149 0110011050 01100111

Student Number Fourth Octet

1 42 43 84 8

Student Number Fourth Octet

Page 75: Lab Manual Answers

LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 75

5 126 127 168 169 2010 2011 2412 2413 2814 2815 3216 3217 3618 3619 4020 4021 4422 4423 4824 4825 5226 5227 5628 5629 6030 6031 6432 6433 6834 6835 7236 7237 7638 7639 8040 8041 84

Student Number Fourth Octet

Page 76: Lab Manual Answers

76 LAB 11 ANSWERS

3. Your IP address is a subnetted Class C address of 192.168.0.30/28. How many hosts can exist on this subnet, after subtracting two for reserved addresses (all 0s and all 1s)?

ANSWER

Fourteen hosts can exist in each subnet with a 28-bit subnet mask. The formula is 2n – 2, where n is the number of binary digits of host address space (32 – 28 = 4 = n).

4. You have installed Windows Firewall on your home network and want to play a game over the local area network. You have added the game to the exceptions list, but want to further restrict access to the computers that will be involved specifically. How can you do this?

ANSWER

You can define the scope of the exception to include only the IP addresses that you specify. This is done by accessing the Change Scope dialog box (Exceptions tab of Windows Firewall | Edit | Change Scope | Custom List).

5. You run a simple Web server on a workstation running Windows XP behind Windows Firewall. You suspect that it has been under attack and that Windows Firewall has successfully thwarted the attacks. When you look at the Pfirewall log, it has many entries, including suc-cessful connections, and it is hard to sort through all of them. How can you reduce the number of entries in the log but still see if there are dropped packets that might be attempted attacks?

ANSWER

In the Log Settings dialog box (Windows Firewall | Advanced tab | Security Logging | Settings), clear the Log Successful Connections check box, and leave the Log Dropped Packets check box selected.

42 8443 8844 8845 9246 9247 9648 9649 10050 100

Student Number Fourth Octet

Page 77: Lab Manual Answers

LAB 11 ANSWERS: CONFIGURING TCP/IP ADDRESSING AND SECURITY 77

LAB CHALLENGE 11-1: CREATING A SIX-HOST SUBNET

Contoso has been given a Class C address by its ISP for a new satellite division. This division is going to be broken up into smaller subnets that will communicate with each other through routers when necessary. You want each subnet to have six hosts.

To complete this lab challenge:

1. Subnet 192.168.2.0 into subnets that can accommodate six hosts each.

2. Join with six classmates (or however many are available), and config-ure your TCP/IP settings to communicate on this subnet.

3. Use the Ping command to confirm that all hosts on this network can communicate, and ensure that pings to other networks fail.

4. Restrict the file and printer sharing exception in Windows Firewall to include only your subnet.

5. Return your system to the 10.1.1.0/24 network.

IMPORTANT If you do not complete step 5, future labs will not work correctly.

ANSWER

You must discuss with six classmates (or fewer) which subnet in the 192.168.2.0/29 address space you want to exist, and then configure your IP address accordingly. The options are (using the last octet): 9 through 14, 17 through 22, 25 through 30, and so on.

Once you have assigned your IP address, use the subnet mask 255.255.255.248.

Ping hosts within your IP address subnet range, as you did earlier in this lab, to check connectivity. Also ping other classmates configured in a different 192.168.2.0/29 subnet.

To restrict the file and printer sharing in Windows Firewall to the local subnet:

1. In the Windows Firewall dialog box, on the Exceptions tab, select File And Printer Sharing, and then click Edit.

2. In the Edit A Service dialog box, click Change Scope.3. In the Change Scope dialog box, select My Network (Subnet)

Only. Click OK.4. In the Edit A Service dialog box, click OK.5. In the Windows Firewall dialog box, click OK.

Once you have tested your new subnet, be sure to restore the previous TCP/IP settings to the 10.1.1.0/24 network and to disable Windows Firewall.

Page 78: Lab Manual Answers

78 LAB 12 ANSWERS

LAB 12MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY

EXERCISE 12-2: INTERNET SECURITY

Internet Content Zones and Security Settings

2. Select Local Intranet, and then click Default Level. Repeat for Trusted Sites and Restricted Sites.

QUESTION What are the default security levels for each Web content zone?

ANSWER

The default security levels for the Web content zones are as follows:■ Internet: Medium■ Local Intranet: Medium-Low■ Trusted Sites: Low■ Restricted Sites: High

4. In the Security Settings dialog box, scroll until you find the entry Use Pop-Up Blocker.

QUESTION What is the default setting in the Trusted Sites Web content zone for the pop-up blocker?

ANSWER

The default setting for the pop-up blocker in the Trusted Sites Web content zone is Disable.

