1.WHAT IS THE DIFFERENCE BETWEEN SWITCH AND HUB?
ANS: Switch: It operates at layer2 datalink layer,Address learning,forward/Filter decision using MAC address,Loop avoidance,breaks up collision domains,it creates seperate collision domains but a single broadcast domain.
Hub: It operates at layer1 physical layer,no filtering,no addressing,it creates a single collision domain and single broadcast domain,it forwards the data to all the ports for which it is also known as "multiport repeater".
2.WHAT IS THE UTILITY OF THE "PING" COMMAND?
ANS: PING stands for PACKET INTERNET GOPHER,it is a utility that verifies the connection to one or more remote hosts.It uses the ICMP echo request and echo reply packets to determine whether a particular ip system on the network is functional.It is useful fo diagnosing ip network or router failures.
3.WHAT IS A VLAN?WHAT DOES VLAN PROVIDE?
ANS: VLAN stands for VIRTUAL LOCAL AREA NETWORK.It is a logical grouping or segmenting a network connected to administratively defined ports on a switch,they provide broadcast control,security and flexibility.
4.WHAT IS SUBNETTING?WHY IS IT USED?
ANS: Used in ip networks to break up larger networks
Sunday, August 1, 2010
MCSE related INTERVIEW QUESTIONS..PART1
- What is a Smart Host? Where would you configure it?
- What are Routing Groups? When would you use them?
- What are the types of Connectors you can use in Exchange?
- What is the cost option in Exchange connectors?
- What is the Link State Table? How would you view it?
- How would you configure mail transfer security between 2 routing groups?
- What is the Routing Group Master? Who holds that role?
- Explain the configuration steps required to allow Exchange 2003 to send and receive email from the Internet (consider a one-site multiple server scenario).
- What is DS2MB?
- What is Forms Based Authentication?
- How would you configure OWA's settings on an Exchange server?
- What is DSACCESS?
- What are Recipient Policies?
- How would you work with multiple recipient policies?
- What is the "issue" with trying to remove email addresses added by recipient policies? How would you fix that?
- What is the RUS?
- When would you need to manually create additional RUS?
- What are Address Lists?
- How would you modify the filter properties of one of the default address lists?
- How can you create multiple GALs and allow the users to only see the one related to them?
- What is a Front End server? In what scenarios would you use one?
- What type of authentication is used on the front end servers?
- When would you use NLB?
- How would you achieve incoming mail redundancy?
- What are the 4 types of Exchange backups?
- What is the Dial-Tone server scenario?
- When would you use offline backup?
- How do you re-install Exchange on a server that has crashed but with AD intact?
- What is the dumpster?
- What are the e00xxxxx.log files?
- What is the e00.chk file?
- What is circular logging? When would you use it?
- What's the difference between online and offline defrag?
- How would you know if it is time to perform an offline defrag of your Exchange stores?
- How would you plan for, and perform the offline defrag?
- What is the eseutil command?
- What is the isinteg command?
- How would you monitor Exchange's services and performance? Name 2 or 3 options.
- Name all the client connection options in Exchange 2003.
- What is Direct Push? What are the requirements to run it?
- How would you remote wipe a PPC?
- What are the issues with connecting Outlook from a remote computer to your mailbox?
- How would you solve those issues? Name 2 or 3 methods
- What is RPC over HTTP? What are the requirements to run it?
- What is Cached Mode in OL2003/2007?
- What are the benefits and "issues" when using cached mode? How would you tackle those issues?
- What is S/MIME? What are the usage scenarios for S/MIME?
- What are the IPSec usage scenarios for Exchange 2003?
- How do you enable SSL on OWA?
- What are the considerations for obtaining a digital certificate for SSL on Exchange?
- Name a few 3rd-party CAs.
- What do you need to consider when using a client-type AV software on an Exchange server?
- What are the different clustering options in Exchange 2003? Which one would you choose and why.
MCSE related INTERVIEW QUESTIONS..PART2
- Tell me a bit about the capabilities of Exchange Server.
- What are the different Exchange 2003 versions?
- Name some of the main differences between Exchange 5.5 and Exchange 2000/2003?
- What are the major network infrastructure requirements for installing Exchange 2003?
- What is the latest Exchange 2003 Service Pack? Name a few changes in functionality in that SP.
- What are the disk considerations when installing Exchange (RAID types, locations and so on).
- You got a new HP DL380 (2U) server, dual Xeon, 4GB of RAM, 7 SAS disks, 64-bit. What do you do next to install Exchange 2003? (considering you already have AD in place)
- Why shouldn't you install Exchange on the same machine as a DC?
- Why shouldn't you install Outlook on the same machine as an Exchange server?
- Are there any other installation considerations?
- How would you prepare the AD Schema in advance before installing Exchange?
- What type or permissions do you need in order to install the first Exchange server in a forest? In a domain?
- How would you verify that the schema was in fact updated?
- What type of memory optimization changes could you do for Exchange 2003?
- How would you check your Exchange configuration settings to see if they're right?
- What are the Exchange management tools? How and where can you install them?
- What types of permissions are configurable for Exchange?
- How can you grant access for an administrator to access all mailboxes on a specific server?
- What is the Send As permission?
- What other management tools are used to manage and control Exchange 2003? Name the tools you'd use.
- What are Exchange Recipient types? Name 5.
- You created a mailbox for a user, yet the mailbox does not appear in ESM. Why?
- You wanted to change mailbox access permissions for a mailbox, yet you see the SELF permission alone on the permissions list. Why?
- What are Query Based Distribution groups?
- What type of groups would you use when configuring distribution groups in a multiple domain forest?
- Name a few configuration options for Exchange recipients.
- What's the difference between Exchange 2003 Std. and Ent. editions when related to storage options and size?
- Name a few configuration options related to mailbox stores.
- What are System Public Folders? Where would you find them?
- How would you plan and configure Public Folder redundancy?
- How can you immediately stop PF replication?
- How can you prevent PF referral across slow WAN links?
- What types of PF management tools might you use?
- What are the differences between administrative permissions and client permissions in PF?
- How can you configure PF replication from the command prompt in Exchange 2003?
- What are the message hygiene options you can use natively in Exchange 2003?
- What are the configuration options in IMF?
- What are virtual servers? When would you use more than one?
- Name some of the SMTP Virtual Server configuration options.
- What is a Mail Relay? Name a few known mail relay software or hardware options
MCSE related INTERVIEW QUESTIONS..PART3
- Trying to look at the Schema, how can I do that?
- What are the Support Tools? Why do I need them?
- What is LDP? What is REPLMON? What is ADSIEDIT? What is NETDOM? What is REPADMIN?
- What are sites? What are they used for?
- What's the difference between a site link's schedule and interval?
- What is the KCC?
- What is the ISTG? Who has that role by default?
- What are the requirements for installing AD on a new server?
- What can you do to promote a server to DC if you're in a remote location with slow WAN link?
- How can you forcibly remove AD from a server, and what do you do later? • Can I get user passwords from the AD database?
- What tool would I use to try to grab security related packets from the wire?
- Name some OU design considerations.
- What is tombstone lifetime attribute?
- What do you do to install a new Windows 2003 DC in a Windows 2000 AD?
- What do you do to install a new Windows 2003 R2 DC in a Windows 2003 AD?
- How would you find all users that have not logged on since last month?
- What are the DS* commands?
- What's the difference between LDIFDE and CSVDE? Usage considerations?
- What are the FSMO roles? Who has them by default? What happens when each one fails?
- What FSMO placement considerations do you know of?
- I want to look at the RID allocation table for a DC. What do I do?
- What's the difference between transferring a FSMO role and seizing one? Which one should you NOT seize? Why?
- How do you configure a "stand-by operation master" for any of the roles?
- How do you backup AD?
- How do you restore AD?
- How do you change the DS Restore admin password?
- Why can't you restore a DC that was backed up 4 months ago?
- What are GPOs?
- What is the order in which GPOs are applied?
- Name a few benefits of using GPMC.
- What are the GPC and the GPT? Where can I find them?
- What are GPO links? What special things can I do to them?
- What can I do to prevent inheritance from above?
- How can I override blocking of inheritance?
- How can you determine what GPO was and was not applied for a user? Name a few ways to do that.
- A user claims he did not receive a GPO, yet his user and computer accounts are in the right OU, and everyone else there gets the GPO. What will you look for?
- Name a few differences in Vista GPOs
- Name some GPO settings in the computer and user parts.
- What are administrative templates?
- What's the difference between software publishing and assigning?
- Can I deploy non-MSI software with GPO?
- You want to standardize the desktop environments (wallpaper, My Documents, Start menu, printers etc.) on the computers in one department. How would you do that?
MCSE related INTERVIEW QUESTIONS..PART4
- How do I work with the Host name cache on a client computer?
- How do I clear the DNS cache on the DNS server?
- What is the 224.0.1.24 address used for?
- What is WINS and when do we use it?
- Can you have a Microsoft-based network without any WINS server on it? What are the "considerations" regarding not using WINS?
- Describe the differences between WINS push and pull replications.
- What is the difference between tombstoning a WINS record and simply deleting it?
- Name the NetBIOS names you might expect from a Windows 2003 DC that is registered in WINS.
- Describe the role of the routing table on a host and on a router.
- What are routing protocols? Why do we need them? Name a few.
- What are router interfaces? What types can they be?
- In Windows 2003 routing, what are the interface filters?
- What is NAT?
- What is the real difference between NAT and PAT?
- How do you configure NAT on Windows 2003?
- How do you allow inbound traffic for specific hosts on Windows 2003 NAT?
- What is VPN? What types of VPN does Windows 2000 and beyond work with natively?
- What is IAS? In what scenarios do we use it?
- What's the difference between Mixed mode and Native mode in AD when dealing with RRAS?
- What is the "RAS and IAS" group in AD?
- What are Conditions and Profile in RRAS Policies?
- What types or authentication can a Windows 2003 based RRAS work with?
- How does SSL work?
- How does IPSec work?
- How do I deploy IPSec for a large number of computers?
- What types of authentication can IPSec use?
- What is PFS (Perfect Forward Secrecy) in IPSec?
- How do I monitor IPSec?
- Looking at IPSec-encrypted traffic with a sniffer. What packet types do I see?
- What can you do with NETSH?
- How do I look at the open ports on my machine?
- What is Active Directory?
- What is LDAP?
- Can you connect Active Directory to other 3rd-party Directory Services? Name a few options.
- Where is the AD database held? What other folders are related to AD?
- What is the SYSVOL folder?
- Name the AD NCs and replication issues for each NC
- What are application partitions? When do I use them
- How do you create a new application partition
- How do you view replication properties for AD partitions and DCs?
- What is the Global Catalog?
- How do you view all the GCs in the forest?
- Why not make all DCs in a large forest as GCs?
MCSE related INTERVIEW QUESTIONS..PART5
- What is an IP address?
- What is a subnet mask?
- What is ARP?
- What is ARP Cache Poisoning?
- What is the ANDing process?
- What is a default gateway? What happens if I don't have one?
- Can a workstation computer be configured to browse the Internet and yet NOT have a default gateway?
- What is a subnet?
- What is APIPA?
- What is an RFC? Name a few if possible (not necessarily the numbers, just the ideas behind them)
- What is RFC 1918?
