Download (direct link):
3. C. On most machines, hibernation is the best choice. Performing a normal shutdown takes more time, both to shutdown and to restart, thereby expending more battery power. Regarding choice B, Standby mode is a low-power mode, but Hibernate is a no-power mode, and therefore better for conserving precious battery juice. There's no such thing as ACPI mode (D). By the way, if the plane crew advises you to turn off all electronic devices, you must choose hibernation or a complete shutdown; standby mode is not allowed. Review 'Power Management.'
4. B and C. You want to disable one of the modems, not uninstall it. If you uninstall a modem, then you'd have to reinstall the driver from CD or diskette if you ever needed it later. You couldn't get the device driver from the Internet because your modem is broken! Either go the hardware profile route, or simply use Device Manager. To switch between the two modems on a regular basis, the profile method is the preferable one. Review 'Hardware Profiles.'
5. C. If Plug and Play can't find the right driver, you must log on as an Administrator to install. You run into the same problem if the device driver isn't digitally signed by Microsoft. Review 'Plug and Play and Mobile Computers.'
6. C. IrDA-FIR supports much faster data transfers than IrDA-SIR, although 4Mbps is noticeably slower than a regular Ethernet connection (10Mbps). IrLPT is the protocol for an infrared printer port. IrDA-XIR doesn't exist. IrDA-VFIR isn't listed, but it would be the best choice if it was because of to its higher speed of 16Mbps. Review 'Infrared and Wireless Devices.'
7. B. This method also works often for non-PC Card modems. Installing the COM (serial) port allows Windows XP to autodetect the modem at the next restart. Make sure that the new COM port doesn't conflict with any built-in devices, such as an external COM1 port or an infrared port. Review 'PC Cards.'
8. A. If the option doesn't appear, then your computer doesn't fully support Standby mode. Review 'Power Management.'
Part IV: Configuring and Managing Resource Access
Chapter 10: Managing Local Users and Groups
Chapter 11: Access Permissions
Chapter 12: IntelliMirror and Roaming Access
Chapter 13: Dial-Up Networking and Remote Access
In this part ...
Network designers work hard to make important resources shareable, and then they turn right around and work equally hard to make sure only the right people can gain access to those resources. (It's a bit like fertilizing your lawn and then mowing it.) Part IV deals with providing (and restricting) access to files, printers, and other resources for both local and networked users. Microsoft was clearly very focused on this area when building Windows XP, and the company has extended Windows NT's strengths in several key ways.
The local users and groups model that Chapter 10 explores is very similar to Windows NT's architecture, as is the concept of access permissions at both the share level and the file-and-folder level (Chapter 11). Chapter 12 takes the concept of the roaming user to a higher level with a discussion of IntelliMirror and user profiles, while Chapter 13 focuses on dial-up access and the new Remote Assistance and Remote Desktop features.
Chapter 10: Managing Local Users and Groups
* Configure and troubleshoot local users and groups
* Troubleshoot cache credentials
* Configure, manage, and troubleshoot account settings
* Configure, manage, and troubleshoot user and group rights
* Configure, manage, and troubleshoot auditing
* Configure, manage, and troubleshoot account policy
Microsoft exam-writers' jobs mainly consist of making exams difficult enough that certification continues to mean something. When these anonymous test architects run across a topic as complex and confusing as Windows XP security, you can imagine their cold gray eyes sparkling with malicious glee in the dim half-light of their grim cubicles. You can beat them at their own game, but it's no walk in the park. For example, you may have to read this chapter twice (and Chapter 11 three times).
You can categorize Windows XP security features into pre-logon security (computer accounts), logon security, user and group rights, object permissions (access control), encryption for stored data, encryption for transmitted data, auditing, and policies.
Sometimes you can implement security in these areas with multiple techniques and tools, and sometimes the areas overlap. For example, group membership can determine user rights ('User' versus 'Power User'), domain-level policies, or both.
This chapter takes a user-and-group focus and deals with four of the eight features: logon security, rights, auditing, and a subset of policies called account policies. Chapter 11 targets access control and covers permissions, computer accounts, and group policies. Finally, file system encryption gets its due in Chapter 3, and transmission encryption in Chapter 13.