EXERCISE 12-3: MAINTAINING INTERNET EXPLORER

Setting Cookie Options to Secure Privacy

1. In the Internet Options dialog box, on the Privacy tab, in the Settings section, move the slider to High.

QUESTION What two sets of cookies does this setting block?

ANSWER

The two sets of cookies that are blocked at the High setting are cookies that do not have a compact privacy policy and cookies that use person-ally identifiable information without your explicit consent.

Page 79: Lab Manual Answers

LAB 12 ANSWERS: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 79

2. Click Advanced.

QUESTION Although it is currently inactive, what option do you have concerning session cookies? (Session cookies are cached only while a user is connected to the issuing server and are deleted when the user closes the session.)

ANSWER

You have the option to Always Allow Session Cookies. This can be a conve-nient setting because session cookies are usually used to cache data that you submit so that you do not have to submit it again during that session.

EXERCISE 12-4: USING GROUP POLICY TO CONFIGURE INTERNET EXPLORER

12. Open Internet Explorer.

QUESTION What does the title bar read in Internet Explorer?

ANSWER

The title bar in Internet Explorer reads: “Microsoft Corporation – Microsoft Internet Explorer provided by Contoso”.

LAB REVIEW QUESTIONS

1. What protocol that can be administered by either a DHCP or a DNS server provides a way for clients to receive the address of a proxy server?

ANSWER

The Web Proxy Auto-Discovery (WPAD) protocol allows clients to receive proxy addresses from DNS or DHCP servers.

2. List the four Web content zones in order of the least secure to the most secure.

ANSWER

The four Web content zones in order of the least secure to the most secure are Trusted Sites, Local Intranet, Internet, and Restricted Sites.

Page 80: Lab Manual Answers

80 LAB 12 ANSWERS

3. What is the name of the small files that Web servers can store on your computer to record information, and what are the two types?

ANSWER

Cookies are small files that can be stored by Web servers on clients to store information. The two types of cookies are session and persistent.

4. A user has his computer configured to download certain Web pages while he is online so that they will be available while he is offline. How-ever, when he signs off Internet Explorer and starts it again, the files are not available. What setting on the Advanced tab of the Internet Options dialog box could cause this?

ANSWER

Offline files are stored with other temporary Internet files. The Empty Temporary Internet Files Folder When Browser Is Closed setting will delete these files when Internet Explorer is closed.

5. A user had a hard drive that was too full. She upgraded the hard drive to a larger size, and she says that Internet Explorer is now faster. Why would this be?

ANSWER

Internet Explorer caches Web elements, such as images, so that it can obtain local copies rather than redundantly downloading offline copies when it needs the elements. The user’s hard drive was probably too full to accommodate this cache, so Internet Explorer was slow. Also, full hard drives can cause performance problems for other reasons.

LAB CHALLENGE 12-1: USING INTERNET EXPLORERAS AN FTP CLIENT

Your company has outsourced graphic design to a firm in Kazakhstan. The firm’s designers have completed a round of proofs for a new concept in direct mail mar-keting materials and have placed portable document format (PDF) files of the proofs at the firm’s File Transfer Protocol (FTP) location.

You need to use Internet Explorer as an FTP client to retrieve the proofs.

To complete this lab challenge, do the following:

1. Install the FTP component of Internet Information Services (IIS).

2. Place two text files named Proof1.txt and Proof2.txt in the default FTP folder.

Page 81: Lab Manual Answers

LAB 12 ANSWERS: MANAGING INTERNET EXPLORER CONNECTIONS AND SECURITY 81

3. Log on with your student account, and access the FTP site on your partner’s computer. Retrieve the Proof1 and Proof2 text files from your partner’s FTP site to your desktop.

ANSWER

To install the FTP component of IIS, complete the following steps.

NOTE Before you begin the following steps, load your Microsoft Win-dows XP installation CD into the CD-ROM drive. If the Welcome To Microsoft Windows XP window appears, close it.

1. Ensure that you are logged on with your local Administrator account.

2. From the Start menu, select Control Panel.3. In Control Panel, click Add Or Remove Programs.4. In the Add Or Remove Programs window, click Add/Remove Win-

dows Components.5. In the Windows Components Wizard, in the Components list

box, select Internet Information Services (IIS) (not its check box) and then click Details.

6. In the Internet Information Services (IIS) dialog box, select the File Transfer Protocol (FTP) Service check box. Click OK.

7. In the Windows Components Wizard, click Next.8. The Configuring Components page will appear and indicate

progress.9. On the Completing The Windows Components Wizard page, click

Finish.10. Close the Add Or Remove Programs window.11. Close Control Panel.

To create the Proof1 and Proof2 text files on the FTP site, complete the following steps:

1. From the Start menu, select My Computer.2. Browse to C:\Inetpub\ftproot.3. From the File menu, point to New and then select Text

Document.4. For the name of the text document, type Proof1.txt and then

press ENTER.5. Create a Proof2.txt file in the same way.6. Log off.