- What is CIDR?
- You have the following Network ID: 192.115.103.64/27. What is the IP range for your network?
- You have the following Network ID: 131.112.0.0. You need at least 500 hosts per network. How many networks can you create? What subnet mask will you use?
- You need to view at network traffic. What will you use? Name a few tools
- How do I know the path that a packet takes to the destination?
- What does the ping 192.168.0.1 -l 1000 -n 100 command do?
- What is DHCP? What are the benefits and drawbacks of using it?
- Describe the steps taken by the client and DHCP server in order to obtain an IP address.
- What is the DHCPNACK and when do I get one? Name 2 scenarios.
- What ports are used by DHCP and the DHCP clients?
- Describe the process of installing a DHCP server in an AD infrastructure.
- What is DHCPINFORM?
- Describe the integration between DHCP and DNS.
- What options in DHCP do you regularly use for an MS network?
- What are User Classes and Vendor Classes in DHCP?
- How do I configure a client machine to use a specific User Class?
- What is the BOOTP protocol used for, where might you find it in Windows network infrastructure?
- DNS zones – describe the differences between the 4 types.
- DNS record types – describe the most important ones.
- Describe the process of working with an external domain name
- Describe the importance of DNS to AD.
- Describe a few methods of finding an MX record for a remote domain on the Internet.
- What does "Disable Recursion" in DNS mean?
- What could cause the Forwarders and Root Hints to be grayed out?
- What is a "Single Label domain name" and what sort of issues can it cause?
- What is the "in-addr.arpa" zone used for?
- What are the requirements from DNS to support AD?
- How do you manually create SRV records in DNS?
- Name 3 benefits of using AD-integrated zones.
- What are the benefits of using Windows 2003 DNS when using AD-integrated zones?
- You installed a new AD domain and the new (and first) DC has not registered its SRV records in DNS. Name a few possible causes.
- What are the benefits and scenarios of using Stub zones?
- What are the benefits and scenarios of using Conditional Forwarding?
- What are the differences between Windows Clustering, Network Load Balancing and Round Robin, and scenarios for each use?
NETWORKING TERMS..
NETWORK:-The term "network" describes two or more connected computers that can share resources such as data, a printer, an Internet connection, applications, or a combination of these.A network is a simple connection between two or more computers irrespective of their geographical location which can communicate through different communication mediums including cables or wireless or microwave and satellite technology.
"UNDER CONSTRUCTION"..sorry 4 the inconvinience caused
.........SANDIP KUMAR DAS
"UNDER CONSTRUCTION"..sorry 4 the inconvinience caused
.........SANDIP KUMAR DAS
Saturday, July 31, 2010
070-270...MCSE SAMPLE PAPER
QUESTION 1
You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer. You need to ensure that the user can use the phone with his computer. What should you do?
A. Place the phone in Bluetooth discovery mode.
B. Place the user’s computer in Bluetooth discovery mode.
C. Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
D. Install mobile phone synchronization software on the user’s computer.
Answer: B
QUESTION 2
You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?
A. Use the Msiexec.exe program to perform a quiet installation of the application.
B. Use the Msiexec.exe program to perform a passive installation of the application.
C. Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application.
D. Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.
Answer: B
QUESTION 3
You are a desktop administrator for your company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?
A. Manually perform a passive installation of the application.
B. Manually perform a quiet installation of the application.
C. Use a logon script to run the Msiexec.exe program.
D. Use the Runas utility to run the Msiexec.exe program.
Answer: B
QUESTION 4
You are the network administrator for one of your company's branch offices. Ten employees work in the branch office. All client computers in the branch office run Windows XP Professional. All client computers have manually configured IP addresses in the 192. 168. 1. 0/24 range. The branch office has a cable modem connection to the Internet. All employees in the branch office need access to the main office by means of a virtual private network (VPN) connection over the Internet. Employees in the branch office report that they cannot access resources that are located on the main office network. You investigate and discover that you can establish a VPN connection locally on a client computer named Pro1 and can access main office network resources. However, you cannot connect to Pro1 from other computers on the branch office network. You want all employees in the branch office to be able to access main office network resources by means of the VPN connection on Pro1. What should you do?
A. Disable Windows Firewall on the main office VPN connection.
B. Add a port exception to Windows Firewall to allow incoming PPTP traffic on the main office VPN connection.
C. Select the Allow other network users to control or disable the shared Internet connection check box.
D. Configure all client computers in the branch office to obtain IP addresses automatically.
Answer: D
QUESTION 5
You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser.
When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?
A. Run the IPconfig /renew command.
B. Stop and then restart the World Wide Web Publishing service.
C. Ensure that the Everyone group has Allow - Full Control permission on the Inetpub folder.
D. In the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.
Answer: D
QUESTION 6
You are the administrator of a Windows XP Professional computer named Pro1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Windows Firewall on Pro1. You run an application named App1 on Pro1. App1 communicates with an online training company on the Internet. To display an online seminar, the training company needs to contact the App1 application at port 5800. You want to ensure that the training company can connect to the App1 application. What should you do?
A. Configure Windows Firewall to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application that opens port 5800.
B. Create a new service exception named App1. Use port 5800 as both the external and internal port number.
C. Edit the %systemroot%\System32\Drivers\Etc\Services file on Pro1 to include a service definition named App1 for port
D. Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800.
Answer: B
QUESTION 7
You are the desktop administrator for your company. The company's network contains a RIS server, a DHCP server, and a DNS server.
You need to install Windows XP Professional on a computer that does not have a CD-ROM drive. The computer has the following configuration:
·a Pentium III 1-GHz processor
·a 5-GB hard disk
·128 MB of RAM
·a modem in the first PCI slot
·an Ethernet card in the last ISA slot
You attempt to install Windows XP Professional on the computer by using a RIS bootable floppy disk. However, you are unable to connect to the RIS server.
What should you do?
A. Move the Ethernet card to the first ISA slot.
B. Remove the Ethernet card and replace it with an Ethernet card that is PXE compliant.
C. Share the RIS image on the RIS server. Create a network bootable floppy disk. Insert the floppy disk, and install Windows XP Professional from the share.
D. Place the NDIS network drivers in the root directory of the RIS bootable floppy disk. Use the floppy disk to connect to the RIS server.
Answer: B
QUESTION 8
You are the desktop administrator for your company. You successfully perform a clean installation of Windows XP Professional on drive C of a computer that is used by an employee named Susan. Susan is a software developer. She wants her computer to have a dual-boot configuration so that she can use either Windows XP Professional or Windows 2000 Professional. She installs Windows 2000 Professional on drive G. After installing Windows 2000 Professional, Susan restarts her computer and chooses to start Windows XP Professional. When Windows XP Professional starts, Susan sees the following error message, which is also shown in the exhibit. "Windows 2000 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM"
However, Susan restarts her computer and is able to successfully start Windows 2000 Professional. You want Susan's dual-boot configuration to function properly. You start Susan's computer and choose to start Windows 2000 Professional. What should you do next?
A. Copy the NTLDR file and the Ntdetect.com file from the i386 folder on the Windows XP Professional CD-ROM to the root directory of drive C.
B. Copy the NTLDR file and the Ntdetect.com file from the i386 folder on the Windows XP Professional CD-ROM to the root directory of drive G.
C. Restore the C:\Windows\System32\Config\System file from a recent backup.
D. Restore the G:\Windows\System32\Config\System file from a recent backup.
Answer: A
QUESTION 9
You are the desktop administrator for your company's sales department. Katrin is a user in the sales department. You need to upgrade Katrin's Windows 2000 Professional computer to Windows XP Professional. Philippe is the network administrator. He previously downloaded updated Setup files and placed them on a server named Server1, in a shared folder named Updates. Philippe has successfully installed computers by using these updated Setup files. You want to ensure that these updated Setup files are automatically installed on Katrin's computer during the upgrade. Which command should you run to start Setup?
A. Winnt32.exe /dushare:\\server1\updates
B. Winnt32.exe /copydir:\\server1\updates
C. Winnt32.exe /duprepare:\\server1\updates D. Winnt32.exe /copysource:\\server1\updates
Answer: A
QUESTION 10
You are the desktop administrator for your company's sales department. You need to perform a clean installation of Windows XP Professional on a computer that currently runs Windows 98. You start the installation. The text-based portion of Setup finishes successfully. Before the GUI-based portion of Setup starts, the computer stops responding. You investigate and discover that there is a problem with a device driver. You want to know which device is causing the problem. What should you do?
A. Modify the Boot.ini file to include the /fastdetect switch.
B. Modify the Boot.ini file to include the /sos switch.
C. Restart Setup by using the /dudisable switch.
D. Restart Setup by using the /dushare switch.
E. Restart the computer. From the Recovery console, read the Dr. Watson log.
F. Restart the computer. From the Recovery console, read the Comsetup.log file.
Answer: B
QUESTION 11
You are the desktop administrator for your company's sales department. The company's network contains a RIS server. You need to install Windows XP Professional on a computer that has a SCSI disk subsystem. You start the computer by using the Windows XP Professional CD-ROM, and you begin the installation. However, Setup reports that it cannot find any disks on which to install Windows XP Professional. You start the computer by using a RIS bootable floppy disk, and you receive the same result. What should you do?
A. Add an answer file to the root directory of the RIS bootable floppy disk. Start the computer by using the RIS bootable floppy disk, and run Setup by using RIS.
B. Add the SCSI-controller driver to the root directory of the RIS bootable floppy disk. Start the computer by using the RIS bootable floppy disk, and run Setup by using RIS.
C. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide an answer file on a floppy disk.
D. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide a SCSI-controller driver on a floppy disk.
E. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide the appropriate HAL on a floppy disk.
Answer: D
QUESTION 12
You are the desktop administrator for your company. You are responsible for automating the deployment of Windows XP Professional to new computers in your company. You are preparing a Windows XP Professional computer, which you will use to test disk imaging. You install Windows XP Professional on the test computer and run the Sysprep utility. You use a third-party software package to create a disk image. You apply the disk image to a new computer and then restart the computer. Instead of completing the Windows XP Professional installation, the computer starts the Windows Welcome program, requiring you to enter additional setup information. Because you will be deploying a large number of computers, you want to ensure that the disk image can be applied without additional user interaction. What should you do?
A. Use a network-based RIS server to apply the disk image to new computers.
B. On the test computer, run the Sysprep -factory command. Re-create the disk image by using the third-party software.
C. Use Setup Manager to create a Sysprep answer file. Copy the answer file to a floppy disk, and insert the disk into new computers
D. Create an Unattend.txt answer file. Copy the file to the C:\Winnt\System32 folder on the test computer. Run the Sysprep the third-party software.
Answer: C
QUESTION 13
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network.You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?
A. Ask a domain administrator to authorize the RIS server.
B. Grant the Everyone group Allow - Read NTFS permission on the RIS image.
C. Install RIS on the domain controller. Copy the RIS image to the domain controller.
D. Add a reservation for the RIS server to the DHCP server.
Answer: A
QUESTION 14
You are the desktop administrator for your company. You need to deploy Windows XP Professional to 50 new computers. You want to use a fully automated installation process. Each new computer is configured with a 20-GB hard disk, a CD-ROM drive, and a floppy disk drive. The computers do not contain network adapter cards.
