A company has 50 client computers that run Windows 8.1. Forty client computers are connected to a secure internal network, and 10 client computers are located in public kiosks.
A new company security policy includes the following requirements:
Visitors can access only kiosk computers.
Employees can access and shut down only internal computers.
Only administrators can access all computers remotely.
Only administrators can shut down kiosk computers.
You need to assign security groups to local security policies to meet the requirements.
What should you do? (To answer, drag the appropriate security group or groups to the correct location or locations in the answer area. Security groups may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.)
Select and Place:
Correct Answer:
Explanation/Reference:
Explanation:
http://www.softheap.com/internet/the-guest-account-and-everyone-group.html
The Guest Account and Everyone Group
Evaluate the need for the Guest account. Most administrators agree that it should be disabled, although removing it remove the ability of anonymous users to access a system. In some organizations, the Guest account is very useful. For example, people who don’t normally work with computers might need to occasionally access a system to obtain some information. Factory floor workers might want to look up pension plan information on a kiosk system in the break room. This is a good use for the Guest account. However, consider creating a separate domain for these public services where the Guest account is enabled. Alternatively, use a Web server for this type of system. Note the following: Users who log on as guests can access any shared folder that the Everyone group has access to (i.e., if the Everyone group has Read permissions to the Private folder, guests can access it with Read permissions). You don’t know who Guest users are and there is no accountability because all guests log in to the same account. Always disable the Guest account on networks that are connected to untrusted networks such as the Internet. It provides too many opportunities for break-ins.