To use Internet Explorer as an FTP client to transfer the Proof1 and Proof2 text files, complete the following steps:

1. Log on with your Contoso student account (the password is P@ssw0rd).

2. From the Start menu, select Internet Explorer.

Page 82: Lab Manual Answers

82 LAB 12 ANSWERS

IMPORTANT Wait until you partner has completed the previous step before continuing.

3. In Internet Explorer, in the Address text box, type ftp://computeryy and then press ENTER.

4. In the Ftp://Computeryy page, select Proof1 and Proof2 (hold-ing down the CTRL key to select more than one item), and from the Edit menu, select Copy.

5. Close Internet Explorer.6. On your desktop, right-click an empty space and then click

Paste.

Page 83: Lab Manual Answers

LAB 13 ANSWERS: MANAGING USERS AND GROUPS 83

LAB 13MANAGING USERS AND GROUPS

EXERCISE 13-1: CREATING USERS AND GROUPS

Testing a New Account

17. In the command prompt window, at the command prompt, type whoami.

QUESTION What reply is displayed when you execute the Whoami command?

ANSWER

When you execute the Whoami command, the reply COMPUTERXX\SteveL is displayed.

EXERCISE 13-2: ASSIGNING USER RIGHTS

Assigning User Rights by User

1. Double-click the clock in the notification area.

QUESTION What is conveyed in the message that appears?

ANSWER

The message informs you that you do not have the privilege level required to change the system time.

Understanding User Rights Application

2. From the Start menu, select Shut Down.

QUESTION The Members Of tab in the BobK Properties dialog box states that BobK is a member only of the Bldg1 Users group. We did not assign the Bldg1 Users group to the Shut Down The System right, so why is the Shut Down option available in the drop-down list?

ANSWER

The Shut Down option is available because when you log on to the work-station locally, you become a part of the Interactive Users dynamic group, which is part of the Users group, which allows you to shut down the system.

Page 84: Lab Manual Answers

84 LAB 13 ANSWERS

15. From the Start menu, select Shut Down.

QUESTION What options are available in the Shut Down Windows dialog box?

ANSWER

The only available option in the Shut Down Windows dialog box is Log Off BobK.

EXERCISE 13-3: CONFIGURING ROAMING PROFILES

Testing the Roaming User Profile

5. Double-click Bldg1Profiles, and then double-click SteveL.

QUESTION Why are no files saved in the SteveL folder when we have specified that as the location for profile data for your partner’s SteveL local account?

ANSWER

The profile is cached locally until you log off. Once SteveL logs off from your partner’s computer, the profile will be saved to C:\Bldg1Profiles\SteveL on your computer.

8. In the My Computer window, browse to C:\Bldg1Profiles\SteveL.

QUESTION Are there files in this folder now?

ANSWER

Yes, files appear in C:\Bldg1Profiles\SteveL because the SteveL account was logged off from your partner’s computer, and the cached profile was saved on your computer.

LAB REVIEW QUESTIONS

1. Do you add users to a group by accessing the user’s properties or by accessing the group’s properties?

ANSWER

To add a user to a group, you may either access the user’s or the group’s properties.

Page 85: Lab Manual Answers

LAB 13 ANSWERS: MANAGING USERS AND GROUPS 85

2. Eight users from disparate groups require NTFS permissions to read and write to files in a shared folder located on a file server. The users are from varying groups and have varying permissions and rights. What is the best way to give them access to the folder?

ANSWER

To grant access to the shared resource to the eight users from dispar-ate groups, create a new group, and give the group the Read and Write NTFS permissions for the folder. Then add each of the users to the new group.

3. You add a user to a group that you have created with a specific set of rights for a new project. How can adding the user to this group affect the user’s membership in other groups?

ANSWER

Adding a user to a group cannot subtract the user’s membership from another group. However, it can in effect add the user to another group (or groups) if the group the user is added to is a member of another group (or groups).

4. It is conventional to state that rights are assigned to users or groups. How is this incorrect?

ANSWER

To say that a user or group is assigned a right is incorrect if interpreted literally, because users and groups are actually assigned to rights, not vice versa.

5. You want members of the Contoso domain to be able to access their desktops no matter where they log on from into the domain. What do you need to configure to accomplish this?

ANSWER

You need to configure roaming profiles, which allow you to store users’ documents and settings, including their desktops, on a file share. This allows users to access their desktops (and other items) from any com-puter that can access the file share where the profile is stored.

LAB CHALLENGE 13-1: SCRIPTING WITH THE NET USER AND NET LOCALGROUP COMMANDS

You need to configure workstations at 20 different Contoso branch locations with a predetermined set of groups and members of the groups.