You specify the company's standard installation settings and save them in an answer file. You want to use the Sysprep utility to prepare the source computer for the deployment. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Place the answer file in C:\Windows\System.
B. Place the answer file in C:\Windows\System32.
C. Place the answer file in C:\Sysprep.
D. Place Sysprep.exe and Setupcl.exe in C:\Windows\System.
E. Place Sysprep.exe and Setupcl.exe in C:\Windows\System32.
F. Place Sysprep.exe and Setupcl.exe in C:\Sysprep.
Answer: CF
QUESTION 15
You are a help desk technician for your company, which is in the process of deploying Windows XP Professional to all client computers. You upgrade Pierre’s Windows 98 portable computer to Windows XP Professional. After the upgrade, Pierre reports that some of his older software applications no longer work properly. Also, one of the hardware devices on his computer is not currently supported by Windows XP Professional. Pierre requests that you reinstall Windows 98 and all of his applications so that he can use his computer normally. You need to restore Pierre’s computer to its pre-upgraded state while retaining all of the applications, documents, and personal data on the computer. You want to accomplish this task in the minimum amount of time. What should you do?
A. Copy Pierre's documents and personal data to a shared folder on the network. Reinstall Windows 98 and Pierre's applications. data to the My Documents folder on Pierre's computer.
B. On Pierre's computer, run Setup.exe from a Windows 98 installation CD.
C. On Pierre's computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional installation item.
D. On Pierre's computer, use a third party disk imaging software utility to apply a disk image that contains Windows 98
Answer: C
QUESTION 16
You are the desktop administrator for your company. You need to upgrade a Windows 98 computer to Windows XP Professional. Windows 98 is installed in a folder named C:\Win98. You need to ensure that the computer's applications and settings are retained after the upgrade. You insert the Windows XP Professional CD-ROM into the computer and restart the computer. The text-based portion of Setup appears. The text on the screen states that Windows XP Professional will be installed in a folder named C:\Windows, not in the C:\Win98 folder. You need to ensure that Windows XP Professional upgrades the existing Windows 98 installation. What should you do?
A. Rename the C:\Win98 folder to C:\Windows.
B. Modify the installation settings in the text-based portion of Setup so that Windows XP Professional is installed in the C:\
C. Restart the computer by using Windows 98. Then insert the Windows XP Professional CD-ROM into the computer
D. Use the Windows XP Professional CD-ROM to create a set of Setup floppy disks. Restart the computer by using the first
Answer: C
QUESTION 17
You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's computer currently runs Microsoft Windows NT Workstation 4. 0. Susan uses a legacy application that is compatible with only Windows NT Workstation. You want to install Windows XP Professional on Susan's computer. You plan to set up a dual-boot configuration so that Susan can run either Windows XP Professional or Windows NT Workstation. Susan's computer has two hard disks, named drive C and drive G. You install Windows XP Professional on drive G. After Windows XP Professional is installed, Susan reports that Windows NT Workstation is no longer available. You need to ensure that both operating systems are available on Susan's computer. What should you do?
A. Insert the Windows XP Professional CD-ROM into the computer. Run the Sfc.exe /scannow command. B. Insert the Windows XP Professional CD-ROM into the computer. Run the Winnt32. exe /cmdcons command.
C. Start the computer by using an MS-DOS bootable floppy disk. Run the Attrib.exe -r -h -s c:\bootsect.dos command.
D. Start the computer by using the Windows XP Professional CD-ROM. From the Recovery console, run the Bootcfg /rebuild command.
Answer: D
QUESTION 18
You are a help desk technician for your company. All employees use Windows XP Professional computers.A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s
supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. As Administrator, take ownership of the files and folders.
B. As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.
C. Grant Philippe Allow - Modify permission on the files and folders.
D. Grant Philippe Allow - Full Control permission on the files and folders.
E. Grant Philippe Allow - Take Ownership permission on the files and folders.
Answer: AC
QUESTION 19
You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's Windows XP Professional computer has a single hard disk, which is formatted as NTFS. Susan's computer contains a folder named C:\Files1. The C:\Files1 folder is shared as Files1. Users in the sales department have permissions to create files in the Files1 shared folder. Company policy allows interns to read files, but prohibits interns from creating files in the Files1 shared folder. Company policy allows members of the Sales group and the Marketing group to create files in the Files1 shared folder. Carlos is an intern. He is a member of the Interns group, the Sales group, and the Marketing group. Susan reports that Carlos is able to create files in the Files1 shared folder. You inspect Susan's computer to evaluate the Files1 shared folder. Permissions on Susan's computer are granted as shown in the following table.
You want ensure that Carlos cannot create files in the Files1 shared folder. What should you do?
A. On the Files1 shared folder, remove the Interns group's access.
B. On the C:\Files1 folder, remove the Interns group's access.
C. On the C:\Files1 folder, assign the Interns group Deny - Full Control permission.
D. On the C:\Files1 folder, assign the Interns group Deny - Write permission.
Answer: D
QUESTION 20
You are the desktop administrator for your company. The company's network consists of a single Active Directory domain. All client computers run Windows XP Professional. Bruno is a user in the graphics department. Bruno creates a new shared folder named GFXTemplates on his computer. The GFXTemplates folder contains custom templates that are used by various applications. The permissions on the GFXTemplates folder must meet the following requirements: ·Users must be able to access the GFXTemplates folder and all files it contains. ·Users must be able to add newly created template files to the GFXTemplates folder. ·Users must not be able to delete any files in the GFXTemplates folder. Bruno configures permissions on the GFXTemplates folder as shown in the following table.
The users in the graphics department report that they cannot add files to the GFXTemplates folder. What should you do to resolve this problem?
A. Modify the NTFS permissions on the GFXTemplates folder to grant the Everyone group Allow - Modify permission.
B. Modify the NTFS permissions on the GFXTemplates folder to grant the Users group Allow - Read and Allow - Write permissions.
C. Modify the shared folder permissions on the GFXTemplates folder to grant the Everyone group Allow - Change permission.
D. Modify the shared folder permissions on the GFXTemplates folder to grant the Users group Allow - Read and Allow - Write
Answer: B
QUESTION 21
You are the desktop administrator for your company's sales department. Each Windows computer in the sales department runs Windows XP Professional and a third-party Internet browser. Carmen is a user in the sales department. Carmen's computer has a single hard disk with two partitions, named drive C and drive G. Both partitions are formatted as FAT32. Carmen stores her data on drive G. A folder named Files1 on drive G is shared as Files1. Users in the sales department have permissions to save documents in the Files1 shared folder. Roger is the manager of the sales department. He wants to be able to read the documents that are in the Files1 shared folder from his UNIX client computer. Carmen reports that users of the Windows XP Professional computers are able to successfully save files in the Files1 shared folder. Roger reports that he is not ale to locate the Files1 shared folder while using his UNIX client computer. You need to ensure that Roger can read files in the Files1 shared folder from his UNIX computer. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Create an additional share for the G:\Files1 folder and name the new share Wwwroot.
B. Create a Web share for the G:\Files1 folder.
C. Install Internet Information Services (IIS) on Carmen's computer.
D. Install Internet Explorer on Carmen's computer.
E. Convert drive G to NTFS.
F. Convert drive C to NTFS.
Answer: BC
QUESTION 22
You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?
A. Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account
B. Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers Stephen’s user account.
C. Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your account.
D. Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Printers permission to your user account and to Stephen’s user account.
Answer: B
QUESTION 23
You are the desktop administrator of your company’s network. You install a print device on a Windows XP Professional computer. This print device should be used only by the desktop administration staff and by managers. You share the printer on the network as DTA-Print and assign Allow - Print permissions to the DTA-S group, which includes staff members’ accounts, and the DTA-M group, which includes managers’ accounts. Later, the managers report that they must wait a long time for their jobs to print. You discover that the desktop administration staff generates many problematic print jobs. As a result, the managers’ print jobs must wait a long time in the print queue. You need to ensure that the managers’ print jobs print as quickly as possible while minimizing hardware costs. What should you do?
A. Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-to the DTA-M group only. Configure a priority setting of 1 on DTA-Print. Configure a priority setting of 99 on DTA-Manager.
B. Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-to the DTA-M group only. Configure a priority setting of 99 on DTA-Print. Configure a priority setting of 1 on DTA-Manager.
C. Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. printer pool. Grant Allow - Manage Documents permission to DTA-M group.
D. Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. Configure a priority setting of 99 on the printer pool. Grant Allow - Manage Documents permission to DTA-M group.
Answer: A
QUESTION 24
You are the desktop administrator for your company. You connect a print device to a Windows XP Professional computer for the users in the help desk department. You share the printer on the network as HDPrint. You grant the HDUsers and HDManagers groups Allow - Print permission on HDPrint. Several users in the HDUsers group report that it often takes several minutes for their print jobs to print after they are submitted. You investigate and discover that under normal use, the print queue length often exceeds 50 print jobs. You want to improve printing performance for the users in the HDUsers group. What should you do?
A. Install a second printer that uses the same print device. Share the second printer as HDPrint2. Configure a priority setting
B. Increase the print job priority settings to 99 for all print jobs that are submitted by the users in the HDUsers group.
C. Connect a second, identical print device to the Windows XP Professional computer. In the properties for HDPrint
D. In the printer properties for HDPrint, select the Print directly to the printer option and clear the Enable advanced printing
Answer: C
QUESTION 25
You are the desktop administrator for your company. All employees have Windows XP Professional computers. All employees are members of the local Users group on their own computers. A user in the
graphics department has a removable disk cartridge drive on his computer. The disk cartridge contains an unsupported, third-party file system. When he tries to save data to the disk cartridge, the user is prompted to reformat the disk cartridge. However, he receives an “access denied” error message when attempting to reformat. You need to enable the user to save data to the disk cartridge. What should you do?
A. Instruct the user to format the cartridge as FAT32.
B. Remove the Read-only attribute from the disk cartridge.
C. Add the user to the Power Users local group on the computer.
D. Grant the user Allow - Full Control permission on the disk cartridge.
E. Configure the local security settings to allow the user to format and eject removable media.
Answer: E
QUESTION 26
You are the desktop administrator for your company. All employees have Windows XP Professional portable computers. A sales representative named Richard has a local user account on his computer. Richard is issued a portable USB print device. You log on to his computer and disable the restrictions on loading unsigned drivers. All other local computer policies are configured with the default settings. You restart Richard’s computer. Then Richard connects the USB print device, but the printer does not appear in the Printers folder, and Richard cannot print any documents. You need to ensure that Richard can install the printer and print successfully. What should you do?
A. Add Richard to the local Print Operators group on his computer.
B. Add the /fastdetect switch in the Boot.ini file on Richard’s computer.
C. Disable the Prevent users from installing printer drivers local security policy setting.
D. Modify the Driver Signing Options, selecting the Make this action the system default check box.
Answer: D
QUESTION 27
You are the desktop administrator for your company. All client computers run Windows XP Professional. Currently, 10 of the computers in the graphics department contain two processors. You want to install a second processor in each of the remaining computers in the graphics department. You install a second processor in a test computer. When you start the computer, the start process begins normally and then terminates. You receive the following error message:
"STOP: 0x00000079 HAL_MISMATCH." When you restart the computer, it stops again, and you receive the same error message. You remove the second
processor, and the computer starts normally. When you attempt to install a second processor in a different test computer, the same STOP error occurs.
