Thursday, August 9, 2012

Lesson 11—Project 1Key





Establish a remote desktop session with your lab partner’s computer. Attempt to copy a text document from your desktop to the desktop of your partner’s computer.

Was this successful? This should not be successful


Disconnect from your lab partner’s computer. Reconnect to your lab partner’s computer, but first, configure the Remote Desktop options to share your local drives. Attempt to copy a text document from your desktop to your partner’s computer desktop.

Was this successful?

Lesson 11—Exercise 1 Key








List and explain the steps necessary to successfully troubleshoot a problem with Windows 7.

·       List the symptoms
·       Identify the affected area
·       Determine what has changed
·       Look at the most probable cause
·       Implement the solution
·       Test the result of the solution
·       Document the solution


List the steps of the Windows 7 startup process.

·       Power-on self-test
·       Initial startup phase
·       Windows Boot Manager phase
·       Windows Boot Loader phase
·       Kernel loading phase
·       Logon phase

Lesson 10—Project 1Key





Configure the following Account Polices for the Test User1 account you created in the previous exercises. If you did not previously create a user account named Test User1, you will need to do so before completing this, exercise or configure these settings for another user. Ask your instructor to view your screen, showing these settings, when you have completed them.

Password Policies
Set password history to 6
Set minimum password length to 7
Specify that passwords must meet complexity requirements

Account Lockout Policies
Set the account lockout threshold to 4
Set the account lock out duration to 20 minutes
Set reset account lockout timer to 60 minutes


*View each student’s workstation to verify that the settings have been completed correctly.

Lesson 10—Exercise 1Key





List three types of restrictive settings you can configure using Parental Controls.

·       Enforce time limit
·       Restrict access to games by rating, content, or title
·       Allow or block specific applications


List the three basic elements the Windows Firewall can use to make filtering decisions.

·       IP address
·       Protocol number
·       Port number

List the six password policy settings that can be configured in Windows 7.

·       Enforce password history
·       Maximum password age
·       Minimum password age
·       Minimum password length
·       Password must meet complexity requirements
·       Store passwords using reversible encryptions

Lesson 9—Project 1 Key





Using the Local Users and Groups snap-in, create a user called Test User1. Assign the user the password P@ssw0rd. Uncheck the User must change password at next logon box.

Create a local group named TestUsers. Add the Test User1 user account to the TestUsers group.

Using the User Account tab in the Control Panel, change the account type for Test User1 to Standard.

Log in to your student computer using the Test User1 account and attempt to create an additional user.

Could you create the user? Why or why not?

The Test1 User account is a standard user andshould not be able to create a local user account. Creating a user account requires administrative privileges.

Lesson 9—Exercise 1 Key





List the 15 types of built-in local groups in Windows 7.

·       Administrators
·       Backup Operators
·       Cryptographic Operators
·       Distributed COM Users
·       Event Log Readers
·       Guests
·       IIS_IUSRS
·       Network Configuration Operators
·       Performance Log Users
·       Performance Monitor Users
·       Power Users
·       Remote Desktop Users
·       Replicators
·       Users
·       Offer Remote Assistance Helpers



List and explain the three types of user profiles available in Windows 7.

·       Local user profiles: automatically generated profile when the user logs on for the first time. Local profiles are stored on the local computer.
·       Roaming user profile: a copy of the automatically generated local profile that is stored on a network share so that users receive their individual profiles when logging on to any computer.
·       Mandatory user profile:A roaming profile that is read-only, thus preventing users from making any changes to settings.

Lesson 8—Project 1





1.     You and your lab partner are experiencing significant issues with the performance of your lab machines. Work together to troubleshoot your student computers by completing the following tasks.

Open the Event view and access your lab partner’s Event Viewer.  Click through the available tabs to familiarize yourself with the types of events that are listed in each log.

What logs did you view?

Answers will vary but should include System, Application, and Security.

On your student computer, access the Window Experience Index and record your student computer’s Windows Experience Index base score. Compare your index to your lab partner’s index. Explain what is meant by your index.

The Windows Index will be a value between 1 and 5.9. It provides a rating for how well your computer hardware and software are performing. The base score will reflect the lowest subscore of the components monitored.

You computer’s performance is suffering, and you suspect the cause is inadequate RAM. Using Performance Monitor on your student computer, add the Memory Counter and gather statistics for one minute. What can you tell from the data collected?

Memory utilization as well as other memory counter statistics should be low on the student computers.

To further investigate memory utilization, open the Windows Task Manager on your student computer and record the system’s current memory utilization.

Answers will vary depending on the amount of memory installed and the functions performed by the computer at the time.