Page 86: Lab Manual Answers

86 LAB 13 ANSWERS

Rather than doing this manually, you have decided to create a batch file using the Net Localgroup command.

To complete this lab challenge, do the following:

1. Create a batch file that:

a. Creates a Management and Staff local users group.

b. Adds Patricia Doyle and Anna Lidman to the Management group, with the usernames PatriciaD and AnnaL, respectively.

c. Adds Jeff Stamler and Dale Sleppy to the Staff group, with the usernames JeffS and DaleS, respectively.

d. Prints to the screen a list of the local groups and group membership.

2. Run the batch file successfully, and log on with one user from each group.

TIP A batch file is a text file that contains commands that are exe-cuted one at a time as if they were being typed directly into a command prompt window. You can create a batch file by saving a text file as name.bat. You can then run the batch file by typing path:name.bat at a command prompt (for example, C:\Example.bat).

Chapter 13 of the textbook covers the use of the Net Localgroup command. You can also get information by typing net localgroup /? at a command prompt or by using the Help And Support Center (search for Net localgroup).

ANSWER

1. Ensure that you are logged on locally with your Administrator account.

2. From the Start menu, point to Accessories, and then select Notepad.

3. In Notepad, type the following:@REM Create the groups

net localgroup Management /add

net localgroup Staff /add

@REM Create and activate the users

net user PatriciaD P@ssw0rd /add /active:yes

net user AnnaL P@ssw0rd /add /active:yes

net user JeffS P@ssw0rd /add /active:yes

net user DaleS P@ssw0rd /add /active:yes

@REM Add the users to the Management group

net localgroup Management PatriciaD AnnaL /add

@REM Add users to the Staff group

net localgroup Staff JeffS DaleS /add

@REM Lists the local groups

net localgroup

4. From the File menu, select Save As.5. In the Save As dialog box, in the File Name text box, type

“c:\addgroups.bat” and then click OK.

Page 87: Lab Manual Answers

LAB 13 ANSWERS: MANAGING USERS AND GROUPS 87

6. Close Notepad.7. Open a command prompt window.8. At the command prompt, type cd c:\ and then press ENTER.9. At the command prompt, type Addgroups.bat and then press

ENTER. The following text is an example from Computer07 of the results.C:\Documents and Settings\Administrator>cd c:\

C:\>addgroups.bat

C:\>net localgroup Management /add

The command completed successfully.

C:\>net localgroup Staff /add

The command completed successfully.

C:\>net user PatriciaD P@ssw0rd /add /active:yes

The command completed successfully.

C:\>net user AnnaL P@ssw0rd /add /active:yes

The command completed successfully.

C:\>net user JeffS P@ssw0rd /add /active:yes

The command completed successfully.

C:\>net user DaleS P@ssw0rd /add /active:yes

The command completed successfully.

C:\>net localgroup Management PatriciaD AnnaL /add

The command completed successfully.

C:\>net localgroup Staff JeffS DaleS /add

The command completed successfully.

C:\>net localgroup

Aliases for \\COMPUTER07

-------------------------------------------------------------

----

*Administrators

*Backup Operators

*Guests

*HelpServicesGroup

*Management

*Network Configuration Operators

*Power Users

*Remote Desktop Users

*Replicator

*Restricted Users

*Staff

*Users

The command completed successfully.

10. Log off and log on as either PatriciaD or AnnaL.11. Log off and log on as either JeffS or DaleS.

Page 88: Lab Manual Answers

88 LAB 14 ANSWERS

LAB 14MANAGING COMPUTER SECURITY CONFIGURATION

EXERCISE 14-2: UNDERSTANDING SECURITY TEMPLATES

Examining Security Templates

8. In the Console1 console, in the console tree, expand Security Templates, C:\Windows\Security\Templates, Compatws, and then select Restricted Groups, as shown in the following figure.

GL14ht02.bmp

QUESTION What built-in group does the Compatws security template contain in the Restricted Groups folder?

ANSWER

The Power Users group is restricted in the Compatws security template, which means that if this security template is applied, members of the Power Users group will be removed from that group, unless they appear in a special list. Double-click Power Users in the details pane to see where this list is configured. Click Cancel when done.

11. In the %SystemDrive%\ Properties dialog box, click Edit Security.

QUESTION From examining the Security For %SystemDrive%\ dialog box, what type of policy does the File System node seem to be responsible for defining in a template?

ANSWER

The File System node defines NTFS permissions (in this case, it contains the default NTFS permissions for the system drive on a Microsoft Win-dows XP system).

Page 89: Lab Manual Answers

LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 89

14. In the console tree, examine the Setup Security template node.

QUESTION In the Setup Security template, who is allowed the user right Take Ownership Of Files Or Other Objects (Hint: User Rights Assignment node)?

ANSWER

The Administrators group.