You need to eliminate the error so that you can install the second processor on all of the computers. What should you do?
A. Before you install the second processor, install the multiprocessor HAL on each computer.
B. Before you install the second processor, configure the each computer's system BIOS for multiprocessor APM.
C. After you install the second processor, restart each computer by using the Recovery console, and copy the multiprocessor Professional CD-ROM.
D. After you install the second processor, start each computer in safe mode. Configure the SSDP Discovery Service startup
Answer: A
QUESTION 28
You are the desktop administrator for your company. All employees in the graphics department use
identical dual-processor Windows XP Professional computers. The employees in the graphics department use only 32-bit Windows applications. Veronica is a user in the graphics department. Veronica reports poor system performance when she runs a certain custom application. The application was designed for multiprocessor use with Windows 2000. Veronica reports that the performance problems have only recently begun. You run Task Manager on Veronica's computer. You view the performance statistics shown in the exhibit. (Click the Exhibit button.)
You need to improve application performance on Veronica's computer. What should you do?
Exhibit:
A. Create a shortcut for the application that includes the Start /separate command in the command line.
B. Configure the application to run by using Windows 2000 compatibility mode.
C. Upgrade the system BIOS on Veronica's computer to support Automatic Programmable Interrupt Controller (APIC) symmetric
D. Configure the processor affinity option on Veronica's computer so that all application processes use both processors.
Answer: D
Section: (none)
QUESTION 29
You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?
A. Configure each application to run in a separate memory space.
B. Configure each application to run in AboveNormal priority class.
C. For each application, set the compatibility mode to Windows 95.
D. Configure processor affinity for each application to allow it to run on both processors.
Answer: A
QUESTION 30
You are the administrator of a Windows XP Professional computer. The computer has three identical 4-GB hard disks. The disk and volume configuration of the computer is shown in the following table.
At the beginning of a new project, you want to configure the computer's disks so that you can store 2. 5 GB of new data. You want to ensure that you optimize the performance with which the 2. 5 GB of data can be written to the disks. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Convert both disk 1 and disk 2 to dynamic disks.
B. Convert only disk 2 to a dynamic disk.
C. Extend volume D to include the unallocated space on disk 1.
D. Create a new spanned volume that contains the 1. 5 GB of unallocated space on disk 1 and 1. 5 GB of the unallocated space on disk 2.
E. Create a new striped volume that contains the 1. 5 GB of unallocated space on disk 1 and 1. 5 GB of the unallocated space on disk 2.
Answer: AE
QUESTION 31
You are the administrator of a Windows XP Professional computer. You run five 16-bit applications on the computer. You want to monitor the performance of the computer when all five applications run at the same time. You use System Monitor to collect the performance data. The performance counters you want to include in your analysis are IO Read Bytes/sec, IO Write Bytes/sec, and Page Faults/sec. You want to ensure that you can collect these counters for each application.
What should you do?
A. Run the five 16-bit applications in one process. Monitor each thread of Ntvdm.exe.
B. Run each of the five 16-bit applications in its own memory space. Monitor each instance of Ntvdm.exe.
C. Run the five 16-bit applications in Windows 95 compatibility mode.
Monitor each instance of the applications.
D. Start the five 16-bit applications by using the Start /normal command. Monitor each instance of the applications.
QUESTION 32
You are the administrator of 20 Windows XP Professional computers. Each computer has one hard disk that has three volumes named C, D, and E. Each volume is 4 GB in size and has approximately 1 GB of available space. The total physical memory of each computer is 196 MB in size. The paging file on each computer is located on drive D. A user named Andrea reports that every day, one hour after she starts her Windows XP Professional computer, the computer appears to perform very slowly for 15 seconds. This always happens after she receives an error message stating that the system is low on virtual memory. You want to improve the performance of Andrea's computer. You do not want to install additional memory. What should you do?
A. Increase the initial size of the paging file.
B. Move the current paging file to the system drive.
C. Increase the Buffers setting in the Config.sys file.
D. Enable the Adjust for best performance of: System cache memory usage option.
Answer: A
QUESTION 33
You are the desktop administrator for your company. A remote sales representative named Laura uses a Windows XP Professional portable computer. Laura travels to customer locations daily, and she usually works from home. She does not use a docking station when she starts the computer at home. Each time Laura starts her computer, she is prompted to choose between the Docked and Undocked hardware profiles from the Hardware Profile Menu. You need to ensure that Laura is not prompted to choose a hardware profile each time she starts her computer. You also need to allow her computer to start automatically with the undocked profile and without delay. How should you configure Laura’s computer?
A. Modify the BIOS settings, and disable support for the docking station.
B. Modify the hardware profiles, and remove the Docked hardware profile.
C. Modify the Device Manager settings to disable all devices used by the docking station.
D. Configure the hardware profiles so that the Undocked hardware profile is the default hardware profile for startup.
Answer: B
QUESTION 34
You are the desktop administrator for your company. You install Windows XP Professional on your portable computer. The computer is configured to use an IEEE 1394 PC card. You use the computer to download pictures from a digital camera while you are at the office. You attend a meeting every Monday. During the meeting you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at your office. How should you configure your computer?
A. Use Device Manager to disable the IEEE 1394 PC card power device.
B. In Control Panel, select the Minimal Power Management power scheme in the Power Options Properties. C. Create an additional hardware profile, and disable the IEEE 1394 PC card for this profile.
D. Use Device Manager to configure the IEEE 1394 PC card Host Controller power management scheme. Select the Allow standby check box.
Answer: C
QUESTION 35
You are the desktop administrator for your company. You install Windows XP Professional on a new portable computer that will be used by one of the company's software developers. You test the computer after you complete the installation and find out that the computer functions properly. The computer contains a 6-GB hard disk and a removable 4-GB hard disk. The 6-GB hard disk is configured as drive C, and the removable hard disk is configured as drive D. You install Windows 98 on drive D and deliver the computer to the software developer. The software developer reports that the computer does not start when drive D is not connected. Instead, the computer briefly displays an operating system menu, and then it displays an error message stating that an operating system could not be found. When drive D is connected, the computer starts Windows 98. You need to configure the computer so that it starts Windows XP Professional whether or not drive D is connected.
What should you do?
A. Modify the computer's BIOS so that it automatically detects whether drive D is connected.
B. Modify the computer's BIOS so that drive C is first in the computer's boot order.
C. Modify the Boot.ini file on the computer by changing the default= entry to the following value: multi(0)disk(0)rdisk(0)partition(1)="Microsoft Windows XP Professional" /fastdetect
D. Modify the Boot.ini file on the computer by changing the entry for Windows 98 to the following value: D: "Microsoft Windows 98" /fastdetect
Answer: C
QUESTION 36
You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked.You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?
A. Remove the storage device from the hardware profile on Tom's computer.
B. Create a local user account for Tom on his computer. Copy the JZXDRV.dll file to the profile folder for Tom's local user computer by using his local user account whenever the computer is undocked.
C. Copy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device
D. Copy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device Instruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.
Answer: D
QUESTION 37
You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?
A. Restore the computer to the restore point that was created when Laura installed the new application.
B. Restore the System State data to Laura's computer from a backup tape.
C. Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore. D. Restart the computer by using the last known good configuration.
Answer: A
QUESTION 38
You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?
A. Change the UNC path of Peter’s roaming profile to his home directory folder.
B. Log on as a local administrator on Peter’s computer. Change the roaming profile to a local profile.
C. Log on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile.
D. Log on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder
Answer: D
QUESTION 39
You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?
A. Msinfo32.exe
B. Gpresult.exe
C. Gpedit.msc
D. Rsop.msc
Answer: B
QUESTION 40
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer.You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?
A. Secedit /refreshpolicy user_policy /enforce
B. Secedit /refreshpolicy machine_policy /enforce
C. Gpupdate /target:computer /sync
D. Gpupdate /target:user /sync
Answer: C
QUESTION 41
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?
A. Enable the Always wait for the network at computer startup and logon policy.
B. Enable the Always use classic logon policy.
C. Enable the Turn off background refresh of Group Policy policy.
D. Enable the Group Policy slow link detection policy.
Answer: A
QUESTION 42
You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?
A. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.
B. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.
C. In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.
D. In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.
Answer: C
QUESTION 43
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your company. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?
A. Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B. Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
C. Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
D. Configure the IP properties of the portable computers so that they have an alternate configuration.
Answer: D
QUESTION 44
You are the administrator of your company’s network. The network consists of a single Active Directory domain. The network includes Windows XP Professional and Windows 2000 Professional client computers. All computers have manually configured IP addresses.You install a new Windows XP Professional client computer on Subnet2. The user of this computer reports that she cannot access an application hosted on APPSRV1. When she tries to access the application, she receives the following error message: “Network path not found.” The user verifies that she can access resources on other servers located on both subnets. You view the configuration of her network connection You need to ensure that the user can access the application on APPSRV1. What should you do?
A. Configure the computer to use the address of the DNS server on Subnet1.
B. Configure the computer to use the address of the WINS server on Subnet1.
C. Configure the computer to use DHCP to automatically receive its TCP/IP configuration.
D. Configure the computer to use an IP address from Subnet1 as an alternate configuration.
Answer: B
QUESTION 45
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains two IP subnets that are connected by a router. The router is configured as shown in the following table.
Each subnet contains one domain controller. Each domain controller runs the DNS Server service and hosts an Active Directory integrated zone. The domain controller on Subnet1 also runs the WINS Server service. All client computers run Windows XP Professional and have statically configured IP addresses. Pierre is a visiting user on Subnet2. Pierre reports that he cannot access resources on servers located on Subnet1. Pierre is able to connect to resources on Subnet2. All other users on Subnet2 are able to access resources on Subnet1. You run the Ipconfig /all command on Pierre's portable computer and receive the following response.
Windows IP Configuration
Host Name . . . . . . . . . . . : Accounting201
Primary DNS Suffix??. . . . : contoso.com
Node Type . . . . . . . . . . . .: Hybrid
IP Routing Enabled. . . . . . : No
WINS Proxy Enabled . . . . : No
DNS Suffix Search List . . . : contoso.com
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix:
Description . . . . . . . . . . . : 10/100 Ethernet Adapter
Physical Address. . . . . . . : 00-8C-D2-55-F1-C9
DHCP Enabled. . . . . . . . . : No
IP Address. . . . . . . . . . . . : 192. 168. 2. 201
Subnet Mask . . . . . . . . . . : 255. 255. 255. 0
Default Gateway . . . . . . . .: 192. 168. 2. 201
DNS Servers . . . . . . . . . . : 192. 168. 2. 10
Primary WINS Server . . . . :
What should you do on Pierre's computer to resolve this problem?
