MCITP Exam 70-685 "Windows 7 Enterprise Desktop Support Technician" - Chapter 4

Card Set Information

MCITP Exam 70-685 "Windows 7 Enterprise Desktop Support Technician" - Chapter 4
2012-02-09 13:02:02

Show Answers:

  1. Give a definition of "authentication".
    The process of identifying users and validating the credentials.
  2. When you combine two forms of authentication (such as both typing a password and providing a smart card), it's called...
    multifactor authentication.
  3. Where would you find the Credential Manager tool?
    In the Control Panel, under User Accounts
  4. Which auditing type should you enable to audit local logon events?
    Which event log should you examine to find audited events?
    • Audit Logon Events
    • Security
  5. Give a brief, simple description of 802.1x security.
    It's a network authentication that limits what a computer can access on the network until the computer has been authenticated via Group Policy.
  6. What tool can you enable to assist in troubleshooting authentication issues?
    • Auditing
    • **Audit Logon Events (local)
    • **Audit Account Logon Events (domain)
  7. What tool would you use to troubleshoot an untrusted Certificate Authority?
    MMC > Certificates
  8. What tool would you use to determine what policies (ie Group Policy) are being imposed on a computer?
    The Resultant Set of Policy mmc snap-in.
  9. EFS (Encrypting File System) provides encryption for _____, while BitLocker provides encryption for ___.
    EFS (Encrypting File System) provides encryption for individual files and folders, while BitLocker provides encryption for entire system drives.
  10. What versions of Windows 7 support EFS (Encrypting File System)?
    Windows 7 Professional, Enterprise and Ultimate.

    EFS is not support on Windows 7 Starter, Home Basic or Home Premium.
  11. What color is used to signify that a file or folder has been encrypted?
  12. True or False - Files marked with the System attribute can be encrypted.
  13. True or False - Encrypted files and/or folders can be compressed with NTFS compression.
  14. Granting addtional user access can be given to:

    A. EFS-encrypted files
    B. EFS-encrypted files and folders
    C. EFS-encrypted folders
    A. EFS-encrypted files only, and can be done only a single file at a time.
    (this multiple choice question has been scrambled)
  15. Who can act as a Data Recovery Agent (DRA)?
    By default, workgroup computers configure the local Administrator account as the DRA. In domain environments, domain administrators configure one or more user accounts as DRAs for the entire domain.
  16. What tool do you use to assign the Data Recovery Agent role on a computer in a workgroup environment?
    Group Policy
  17. What editions of Windows 7 include BitLocker?
    Windows 7 Enterprise and Ultimate.
  18. BitLocker is used to encrypt....
    entire volumes.
  19. What hardware device does BitLocker use to encrypt a volume?
    TPM (Trusted Platform Module)
  20. What four BitLocker modes are available with a TPM module?
    • TPM Only
    • TPM with external key (on USB thumb drive)
    • TPM with PIN
    • TPM with PIN and external key
  21. If a computer does not have a TPM module, what can be substituted in its' place?
    A USB thumb drive.

    ***This option is not enable by default and must be enabled via Group Policy.
  22. What tool can you use to enable BitLocker on a computer that does not have a TPM module?
    Group Policy to "Allow BitLocker without a compatible TPM"
  23. What is the name of the command-line tool for managing BitLocker?