Examining Security Templates Using Notepad

5. Select the Compatws.inf file, and then click Open.

QUESTION In the previous task, a question about the Power Users being a restricted group in the Compatws security template was asked. What lines of code in the Compatws.inf file are likely responsible for the fact that Power Users are a restricted group in the template?

ANSWER

The lines of code under [Group Membership] are the lines responsible for the fact that in the Compatws template, the Power Users group is a restricted group. The lines read as follows:

%SceInfPowerUsers%__Memberof =

%SceInfPowerUsers%__Members =

QUESTION The Compatws security template has by far more entries for one group of items than any other. What set of items is that?

ANSWER

The Registry or Registry Keys have more entries than any other group of items in the Compatws security template.

EXERCISE 14-4: USING THE SECURITY CONFIGURATION AND ANALYSIS TOOL

Using the Security Configuration And Analysis Toolfor Analysis

11. In the console tree, expand Security Configuration And Analysis, expand Local Policies, and then select Audit Policy.

QUESTION In the details pane, what does the red X flag on the Audit Account Logon Events policy icon denote? (Hint: look at the items in the Database Setting and Computer Setting column.)

Page 90: Lab Manual Answers

90 LAB 14 ANSWERS

ANSWER

It denotes that the policy currently is defined both in the database and the current configuration, but that the value is not the same.

12. In the console tree, select Security Options.

QUESTION In the details pane, what does the green check mark flag on the Accounts: Guest Account Status policy icon denote?

ANSWER

It denotes that the policy currently is defined both in the database and the current configuration and that the value is the same.

13. In the console tree, select System Services.

QUESTION Is there a flag on the Removable Storage service? If so, describe it.

ANSWER

There is no flag marking this service.

19. Navigate to System Services under the Security Configuration And Analysis node.

QUESTION What flag marks the Removable Storage service now?

ANSWER

The red X now marks the Removable Storage service because the policy defined in the database was changed by the Bldg1ws security template so that it is different from your computer’s current configuration.

Using the Security Configuration And Analysis Toolfor Configuration

6. In the console tree, under Security Configuration And Analysis, expand Local Policies, and then select Audit Policy.

QUESTION In the details pane, why is there no longer a red X flag on the Audit Account Logon Events policy icon?

ANSWER

Because the template has been applied, and the setting in the database is no longer different from the setting configured on the computer.

Page 91: Lab Manual Answers

LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 91

EXERCISE 14-5: USING SECEDIT

Using Secedit to Validate a Template File

5. In the command prompt window, at the command prompt, type secedit /validate Example.inf, and then press ENTER.

QUESTION What problem did the Secedit tool report?

ANSWER

Secedit reported that “This will cause an error not expected in section System Access.”

EXERCISE 14-6: CONFIGURING LOGGING

5. In the details pane, double-click Audit Logon Events.

QUESTION By default, does the Audit Logon Events policy log success-ful logons?

ANSWER

No, by default, the Audit Logon Events policy does not log successful logons.

11. In the details pane, locate a Failure Audit with a Category of Account Logon, as shown in the following figure. Double-click the event.

GL14ht06.bmp

QUESTION According to the Event Properties dialog box, what Event ID is assigned to a failed, local logon attempt?

ANSWER

680 is the Event ID for a failed logon attempt.

Page 92: Lab Manual Answers

92 LAB 14 ANSWERS

LAB REVIEW QUESTIONS

1. Currently, users are able to shut down a multiuser workstation without logging on. This means that anybody can shut down the computer, as long as nobody is logged on. You want to configure the workstation so that it cannot be shut down when nobody is logged on. How can you do this? (Hint: see Exercise 14-1.)

ANSWER

To prevent shutdown without logon, access the Local Security Settings and disable the Shutdown: Allow System To Be Shut Down Without Having To Log On security option.

2. In which type of file are security templates stored?

ANSWER

Security templates are stored in text files with the extension .inf.

3. When importing multiple templates into a database, how are conflicts resolved?

ANSWER

The templates are applied cumulatively, and, in the case of direct conflicts, the most recently loaded template’s settings win.

4. What are the four flags that are possible when using the Security Configuration And Analysis snap-in, and what do they denote?

ANSWER

■ X in a red circle The policy is defined in both the database and on the computer, and the values do not match.

■ Green check mark in a white circle The policy is defined in both the database and on the computer, and the policies match.

■ Question mark in a white circle The policy is not in the data-base and therefore was not analyzed, or the user running the analysis did not have sufficient rights to access the policy.

■ Exclamation point in a white circle The policy is defined in the database, but does not exist on the computer.

5. You suspect that a user is logging on and trying to access network resources that require credentials. Which auditing policy will help you to determine if this is so, Audit Account Logon Events or Audit Logon Events?