A. Add the address of the WINS server on Subnet1.
B. Configure an alternate gateway that has a metric of 1 for the router's Subnet1 interface.
C. Create an alternate TCP/IP configuration that specifies an address for Subnet1.
D. Change the default gateway parameter to 192.168.2.1.
Answer: D
QUESTION 46
You are the desktop administrator for your company. The company's network consists of a single Active Directory domain. All client computers are Windows XP Professional computers that have manually configured IP addresses.A new user named Marc reports that he cannot connect to the network. All other users can connect to the network. You run IPconfig.exe on Marc's computer, and you receive the following response. Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix??. :
IP Address. . . . . . . . . . . . : 169. 254. 7. 216
Subnet Mask . . . . . . . . . . : 255. 255. 0. 0
Default Gateway . . . . . . . . :
You want to ensure that Marc can connect to the network. What should you do?
A. Run the Netstat -n command on Marc's computer.
B. Run the Netdiag /test:ipconfig /fix command on Marc's computer.
C. Manually configure Marc's computer so that it has an appropriate IP address and subnet mask.
D. Disable Automatic Private IP Addressing (APIPA) on Marc's computer.
Answer: C
QUESTION 47
You are the network administrator for your company. The company has a main office and a branch office. All client computers run Windows XP Professional. Computers in the main office receive their TCP/IP configuration from DHCP. TCP/IP settings are manually configured on computers in the branch office.Marc is a user who works in the main office. He uses a Windows XP Professional portable computer named Portable1. When he uses Portable1 in the main office, he is able to access resources that are located in both offices. Marc reports that when he visits the branch office and uses Portable1, he is not able to access any network resources that are located in either office. All other users in the branch office are able to access all network resources that are located in both offices. You need to ensure that Marc is able to use Portable1 to access all network resources when he is in either the main office or the branch office. You want to ensure that this goal is accomplished with the minimum amount of administrative effort, with no future
administrative action required. What should you do?
A. Enable Automatic Private IP Addressing (APIPA) on Portable1.
B. On Portable1, manually set an alternate TCP/IP configuration for the branch office subnet.
C. Configure the VPN2 server as a DHCP relay agent.
D. On Portable1, specify the address of the VPN2 server as an additional gateway address.
Answer: B
QUESTION 48
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Susan asks you to configure her computer so that she can dial in to the company network when she is out of the
office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card
authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Select the Advanced (custom settings) security option. B. Select the Require data encryption check box. C. Select the Typical (recommended settings) security option. D. Select the Use smart card item from the Validate my identity as follows list. E. Select the Maximum strength encryption item from the Data encryption list. F. Select the Allow these protocols option, and select the MS-CHAP v2 check box. G. Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.
Answer: AEG
QUESTION 49
You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional.
The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?
A. Change the flow control option in the modem properties to Xon / Xoff.
B. Disable error correction in the modem's default data connection preferences.
C. Adjust the modem's default connection speed to a lower rate.
D. Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.
Answer: C
QUESTION 50
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192. 168. 0. 1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?
A. Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.
B. Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.
C. Create a network bridge between the wired and wireless connections on Pro1.
D. Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties
Answer: C
QUESTION 51
You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?
A. ftp://ftp.contoso.com/Philippe B. ftp://Philippe:password@ftp.contoso.com C. ftp://Philippe/ftp.contoso.com D. ftp://ftp.contoso.com@Philippe:password
Answer: B
QUESTION 52
You are the desktop administrator for your company. Bruno is a user in the accounting department. Bruno uses a new Windows XP Professional computer. Bruno reports that he cannot access Web sites on the Internet by using Internet Explorer. However, he can access intranet Web sites that are located on other network subnets by using Internet Explorer. Other users on the network can successfully access Internet Web sites. You need to ensure that Bruno can access Internet Web sites by using Internet Explorer on his computer. What should you do?
A. Configure Internet Explorer on Bruno's computer to use the proxy server.
B. Configure Internet Explorer on Bruno's computer to permit SSL connections.
C. Configure TCP/IP on Bruno's computer to use 192. 168. 10. 57 as the default gateway.
D. Configure TCP/IP on Bruno's computer to use 192. 168. 10. 56 for DNS name resolution.
Answer: A
QUESTION 53
You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?
A. Start the default Web site.
B. Start the IIS Admin Service.
C. Run the IPconfig /registerdns command.
D. In the default Web site properties, disable the host header setting.
Answer: A
QUESTION 54
You are the manager of your company's Web development department. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. You install Internet Information Services (IIS) on a Windows XP Professional computer. Users in your department use the computer as a test Web server for new content that they develop. You are a member of the Administrators group on the computer, and you use Remote Desktop to perform routine administrative tasks. Several of the virtual directories on the Web server contain confidential company data. You assign NTFS and IIS permissions to the folders and files on the Web server, the default Web site, and the virtual directories, as shown in the following table.
You administer the default Web site, which contains a page that lists the Web development projects in progress. The Web page also contains links to each of the virtual directories that are hosted on the Web server. You use Microsoft FrontPage to manage the default Web site. Users in the Web development department control the permissions on their own NTFS folders and virtual directories. Occasionally, users report that the permissions on their folders and virtual directories are reset to the default values. You investigate and discover that this occurs whenever you update the default Web site. What should you do to resolve this problem?
A. In the default Web site's properties, on the Server Extensions tab, select the Manage permissions manually check box.
B. Change the NTFS permissions on the default Web site to only Allow - Read and Allow - Write.
C. Change the IIS permissions on the default Web site to only Read.
D. In the properties for each virtual directory, set the Execute Permissions option to Scripts only.
Answer: A
QUESTION 55
You are a help desk technician for your company. Michael is an employee in your company’s marketing department. Michael uses a Windows XP Professional computer that is located on Subnet A. You use a Windows XP Professional computer that is located on Subnet B. The company’s firewall does not use Network Address Translation (NAT).Michael sends you a Remote Assistance invitation. In Windows Messenger, you accept the invitation, but you cannot connect to Michael’s computer.Next, you run the Ping command, which verifies connectivity to Michael’s computer. You need to establish a Remote Assistance connection with Michael’s computer. What should you do next?
Exhibit:
A. Ask your firewall administrator to open the TCP/IP ports that are used by Windows Messenger.
B. Ask your firewall administrator to open the TCP/IP ports that are used by Remote Desktop Services.
C. Instruct Michael to create an invitation file and then e-mail the file to you as a file attachment. When you receive the e-mail,
D. Instruct Michael to edit the System properties for his computer and add your domain user account to the Remote Desktop
Answer: B
QUESTION 56
You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user.What should you do?
A. In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled.
B. In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Helpers list.
C. In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services
D. In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add of allowed users.
Answer: B
QUESTION 57
You are a help desk technician for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. The help desk technicians use Remote Assistance to remotely control user sessions to provide online support to users. The users currently use Microsoft Exchange and Microsoft Outlook to submit Remote Assistance invitations to the help desk technicians.Stephen is a user in the sales department. Stephen has a portable computer and frequently travels to customer locations. While Stephen is in the corporate office, he submits a Remote Assistance invitation to the help desk.
When you attempt to answer the invitation and establish the Remote Assistance session, you receive an error. You verify that Stephen's computer is connected to the network and that he did not cancel the invitation. You also verify that the invitation did not expire. You do not experience similar problems when establishing Remote Assistance sessions with other computers. You need to be able to establish a Remote Assistance session with Stephen's computer. What should you do?
A. Enable the Remote Desktop service definition in Internet Connection Firewall (ICF) on Stephen's computer.
B. Add your user account to the Remote Desktop Users list on Stephen's computer.
C. In the System properties of Stephen's computer, select the Allow users to connect remotely to this computer option, and users.
D. In the Local Security Policy of Stephen's computer, grant your user account the Allow logon through Terminal Services
Answer: A
QUESTION 58
You are the administrator of a Windows XP Professional computer named Pro1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Internet Connection Firewall (ICF) on Pro1.
You run an application named App1 on Pro1. App1 communicates with an online training company on the Internet. In order to display an online seminar, the training company needs to contact the App1 application at port 5800.You want to ensure that the training company can connect to the App1 application. What should you do?
A. Configure ICF to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application
B. Create a new service definition named App1. Use port 5800 as the external and internal port number.
C. Edit the %systemroot%\System32\Drivers\Etc\Services file on Pro1 to include a service definition named App1 for port
D. Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800.
Answer: B
QUESTION 59
You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:\Winnt\App1. The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?
A. In the properties of the C:\Winnt\App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Confirm Attributes Changes dialog box.
B. Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use folder.
C. Create a folder named C:\Files. Copy the Passwords.ini file to the C:\Files folder. In the properties of the C:\Files folder, the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:\Files\
D. Create a folder named C:\Files. Move the Passwords.ini file to the C:\Files folder. Instruct the user of each computer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog C:\Files\Passwords.ini file.
Answer: D
QUESTION 60
You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named
Data. When sales representatives travel, they use the Offline Files feature to access the files in the \\Server1\Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?
A. Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access
B. On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives.
C. Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers.
D. On the portable computers, enable encryption of the %systemroot%\CSC folder.
E. Apply this setting to the folder and files in the CSC folder.
F. On Server1, encrypt all files in the Data shared folder.
G. Add all sales representatives to the encryption details.
Answer: C
QUESTION 61
You are the desktop administrator for one of your company's branch offices. The network in the branch office contains 20 Windows XP Professional computers. Windows XP Professional was installed on the computers by using a RIS image. The computers also use a security template named Standard.inf, which you created and applied to the computers. The company's information security department releases a new security template named Corporate.inf. You are instructed to apply Corporate.inf to all 20 Windows XP Professional computers in your office. You are also instructed to make a list of all policies that are defined in Corporate.inf but that are not already enforced on the Windows XP Professional computers. You import Corporate.inf into the Security Configuration and Analysis console on your Windows XP Professional computer.You need to document the security policies that will be enforced for the first time when Corporate.inf is applied to the computers in your office. Which policies should you document?
A. the policies that are displayed with an X or an exclamation point in the analysis
B. the policies that are displayed with a check mark in the analysis
C. the policies that are displayed as Enabled in the Computer Setting column
D. the policies that are displayed as Disabled in the Computer Setting column
Answer: A
QUESTION 62
You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named \Program Files\Contoso\OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend
that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?
A. Write a logon script that moves the AppLib.dll file into the %systemroot%\System32 folder. Ensure that Windows File Protection Professional computers. Apply the logon script to all domain user accounts.
B. Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions Group Policy to import and apply the template to all 1,000 Windows XP Professional computers.
C. Repackage the customer application in a Windows Installer package. Ask a domain administrator to create a Group Policy to all domain user accounts.
D. Write a Microsoft Visual Basic Scripting Edition (VBScript) file named Modify.vbs that modifies the file permissions on AppLib.employees and instruct them to double click the file in order to run it.
Answer: B
QUESTION 63
You are the desktop administrator for your company. The company's network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers. The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named
NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers. What should you do?
A. Use the Security Configuration and Analysis console to export a template named NewSec.inf from NewSec.sdb. Copy NewSec.
B. Write a logon script that copies NewSec.sdb to the %systemroot%\System32 folder on each client computer.
C. Copy NewSec.sdb to the Netlogon shared folder on each domain controller.
D. Write a logon script that runs the Secedit /configure /db \\Server1\Sec\NewSec.sdb command. Apply the logon script.
Answer: D
QUESTION 64
You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy.What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Run the Secedit /configure /db C:\NewSec.sdb command.
B. Run the Secedit /refreshpolicy machine_policy command.
C. Copy NewSec.inf to the C:\Windows\Inf folder.
D. Copy NewSec.sdb to the C:\Windows\System32\Microsoft\Protect folder.
E. Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation.
F. Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.
Answer: AE
QUESTION 65
You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?
A. Run the Secedit.exe command in validation mode and specify the new security template.
B. Run the Secedit.exe command in configuration mode and specify the new security template.
C. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform
D. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform
Answer: C
QUESTION 66
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network
administrator has told them that a domain controller is not available.As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers?
A. Enable the Require domain controller to unlock policy.
B. Set the Number of previous logons to cache policy to 0.
C. Remove all user and group accounts from the Log on locally user right.
D. Remove all user and group accounts from the Access this computer from the network user right.
Answer: B
QUESTION 67
You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files. What should you do?
A. Reset Stephen's password and instruct Stephen to log on with the new password.
B. Reset Stephen's password and then use the password reset disk. Instruct Stephen to log on with his previous password.
C. Instruct Stephen to use the password reset disk to set a new password on his account.
D. Use the Forgotten Password Wizard to create a new password reset disk for Stephen. Use this disk to set a new password on Stephen's account.
Answer: C
QUESTION 68
You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?
A. On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer.
B. On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting
C. In the domain, modify Marc's Logon Workstations list to include the name of the computer.
D. In the domain, modify Marc's account properties to unlock the account.
Answer: A
QUESTION 69
You are a help desk technician for your company. All users have Windows XP Professional computers.A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department.You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer.Which two actions should you perform next? (Each correct answer presents part of the solution. Choose two.)
A. Add www.southridgevideo.com to the Trusted Sites list.
B. Remove www.southridgevideo.com from the Restricted Sites list.
C. In the Internet zone settings, enable the Allow unsigned ActiveX controls option.
D. Open the Local intranet Sites dialog box and clear the Include all network paths check box.
E. Open the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.
F. Open the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.
Answer: AE
QUESTION 70
You plan to install Windows XP Professional on a new computer. The computer has only one hard disk drive. The hard disk drive is connected to an onboard SCSI controller. During the text-mode phase of the Windows XP Professional installation, you receive the following error message: “Setup did not find any hard disk drives installed in your computer.” You need to ensure that Windows XP Professional can be installed on the computer. What should you do?
A. Restart the installation from the Windows XP Professional installation CD. Select F5 during the text-mode phase
B. Restart the installation from the Windows XP Professional installation CD. Select F6 during the text-mode phase.
C. Restart the computer from a MS-DOS-based startup disk, and then run fdisk.exe /mbr. Restart the installation
D. Disable the onboard SCSI controller in the BIOS, and then restart the installation from the Windows XP Professional installation phase. Insert the drivers for the onboard SCSI controller.
Answer: B
QUESTION 71
You plan to install Windows XP Professional on a new computer.You have an answer file named
unattend.txt and a uniqueness database file named unattend.udb. Unattend.udb contains a section for a computer named Computer1. You copy the Windows XP Professional source files, unattend.txt, and unattend.udb to a network share named Source. You start the new computer by using a network startup disk, and then map X: to the Source share. You need to start an unattended installation of Windows XP Professional on Computer1. What should you run?
A. setupmgr.exe /m:computer1
B. sysprep.exe /t:s:\computer1
C. Winnt.exe /unattend:unattend.txt /udf:computer1, unattend.udb /s:x:
D. Winnt32. exe /unattend:unattend.txt /udf:computer1, unattend.udb /s:x:
Answer: C
QUESTION 72
You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional.
You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete.
What should you do?
A. Add a [GuiUnattend] section to unattend.txt.
B. Include a [GuiRunOnce] section in unattend.txt.
C. Create an unattend.bat file. Place the file in the root of the installation source files.
D. Create a registry file named setup.reg. Place the file in the root of the installation source files.
Answer: B
QUESTION 73
You plan to deploy Windows XP Professional on 100 client computers. You need to create an answer file for a Sysprep setup. What should you do from the Windows XP Professional installation CD?
A. Extract support.cab, and then run rsdir.exe.
B. Extract deploy.cab, and then run sysprep.exe.
C. Extract support.cab, and then run windiff.exe.
D. Extract deploy.cab, and then run setupmgr.exe
Answer: D
QUESTION 74
You plan to upgrade a computer that runs Windows 2000 to Windows XP Professional. You need to verify that the applications currently installed on the computer will run after the upgrade. What should you do before you start the Windows XP Professional installation?
A. From the Windows XP Professional source files, run winnt.exe /u.
B. From the Windows XP Professional source files, run Winnt32 /checkupgradeonly.
C. Review the Windows Hardware Compatibility List on the Microsoft Web site.
D. Start the computer from the Windows XP Professional installation CD. When prompted, press F6.
Answer: B
QUESTION 75
You need to upgrade a computer that runs Windows 2000 to Windows XP Professional. The solution must maintain all current user and application configuration settings. What should you do?
A. From Windows 2000, run winnt.exe.
B. From Windows 2000, run winnt32. exe.
C. Start the computer from the Windows XP Professional installation CD.
D. Download the Windows XP Setup Boot Disks for Windows XP Professional from the Microsoft Web site. Start the computer by using the startup disks.
Answer: B
:
QUESTION 76
A user has a computer that runs Windows 2000 Professional. The user plans to upgrade the computer to Windows XP Professional. You need to instruct the user how to perform the upgrade. You must ensure that the user is only prompted to enter the Window XP product ID during the installation. Which command should you instruct the user to run?
A. sysprep.exe -nosidgen
B. sysprep.exe -reseal
C. winnt32 /duprepare
D. winnt32. exe /unattend
Answer: D
QUESTION 77
You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server. You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer. What should you do?
A. Reinstall the SNMP.
B. Perform a Windows Update.
C. Uninstall Windows Defender.
D. Create an exception in Windows Firewall.
Answer: D
QUESTION 78
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). You need to configure the computer so that Windows updates are downloaded nightly. You must prevent the updates from being installed automatically. What should you do?
A. Modify Automatic Updates.
B. Install and configure Windows Defender.
C. Create a scheduled task that runs gpupdate.exe /sync.
D. Create a scheduled task that runs winnt32. exe /duprepare.
Answer: A
QUESTION 79
You have 20 computers that run Windows XP Professional. You need to configure the computers to use your company’s internal Windows Server Update Services (WSUS) server. What should you do?
A. Create a scheduled task that runs wuauclt.exe.
B. Modify the Automatic Updates settings from Control Panel.
C. Modify the Automatic Updates settings in the Local Computer Policy.
D. Connect to the Windows Update Web site and select Change settings.
Answer: C
QUESTION 80
You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?
A. Copy the file to the Shared Documents folder.
B. Copy the file to the My Documents folder of the local administrator.
C. Copy the file to the %SystemRoot%\CSC folder. Add all user accounts to the guests group.
D. Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%\CSC folder.
Answer: A
QUESTION 81
You have a computer that runs Windows XP Professional. The computer is part of a workgroup. You need to configure advanced NTFS permissions on a folder stored on the computer. What should you do first?
A. Run cipher.exe.
B. Disable simple file sharing.
C. Enable folder encryption for the folder.
D. Request that an administrator adds your user account to the local Power Users group.
Answer: B
QUESTION 82
You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network.
What should you do?
A. On Folder1, modify the share permissions.
B. On Folder1, modify the NTFS permissions.
C. Add all local user accounts to the Guests group.
D. Add all local user accounts to the Network Configuration Operators group.
Answer: A
QUESTION 83
You have a computer that runs Windows XP Professional. The computer is joined to an Active Directory domain. The domain contains a global group named Group1.
You share a folder named Folder1 on the computer. You modify the NTFS permissions on Folder1 to assign Full Control to Group1. Users from Group1 report that they are unable to add files to Folder1 from the network. You need to ensure that members of Group1 can add files to Folder1 from the network. What should you do?
A. Add Group1 to the Power Users group.
B. Add Group1 to the HelpServicesGroup.
C. Modify the share permissions on Folder1.
D. Enable simple file sharing and modify the NTFS permissions on Folder1.
Answer: C
:
QUESTION 84
You have a computer that runs Windows XP Professional. Many users share the computer. You install a local print device on the computer. You need to ensure that only members of a local group named Engineering can print documents to the local print device. Which settings should you modify on the printer?
A. port
B. priority
C. security
D. share
Answer: C
QUESTION 85
You have a computer that runs Windows XP Professional. The computer is a member of an Active Directory domain. A server administrator installs and shares a new printer on a server that runs Windows Server 2003. You need to configure the computer to print to the new printer. What should you do?
A. From the computer, install a local printer.
B. From the computer, install a network printer.
C. From the Active Directory domain, add the computer account for the Windows XP Professional computer to the Print Operators
D. From the Windows Server 2003 server, add the computer account for the Windows XP Professional computer to the Print
Answer: B
QUESTION 86
You have two computers named Computer1 and Computer2 that run Windows XP Professional. A local printer is connected to Computer1. From Computer1, you establish a Remote Desktop Connection to Computer2. You discover that there are no printers available from within the Remote Desktop Connection. The event log on Computer 2 displays the following event:
Source: TermServDevices
ID: 1111
Description: Driver Printer 1000 required for printer Printer 1000 is unknown. Contact the administrator to install the driver before you log on again.
You need to ensure that you can send a print job to the print device connected to Computer1 from the Remote Desktop Connection. What should you do?
A. On Computer1, reinstall the printer.
B. On Computer1, run mstsc /console, and then connect to Computer2.
C. On Computer2, install the driver from the print device manufacturer.
D. On Computer1, disable printers in the Remote Desktop Connection configuration.
Answer: C
:
QUESTION 87
You have a FAT32-formatted volume. You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?
A. Run the sfc.exe command-line tool.
B. Run the convert.exe command-line tool.
C. From Disk Management, format the volume and select the NTFS file system.
D. From Disk Management, upgrade the disk that contains the volume to a dynamic disk.
Answer: B
:
QUESTION 88
You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:
·Temporary Internet Files
·Files in the Recycle Bin
·Downloaded program files
What should you do?
A. From the command prompt, run chkdsk.exe.
B. From the System Tools menu, run Disk Cleanup.
C. From Internet Explorer, view the Internet Options.
D. From System Properties, view the User Profiles settings.
Answer: B
QUESTION 89
You have a portable computer and a desktop computer that both run Windows XP Professional. Both computers are members of a domain named Contoso. The desktop computer hosts a shared folder named Share1. You need to ensure that all files in the Share1 folder are automatically available on the portable computer when the computer is disconnected from the network. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From the portable computer, enable offline files.
B. From the portable computer, modify the properties of the Shared Documents folder.
C. From the desktop computer, enable simple file sharing.
D. From the desktop computer, modify the properties of Share1.
Answer: AD
QUESTION 90
You have a portable computer that runs Windows XP Professional. When the computer is disconnected from the network, you receive a message in the notification area that says you are working offline. The message reappears every hour. You need to prevent the message from appearing while you are working offline. What should you modify?
A. Disk Quota settings
B. My Documents properties
C. Offline Files properties
D. Synchronization settings
Answer: C
QUESTION 91
You perform a clean installation of Windows XP Professional on a computer. The computer is a member of a workgroup. You need to enable offline files on the computer. What should you do first?
