Errata
The errata list is a list of errors and their corrections that were found after the product was released.
The following errata were submitted by our customers and have not yet been approved or disproved by the author or editor. They solely represent the opinion of the customer.
Color Key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version | Location | Description | Submitted by | Date submitted |
---|---|---|---|---|
Page Introduction United States |
In the Introduction it states "For your reference, a mapping of the topics in this book to the exam objectives is included in the back of the book in the Objectives Map." |
Charles Cline | Oct 09, 2013 | |
Printed | Page pg 494 Note section |
The note says that "Without access-based enumeration, users can't see files and folders they can't open." |
Brent Harvey | Dec 18, 2013 |
Printed | Page 6 First paragraph under Adding Drivers and Updates to Images |
Missing the word "one" in the sentence: |
Brent Harvey | Nov 20, 2013 |
Page 34 |
On the last line: |
Anonymous | Sep 26, 2013 | |
Printed | Page 91 After second paragraph. Command Line code |
The command line function is using SetPSPN which doesn't exist. It should be SetSPN |
Brent Harvey | Nov 25, 2013 |
Printed | Page 193 Paragraph after the bullets |
PowerShell commands are incorrect. The two commands in the last paragraph should be New-ADDCCloneConfigFile, instead of New-ADDCCloneConfig, and Get-ADDCCloningExcludedApplicationList, instead of Get-ADDCCloningExcludedApplicationsList. |
Brent Harvey | Nov 26, 2013 |
Printed | Page 210 1st paragraph |
Under "Non-Authoritative Restore" section: |
Anonymous | Feb 24, 2014 |
Printed | Page 234 answer of question 3 |
answer to question 3 A and D should be only A ? |
Piet Bruins | Nov 11, 2013 |
Printed | Page 256 First bullet at top of page |
First bullet mentions the "Override" setting. I think it should be the "Enforced" setting, keeping the nomenclature the same as in the book and by Microsoft. |
Brent Harvey | Dec 01, 2013 |
Printed | Page 264 Exercise 3, Step 3 |
Book currently tells reader to: "[...] expand the Computer Configuration\Administrative Templates\System Group Policy node [..]" |
Alan Isherwood | Dec 07, 2013 |
Printed | Page 465 and 479 Question 2 |
On pg. 465, Question 2 answer D is "ISATAP must be added to the DNS global query block list on all DNS servers". |
Brent Harvey | Dec 18, 2013 |
Printed | Page 479 Question 3, answer C |
The description text for why question 3, answer C is wrong is just a duplicate of the text in question 3, answer D. |
Alan Isherwood | Jan 12, 2014 |
Printed | Page 563 Question 5 |
The answers to question 5 are A. "BitLocker To Go" and B. "BitLocker Network Unlock". I believe it should just be "BitLocker Network Unlock" since "BitLocker To Go" does not solve the requirement to bypass a PIN/password. |
Brent Harvey | Dec 19, 2013 |
Printed | Page 592 Questions 2 and 4 |
Answer A for questions 2 and 4 should be "/set" and not "/get". Since they are the answers and you cannot enable policies with the /get switch. |
Brent Harvey | Dec 19, 2013 |
Printed | Page 636 Subsection under "DFS (Distributed File System)" |
Under the "DFS (Distributed File System)" heading, "installation" is misspelled. |
Brent Harvey | Jan 06, 2014 |