ANSWER

The Audit Account Logon Events will help determine this. The Audit Logon Events option audits Interactive (local) logons, and the Audit Account Logon Events audits attempts to access network resources that require credentials.

Page 93: Lab Manual Answers

LAB 14 ANSWERS: MANAGING COMPUTER SECURITY CONFIGURATION 93

LAB CHALLENGE 14-1: CREATING A SECURITY TEMPLATE USING NOTEPAD

To better understand the syntax of a security template file, create a security template in Notepad that configures the following (using an existing template as a base):

■ Enforce password history for three passwords remembered

■ Minimum password length of five characters

■ Audit privilege use for failure

■ Allow Force Shutdown For A Remote System for Administrators

■ Allow Add Workstation To Domain for Authenticated Users

Once you have completed the template file, save it as Challenge.inf in the C:\Windows\Security\Templates\Custom folder. Use the Secedit tool to validate the file. Finally, ensure that the settings are as they should be by using the Security Templates console that you created in Exercise 14-1.

ANSWER

The file should look similar to the following:

[Version]

signature="$CHICAGO$"

[System Access]

MinimumPasswordLength = 5

PasswordHistorySize = 3

[Event Audit]

AuditPrivilegeUse = 2

[Privilege Rights]

SeRemoteShutdownPrivilege = Administrators

SeMachineAccountPrivilege = Authenticated Users

Follow the procedure in the section entitled “Using Secedit to Validate a Template File” in Exercise 14-5 to validate the .inf file that you create. Using the Security Templates console, open the Challenge.inf template and investigate the settings in the console tree that the Challenge.inf file is supposed to configure. If the file was written correctly, each of the settings that were to be configured will be reflected as such in the graph-ical user interface (GUI).

Page 94: Lab Manual Answers

94 LAB 15 ANSWERS

LAB 15BACKING UP AND RESTORING SYSTEMS AND DATA

EXERCISE 15-1: USING THE BACKUP UTILITY

Backing Up Data and the System State

6. In the Backup utility, on the Backup tab, in the directory tree, select the My Documents check box and the System State check box, as shown in the following figure.

GL13ht01.bmp

QUESTION When System State is selected (the name and the check box) in the directory tree, why are the check boxes in the detail pane unavailable (grayed out)?

ANSWER

The System State is a collection of six separate items, which must be backed up as a whole; it is not possible to select some components of the System State data to backup, and not others.

8. In the Options dialog box, in the Default Backup Type drop-down list, select Differential.

NOTE You might want to select the other options and read the descrip-tions, if you are unfamiliar with them.

QUESTION Assume this is the third differential backup of these selec-tions that you have made since the last normal backup. To restore this information to the state of this backup, how many of the four backups (the normal and the three differential) will you have to restore?

Page 95: Lab Manual Answers

LAB 15 ANSWERS: BACKING UP AND RESTORING SYSTEMS AND DATA 95

ANSWER

You will have to restore two: the original normal backup and the last differential backup.

QUESTION Given that you have selected Differential backup, what type of backup method will be applied to the System State information?

ANSWER

The System State is always backed up in normal mode, regardless of the setting elsewhere. Therefore, in this case, the My Documents folder will be backed up differentially, and the System State information will be backed up normally.

17. The Backup Progress dialog box will appear and indicate progress. This task can take anywhere from 5 minutes to 15 minutes or more.

QUESTION When the backup is under way, you might notice in the Status text box that the message “Preparing to backup using shadow copy” appears. What is shadow copy, and why is it being used?

ANSWER

A shadow copy is a special copy of a file. This can be useful for several purposes, but in this context, some files cannot be backed up because other processes are using them. By creating a shadow copy that is not being used by other processes, the Backup utility can back up the shadow copy rather than the real copy. When the backup and thus the restore are performed, the shadow copy is treated as if it were the original copy.

EXERCISE 15-2: STARTING THE RECOVERY CONSOLE

7. At the command prompt, type chkdsk /? and then press ENTER.

QUESTION What are the two switches for Chkdsk?

ANSWER

The two switches are /P and /R, which force a check on a drive not flagged as dirty, and attempt to recover readable information on bad sectors, respectively.

Page 96: Lab Manual Answers

96 LAB 15 ANSWERS

LAB REVIEW QUESTIONS

1. What is backed up when you select the System State for backup?

ANSWER

When you select the System State for backup, three separate compo-nents are backed up: Boot Files, COM+ Class Registration Database, and the Registry.

2. What are the five backup types, and how does each relate to the archive attribute? (Hint: The archive attribute is set to denote a file for backup and can be cleared to mark the file as backed up. Given this informa-tion, you can deduce the treatment of the archive attribute for each backup type by reading its description in the Options dialog box in the Backup utility.)

ANSWER

The five types of backups and their relationships to the archive attribute are as follows:

■ Normal: All files are backed up that are selected, regardless of the archive attribute. Once the files are backed up, the archive attribute is cleared.