A. Disable Fast User Switching.
B. Run the Accessibility Wizard.
C. Set the Startup type of the Volume Shadow Copy Service (VSS) to Automatic.
D. Set the Startup type of the Network Location Awareness (NLA) service to Automatic.
Answer: A
:
QUESTION 92
You have a USB drive. You connect the drive to a computer that runs Windows XP Professional Service Pack 2 (SP2). You discover that after 15 minutes, the USB drive fails to appear in My Computer. You need to ensure that the USB drive appears in My Computer. What should you do?
A. At the command prompt, run defrag.exe -f. B. At the command prompt, run chkdsk.exe /f. C. From Disk Management, assign a drive letter to the USB drive. D. Delete the usbui.dll file from the computer, and then restart the computer.
Answer: C
:
QUESTION 93
You have a computer that runs Windows XP Professional. The computer has multiple FAT32- formatted You install a new disk drive. You create a new FAT32-formatted partition in the new disk drive. You need to mount the new partition as a folder in drive C.What should you do?
A. Convert the C partition to NTFS. From Disk Management, modify the drive path of the new partition. B. Convert the new partition to NTFS. From Disk Management, modify the drive path of the C partition. C. Upgrade all disks to dynamic disks. From Diskpart, set the new partition as Active. Add an entry to the boot.ini file. D. Upgrade all disks to dynamic disks. From Diskpart, clear all configuration information for the new disk. Add an entry to the Answer: A
QUESTION 94
You have a computer that runs Windows XP Professional. You replace the video graphics adapter in the computer and restart the computer. You discover that the hardware acceleration features of the video graphics card fail to function. You verify that the new video graphics adapter is certified for Windows XP Professional.
You need to ensure that the hardware acceleration features of the video card function. What should you do?
A. At the command prompt, run sigverif.exe.
B. Install the most up-to-date driver for the video graphics adapter.
C. Restart the computer in Safe Mode. Copy a new version of the vga.dll file to the computer.
D. Restart the computer in VGA Mode. Copy a new version of the vga.dll file to the computer.
Answer: B
QUESTION 95
You connect an external monitor to a portable computer. You need to increase the available desktop area to include the external monitor. What should you do?
A. From the Display properties, extend the display.
B. From the Display properties, modify the resolution settings.
C. Restart the computer in VGA Mode. Run dxdiag.exe.
D. Restart the computer in VGA Mode. Install the most up-to-date driver for the video graphics adapter.
Answer: A
QUESTION 96
You have a computer that runs Windows XP Professional. You download new video card driver from the Internet, and then install the driver. You restart the computer.
You discover that the newly loaded video driver is named VgaSave. You need to restore the previous version of the video card driver. What should you do?
A. From the Device Manger, scan for hardware changes.
B. From the Device Manager, access the video card properties, and then select Roll Back.
C. From the Device Manager, access the VgaSave properties, and then run the Hardware Troubleshooter. D. Restart the computer. From the Advanced Startup Options menu, select Last Known Good Configuration.
Answer: B
:
QUESTION 97
You have a computer that runs Windows XP Professional. The computer has the following hardware installed:
·3 GB page file
·2. 4 GHz processor
·2 GB of physical memory
·20 GB hard disk that has 1 GB of free space
You need to enable hibernation support on the computer. What should you do first?
A. Upgrade the processor.
B. Add additional physical memory.
C. Increase the size of the page file.
D. Create additional free hard disk space.
Answer: D
QUESTION 98
You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?
A. From Control Panel, configure the Power Options.
B. From the System properties, configure the Data Execution Prevention settings.
C. From the Services console, set the Startup type for the Human Interface Devices service to Automatic.
D. From the Services console, set the Startup type for the Uninterruptable Power Supply service to Automatic.
Answer: A
QUESTION 99
You have a portable computer that runs Windows XP Professional. The computer supports Advanced Configuration and Power Interface (ACPI). You need to ensure that the computer enters Sleep Mode when you close the lid of the computer. What should you do?
A. From Control Panel, configure the Power Options.
B. From the System properties, configure the Data Execution Prevention settings.
C. From the Services console, set the Startup type for the Human Interface Devices service to Manual.
D. From the Services console, set the Startup type for the Uninterruptable Power Supply service to Manual.
Answer: A
QUESTION 100
You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?
A. In the printer properties, assign the Manage Printers permission to the user. B. In the printer properties, assign the Manage Documents permission to the user. C. From the Local Users and Groups snap-in, add the user to the Power Users group. D. From the Local Users and Groups snap-in, add the user to the Replicators group.
Answer: B
QUESTION 101
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?
A. From the Device Manager, open the wireless network adapter properties and click Advanced.
B. From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C. From the Wireless Network Connection Properties, select View Wireless Networks.
D. From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab
Answer: D
QUESTION 102
You have a computer that runs Windows XP Professional. You need to verify that all drivers installed on the computer are digitally signed by Microsoft. What should you do?
A. Review the contents of the boot.ini file.
B. Review the contents of the setup.log file
C. At the command prompt, run sigverif.exe.
D. From the Device Manager snap-in, view resources by type.
Answer: C
:
QUESTION 103
You have a computer that runs Windows XP Professional. You attempt to install a device driver for a new printer and receive the error message.
You need to ensure that you can install the device driver. What should you do?
A. Add your user account to the local Power Users group.
B. Add your user account to the local Administrators group.
C. From the Device Manager, uninstall the current display driver.
D. From the System properties, modify the Driver Signing option.
Answer: D
QUESTION 104
You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer. Which tool should you use?
A. System Configuration Utility
B. System Information
C. Task Manager
D. tasklist.exe
Answer: C
QUESTION 105
You have a portable computer that runs Windows XP Professional Service Pack 2 (SP2).You need to configure the computer to generate an alert when only 25 percent of the battery life is available. What should you do?
A. From the Performance console, create a trace log.
B. From the Performance console, create a counter log.
C. From the Power Options, modify the Alarm Action.
D. From the Power Options, select the Minimal Power Management power scheme.
Answer: C
QUESTION 106
You have a computer that runs Windows XP Professional.You need to configure the computer to make the Recovery Console available from the Operation System Selection menu. What should you do?
A. Modify the boot.ini file, and then run sysprep.exe /reseal.
B. Run winnt32 /cmdcons from the Windows XP Professional installation CD.
C. Start the computer from the Windows XP Professional installation CD, and then start a repair installation. D. Copy the installation source files to the local hard disk drive. Add the path to the source files to the config.sys file.
Answer: B
QUESTION 107
You have a computer that runs Windows XP Professional.Normal backups are scheduled to run every Sunday at 22:00 Eastern Time. Differential backups are scheduled to run every Monday through Saturday at 22:00 Eastern Time. The computer fails on Thursday at 9:00 Eastern Time. You need to restore the computer from the backup by using the most recent data available. You must achieve this goal by using the minimum amount of administrative effort. You reinstall Windows XP Professional on the computer. What should you do next?
A. Restore Wednesday’s differential backup.
B. Restore Sunday’s normal backup. Restore Wednesday’s differential backup.
C. Restore Sunday’s normal backup. Restore Monday’s differential backup. Restore Tuesday’s differential backup.Restore
D. Restore Sunday’s normal backup. Restore Wednesday’s differential backup. Restore Tuesday’s differential backup. Restore
Answer: B
QUESTION 108
You have a computer that runs Windows XP professional. The computer contains one partition and a floppy disk drive. You connect a new USB drive.
You need to back up the computer to meet the following requirements:
·Enable a complete recovery if the hard disk fails.
·Enable an automatic restore of the operating systems.
·Automatically recreate the partitions during a restore process.
What should you do?
A. From System Restore, create a system restore point.
B. From the System Tools menu, run the Files and Settings Transfer Wizard.
C. From Windows Backup, run the Automated System Recovery (ASR) Wizard.
D. From Windows Backup, run the Backup Wizard, and then select Only backup the System State data.
Answer: C
QUESTION 109
You have a computer that runs Windows XP Professional. You need to create a floppy disk to start Windows XP Professional on the computer if the start files become
corrupt. What should you do?
A. From the Windows XP Professional computer, run diskcopy.exe /v a:.
B. From a computer that runs Windows 98, create a MS-DOS-based startup disk.
C. From the Windows XP Professional computer, create an Automated System Recovery (ASR) disk.
D. From the Windows XP Professional computer, format a floppy disk. Copy the NTLDR, ntdtetect.com, and boot.ini files
Answer: D
QUESTION 110
You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?
A. Copy all *.dbx files from the old computer to the new computer.
B. Establish a Remote Assistance session from the old computer to the new computer.
C. Back up the system state on the old computer. Restore the system state on the new computer.
D. Run the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.
Answer: D
QUESTION 111
You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must
appear on the desktop of new users only. What should you do?
A. Copy the shortcut to "%systemdrive%\documents and settings\default user\desktop\"
B. Copy the shortcut to "%systemdrive%\documents and settings\all users\desktop\"
C. Copy the shortcut to your desktop. Modify the %comspec% system environment variable.
D. Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.
Answer: A
QUESTION 112
You have a computer that runs Windows XP Professional. You need to ensure that the Administrative Tools menu appears on the Start menu. What should you do?
A. Modify the Display Properties.
B. Modify the Taskbar and Start Menu Properties.
C. Switch to Classic View from Control Panel.
D. Change the desktop theme to Windows Classic.
Answer: B
:
QUESTION 113
Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer.
You need to ensure that all new users of the computer receive the custom user profile. What should you do?
A. Run the Files and Settings Transfer Wizard.
B. At the command prompt, run scanstate.exe.
C. Use the Copy To function from the User Profiles settings.
D. Rename the folder that contains the custom user profile to winnt_user.
Answer: C
QUESTION 114
You have a computer that runs Windows XP Professional. Multiple users share the computer.Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?
A. From the Display Properties, modify the Desktop settings.
B. From Internet Explorer, modify the Language Preferences.
C. From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe.
D. From Regional and Language Options, modify the Location settings and the Input Languages settings.
Answer: C
QUESTION 115
Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?
A. Install the Multilingual User Interface (MUI) pack.
B. From Internet Explorer, modify the Language Preferences.
C. From the Keyboard settings, update the driver for the keyboard.
D. From Regional and Language Options, modify the Text services and input languages settings.
Answer: D
:
QUESTION 116
You have a computer that runs Windows XP Professional. You attempt to install an application by using a Windows Installer package name app1. msi. The application
installation fails. You plan to install the application again. You need to create an application installation log for the application setup. What should you do?
A. At the command prompt, run msiexec /log app1.msi /passive
B. At the command prompt, run msiexec /log app1.log /package app1.msi
C. From the Local Security Policy, enable auditing for object access, and then run app1.msi
D. From the Event Viewer, increase the size of the application log, and then run app1.msi
Answer: B
:
QUESTION 117
You network contains two domains named contoso.com and nwtraders.com. A single DNS server hosts both DNS zones. The DNS server has an IP address of 10. 10. 0. 10. You have 100 computers that run Windows XP Professional. The computers are members of the contoso.com domain. All computers have static IP addresses. The network does not contain a WINS server. You need to ensure that users can access servers in both domains by using single-label host names. What should you do on the client computers?