■ Copy: All files selected are backed up, and the archive attribute is ignored completely.

■ Differential: Selected files with the archive attribute set are backed up, and the archive attribute is not modified after backup.

■ Incremental: Selected files with the archive attribute set are backed up, and the archive attribute of the backed up files is cleared.

■ Daily: All files created or modified during the day are backed up. The archive attribute is not used or modified.

3. There are three options when restoring a backup set as to where the files are to be restored. What are the options, and what do they do?

ANSWER

The three location options for restored files in the Backup utility are Orig-inal Location, Alternate Location, and Single Folder. The first two loca-tions do what their names imply, and they retain the original folder structure. The Single Folder option restores all files in the backup set to the same folder, regardless of their locations in the original directory structure.

Page 97: Lab Manual Answers

LAB 15 ANSWERS: BACKING UP AND RESTORING SYSTEMS AND DATA 97

4. You are about to install third-party drivers for a legacy device that does not have signed drivers. You are suspicious of the drivers. What feature can you use so that you can easily undo the configuration if it fails?

ANSWER

You can use the System Restore feature, by creating a system restore point before you install the drivers. If the configuration fails, you can roll back your system to the system restore point.

LAB CHALLENGE 15-1: SCHEDULING BACKUP JOBS

A multiuser, standalone computer has noncritical user data stored on it. It is not necessary to bother with a comprehensive backup plan for the system, but you do want to back up user documents and settings and the system state once a week on Thursdays at 3 A.M. The computer has a second, largely unused drive, to which you are going to back up the files. You can then burn the backup file to DVD, if you want.

To complete this lab challenge:

1. Create a backup job that creates a backup file named Backup.bkf to the L drive every Thursday at 3 A.M., starting with January 1, 2004.

2. The backup job should not run unless the computer has been idle for more than 10 minutes so that if a user is putting in a late night, he will not be interrupted by a backup job.

3. The backup should be of type Normal so that a full data set is created at each backup session.

ANSWER

To complete this lab challenge, do the following steps:

1. Ensure you are logged on locally with your Administrator account.

2. Open the Backup utility.3. On the Schedule Jobs tab, click the arrows in the appropriate

direction to get to January, 2004.4. In the calendar, click Thursday the 1st so that it is active, and

then click Add Job.5. In the Backup Wizard, on the Welcome page, click Next.6. On the What To Backup page, select Backup Selected Files,

Drives, Or Network Data and then click Next.

Page 98: Lab Manual Answers

98 LAB 15 ANSWERS

7. On the Items To Backup page, in the directory tree, expand My Computer and then select the System State check box.

8. Expand Local Disk C: and then select the Documents And Settings check box. Click Next.

9. On the Backup Type, Destination, And Name page, click Browse.

10. In the Save As dialog box, click My Computer on the left, and then double-click Data (L:).

11. In the File Name text box, type Backup.bkf and then press ENTER.

12. On the Backup Type, Destination, And Name page, click Next.13. On the Type Of Backup page, ensure that in the Select The

Type Of Backup drop-down list Normal is selected and then click Next.

14. On the How To Back Up page, select the Verify Data After Backup check box, and then click Next.

15. On the Backup Options page, click Next to accept the default setting.

16. On the When To Backup page, ensure that Later is selected, and in the Schedule Entry section, in the Job Name text box, type Normal. Click Set Schedule.

17. In the Schedule Job dialog box, on the Schedule tab, in the Schedule Task drop-down list, select Weekly.

18. In the Start Time spin box, select 3:00 AM.19. In the Schedule Task Weekly section, select the Thu check box

and clear the Mon check box.20. On the Settings tab, select the Only Start The Task If The

Computer Has Been Idle For At Least check box. In the spin box, ensure that 10 is selected. Click OK.

21. In the Set Account Information page, in the Run As text box, ensure that COMPUTER07\Administrator is entered. In the Password and Confirm Password text boxes, type P@ssw0rd. Click OK.

22. On the When To Back Up page, click Next.23. On the Set Account Information page, in the Run As text box,

ensure that COMPUTER07\Administrator is entered. In the Password and Confirm Password text boxes, type P@ssw0rd. Click OK.

24. On the Completing The Backup Wizard page, click Finish.25. In the Backup utility, the calendar should be marked with a

backup icon for every Thursday.26. Close the Backup utility.

Page 99: Lab Manual Answers

LAB 16 ANSWERS: MANAGING PERFORMANCE 99

LAB 16MANAGING PERFORMANCE

EXERCISE 16-2: USING THE PERFORMANCE CONSOLE

Viewing Performance Statistics

9. Select the % Disk Write time counter in the counter pane, and then press CTRL + H to highlight the line in the graph representing the selected counter. An example of this is shown in the following figure.

GL16ht04.bmp

QUESTION What two system resources were taxed the most during the backup according to your data?

ANSWER

The % Disk Write Time and the % Processor Time counters indicated that the physical disk and the processor were the most taxed resources during the backup. The memory might have been taxed, depending on your system.

EXERCISE 16-3: CONFIGURING PAGING FILES

20. In My Computer, double-click Local Disk (C:).

QUESTION Is the Pagefile.sys file still present?

Page 100: Lab Manual Answers

100 LAB 16 ANSWERS

ANSWER

The Pagefile.sys file is no longer on drive C because it has been moved to drive L (assuming you had enough room on your drive L to move it there).

QUESTION What is the size of the new Pagefile.sys file?

ANSWER

The size of the file is now static, so it is 1024 MB, or 1 GB (or whatever value you set it to if you did not have 1024 MB available disk space).

LAB REVIEW QUESTIONS

1. Task Manager has graphs that track to resources. What are they?

ANSWER

Task Manager tracks CPU usage and page file usage.

2. The Performance console by default monitors three performance counters. What are they?

ANSWER

By default, the Performance console monitors pages per second, average disk queue length, and processor time.

3. A file server is becoming overloaded late in the afternoon, when the call center employees tend to get a lot of calls. You work the morning shift and are available during this time. How can you instruct the Performance console to gather data for you while you are away?

ANSWER

You can schedule the creation of a counter log, and add any counters that you wish to monitor to the log.

4. In what log does Event Viewer store log entries created by the Perfor-mance console Alert function?

ANSWER

Alert log entries are stored in the Application log in Event Viewer.

Page 101: Lab Manual Answers

LAB 16 ANSWERS: MANAGING PERFORMANCE 101

5. A user is running out of space on drive C. What is the name of the file that acts as memory for the computer you can move to mitigate the problem, and where do you configure its location?

ANSWER

The name of the file is Pagefile.sys. It is moved by accessing the Computer Properties dialog box on the Advanced tab, clicking Settings in the Performance section, selecting the Advanced tab in the Performance Options dialog box, and clicking Change.

LAB CHALLENGE 16-1: CREATING A PERFORMANCE LOG

You have just been given a new computer system to put into your spacious cubicle at Contoso, Ltd. You want to get some idea of its performance, so you are going to create a performance log and complete some strenuous tasks.

To complete this lab, do the following:

1. Create your own counter log named ComputerxxPLog so that it contains the three default counters that Performance monitor tracks, along with the % Disk Time counter of the physical disk object.

2. Start the log, and begin a backup of the System State. Let it run for five minutes.

3. Play 3-D Pinball for 15 minutes. (See what happens when you complete 16 labs? You get to play 15 minutes of Pinball!)

4. Stop the log and view it. Notice the difference in resource use of Backup versus Pinball.

ANSWER

1. Open the Performance console.2. In the Performance console, in the console tree, expand Perfor-

mance Logs And Alerts and then select Counter Logs.3. From the Action menu, select New Log Settings.4. In the New Log Settings dialog box, in the Name text box, type

ComputerxxPLog and then press ENTER.5. In the ComputerxxPLog dialog box, click Add Counters.6. Add the following counters:

❑ % Processor Time (processor object)❑ Pages/Sec (memory object)❑ Avg. Disk Queue Length (physical disk object)❑ % Disk Time (physical disk object)

7. In the Add Counters dialog box, click Close.

Page 102: Lab Manual Answers

102 LAB 16 ANSWERS

8. In the ComputerxxPLog dialog box, on the Schedule tab, select Manually (Using The Shortcut Menu). Click OK.

9. In the ComputerxxPLog message box, click Yes to create the C:\PerfLogs folder.

10. In the Performance console, in the details pane, right-click ComputerxxPLog and then select Start.

11. Minimize the Performance console.12. Start a backup of the system state using the same technique

as in Exercise 16-2, “Using the Performance Console,” to create system activity. Let the backup run for 5 minutes or to com-pletion, whichever comes first.

13. From the Start menu, point to All Programs, Games, and then select Pinball.

14. Play Pinball for 10 to 15 minutes, and then exit.15. Restore the Performance console.16. In the details pane, right-click ComputerxxPLog and then

select Stop.17. In the console tree, select System Monitor.18. Click the View Log Data button in the toolbar (the fourth icon

from the left).19. In the System Monitor Properties dialog box, on the Source

tab, select Log Files and then click Add.20. In the Select Log File dialog box, browse to C:\Perflogs and

then select ComputerxxPLog_000001.blg. Click Open.21. In the System Monitor Properties dialog box, click OK.22. In the Performance console, try to determine where in the

graph you switched from Backup to Pinball. Experiment with viewing the data in different formats using the options in the toolbar.