A. Add nwtraders.com to the DNS suffix list.
B. Add nwtraders.com to the LMHOSTS file.
C. Change the WINS server address to 10. 10. 0. 10.
D. Run ipconfig /setclassid "local area connection" nwtraders.com.
Answer: A
:
QUESTION 118
Your network contains a Web server named server1. contoso.com. All client computers on the network run Windows XP Professional. Server1. contoso.com is located in a remote site. You suspect a communication problem between a computer and server1. contoso.com. You need to view the amount of packet loss occurring on each network segment between the computer and server1. contoso.com. What should you do?
A. Repair the local area connection.
B. Review the status for the local area connection.
C. At the command prompt, run tracert server1.contoso.com.
D. At the command prompt, run pathping server1.contoso.com.
Answer: D
QUESTION 119
You network contains a Web site named www.contoso.com.Your user account has write permissions to the c:\inetpub\wwwroot folder on the Web server. You need to copy files to www.contoso.com. What should you do first?
A. From the command prompt, run ftp www.contoso.com.
B. From the command prompt, run http \\www.contoso.com\web$.
C. In the Address bar in Internet Explorer, type https://www.contoso.com/webdav.
D. From the File menu in Internet Explorer, click Open. Type http://www.contoso.com and select the Open as Web Folder
Answer: D
QUESTION 120
You network contains 500 computers. You have a computer that runs Windows XP Professional. The computer is used to perform application testing and has Internet Information Services (IIS) installed. The computer has a group named Developers. You need to ensure that only the members of the Developers group can access the Web site. Which two configuration changes should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify the properties of the Developers group.
B. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder.
C. From the properties of the default Web site, assign an SSL certificate.
D. From the properties of the default Web site, modify the Authentication Methods.
Answer: BD
QUESTION 121
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?
A. Instruct the user to send you a Remote Assistance invitation.
B. Instruct the user to start the Remote Desktop Help Session Manager service.
C. At the command prompt, establish a telnet session to the user's computer.
D. Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.
Answer: A
QUESTION 122
A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?
A. From the System settings, disable Remote Assistance.
B. Add the user's account to the Remote Desktop Users group.
C. From Windows Firewall, modify the scope of the Remote Desktop exception.
D. Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.
Answer: B
QUESTION 123
You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:\User1. The user leaves the
company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?
A. Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:\user1\*.*.
B. Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted
C. Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties
D. Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery the encrypted files.
Answer: D
QUESTION 124
You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer.
User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?
A. Add the certificate of User2 to file1. doc.
B. Assign User2 the Full Control NTFS permission on file1. doc.
C. Copy file1. doc the %systemroot%\documents and settings\all users\ folder.
D. Move file1. doc to the %systemroot%\documents and settings\all users\ folder.
Answer: A
QUESTION 125
A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2.
What should you do?
A. Instruct User1 to create a new user certificate on Computer2.
B. Instruct User1 to take ownership of the encrypted files on Computer2.
C. Instruct User1 to import the user certificate from Computer1 to Computer2.
D. Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
Answer: C
:
QUESTION 126
You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?
A. For all files, deny the Take ownership permission to the Everyone group.
B. From the Local Security Policy, modify the Encrypting File System (EFS) properties.
C. From the Certificates snap-in, delete the recovery agent certificate.
D. From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.
Answer: B
QUESTION 127
You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer.User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?
A. Disable the User1 account.
B. Add User1 to the Guests group.
C. Reset the password for the User1 account.
D. Rename ntuser.dat as ntuser.man in the User1 user profile.
Answer: A
QUESTION 128
A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account. Which group should you add User1 to?
A. Administrators
B. Power Users
C. Users
D. Network Configuration Operators
Answer: B
:
QUESTION 129
You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?
A. On Computer1, map a drive to an administrative share on Server1. Configure each user's profile path to point to the mapped
B. Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's profile
C. Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's home
folder.
D. On Computer1, map a drive from each client computer to an administrative share on Server1. Configure each user's home
Answer: B
:
QUESTION 130
Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?
A. Import the CA certificate to the trusted root CA certificate store.
B. Import the server authentication certificate to the trusted publishers certificate store.
C. Clear the Check for publisher's certificate revocation check box.
D. Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.
Answer: A
QUESTION 131
You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site.What should you do?
A. Add an entry to the Lmhosts file.
B. From the local area connection, add a DNS suffix.
C. From Internet Explorer, modify the Privacy settings.
D. From Internet Explorer, modify the Manage Add-ons settings.
Answer: C
QUESTION 132
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account.
What should you do next?
A. Modify the Internet Explorer Pop-up Blocker settings.
B. Move all URLs from the local Web servers to the Internet Explorer Favorites list.
C. From the Local Computer Policy, modify the User Configuration settings.
D. From the Local Computer Policy, modify the Computer Configuration settings.
Answer: A
QUESTION 133
You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?
A. Run ipconfig /flushdns at the command prompt.
B. Reset the password for the local administrator user account.
C. From the Internet Options in Internet Explorer, clear the AutoComplete history.
D. From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
Answer: C
You are a desktop administrator for your company. A company user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer. You need to ensure that the user can use the phone with his computer. What should you do?
A. Place the phone in Bluetooth discovery mode.
B. Place the user’s computer in Bluetooth discovery mode.
C. Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
D. Install mobile phone synchronization software on the user’s computer.
Answer: B
QUESTION 2
You are a desktop administrator for your company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?
A. Use the Msiexec.exe program to perform a quiet installation of the application.
B. Use the Msiexec.exe program to perform a passive installation of the application.
C. Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application.
D. Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.
Answer: B
QUESTION 3
You are a desktop administrator for your company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?
A. Manually perform a passive installation of the application.
B. Manually perform a quiet installation of the application.
C. Use a logon script to run the Msiexec.exe program.
D. Use the Runas utility to run the Msiexec.exe program.
Answer: B
QUESTION 4
You are the network administrator for one of your company's branch offices. Ten employees work in the branch office. All client computers in the branch office run Windows XP Professional. All client computers have manually configured IP addresses in the 192. 168. 1. 0/24 range. The branch office has a cable modem connection to the Internet. All employees in the branch office need access to the main office by means of a virtual private network (VPN) connection over the Internet. Employees in the branch office report that they cannot access resources that are located on the main office network. You investigate and discover that you can establish a VPN connection locally on a client computer named Pro1 and can access main office network resources. However, you cannot connect to Pro1 from other computers on the branch office network. You want all employees in the branch office to be able to access main office network resources by means of the VPN connection on Pro1. What should you do?
A. Disable Windows Firewall on the main office VPN connection.
B. Add a port exception to Windows Firewall to allow incoming PPTP traffic on the main office VPN connection.
C. Select the Allow other network users to control or disable the shared Internet connection check box.
D. Configure all client computers in the branch office to obtain IP addresses automatically.
Answer: D
QUESTION 5
You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser.
When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?
A. Run the IPconfig /renew command.
B. Stop and then restart the World Wide Web Publishing service.
C. Ensure that the Everyone group has Allow - Full Control permission on the Inetpub folder.
D. In the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.
Answer: D
QUESTION 6
You are the administrator of a Windows XP Professional computer named Pro1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Windows Firewall on Pro1. You run an application named App1 on Pro1. App1 communicates with an online training company on the Internet. To display an online seminar, the training company needs to contact the App1 application at port 5800. You want to ensure that the training company can connect to the App1 application. What should you do?
A. Configure Windows Firewall to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application that opens port 5800.
B. Create a new service exception named App1. Use port 5800 as both the external and internal port number.
C. Edit the %systemroot%\System32\Drivers\Etc\Services file on Pro1 to include a service definition named App1 for port
D. Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800.
Answer: B
QUESTION 7
You are the desktop administrator for your company. The company's network contains a RIS server, a DHCP server, and a DNS server.
You need to install Windows XP Professional on a computer that does not have a CD-ROM drive. The computer has the following configuration:
·a Pentium III 1-GHz processor
·a 5-GB hard disk
·128 MB of RAM
·a modem in the first PCI slot
·an Ethernet card in the last ISA slot
You attempt to install Windows XP Professional on the computer by using a RIS bootable floppy disk. However, you are unable to connect to the RIS server.
What should you do?
A. Move the Ethernet card to the first ISA slot.
B. Remove the Ethernet card and replace it with an Ethernet card that is PXE compliant.
C. Share the RIS image on the RIS server. Create a network bootable floppy disk. Insert the floppy disk, and install Windows XP Professional from the share.
D. Place the NDIS network drivers in the root directory of the RIS bootable floppy disk. Use the floppy disk to connect to the RIS server.
Answer: B
QUESTION 8
You are the desktop administrator for your company. You successfully perform a clean installation of Windows XP Professional on drive C of a computer that is used by an employee named Susan. Susan is a software developer. She wants her computer to have a dual-boot configuration so that she can use either Windows XP Professional or Windows 2000 Professional. She installs Windows 2000 Professional on drive G. After installing Windows 2000 Professional, Susan restarts her computer and chooses to start Windows XP Professional. When Windows XP Professional starts, Susan sees the following error message, which is also shown in the exhibit. "Windows 2000 could not start because the following file is missing or corrupt: \WINDOWS\SYSTEM32\CONFIG\SYSTEM"
However, Susan restarts her computer and is able to successfully start Windows 2000 Professional. You want Susan's dual-boot configuration to function properly. You start Susan's computer and choose to start Windows 2000 Professional. What should you do next?
A. Copy the NTLDR file and the Ntdetect.com file from the i386 folder on the Windows XP Professional CD-ROM to the root directory of drive C.
B. Copy the NTLDR file and the Ntdetect.com file from the i386 folder on the Windows XP Professional CD-ROM to the root directory of drive G.
C. Restore the C:\Windows\System32\Config\System file from a recent backup.
D. Restore the G:\Windows\System32\Config\System file from a recent backup.
Answer: A
QUESTION 9
You are the desktop administrator for your company's sales department. Katrin is a user in the sales department. You need to upgrade Katrin's Windows 2000 Professional computer to Windows XP Professional. Philippe is the network administrator. He previously downloaded updated Setup files and placed them on a server named Server1, in a shared folder named Updates. Philippe has successfully installed computers by using these updated Setup files. You want to ensure that these updated Setup files are automatically installed on Katrin's computer during the upgrade. Which command should you run to start Setup?
A. Winnt32.exe /dushare:\\server1\updates
B. Winnt32.exe /copydir:\\server1\updates
C. Winnt32.exe /duprepare:\\server1\updates D. Winnt32.exe /copysource:\\server1\updates
Answer: A
QUESTION 10
You are the desktop administrator for your company's sales department. You need to perform a clean installation of Windows XP Professional on a computer that currently runs Windows 98. You start the installation. The text-based portion of Setup finishes successfully. Before the GUI-based portion of Setup starts, the computer stops responding. You investigate and discover that there is a problem with a device driver. You want to know which device is causing the problem. What should you do?
A. Modify the Boot.ini file to include the /fastdetect switch.
B. Modify the Boot.ini file to include the /sos switch.
C. Restart Setup by using the /dudisable switch.
D. Restart Setup by using the /dushare switch.
E. Restart the computer. From the Recovery console, read the Dr. Watson log.
F. Restart the computer. From the Recovery console, read the Comsetup.log file.
Answer: B
QUESTION 11
You are the desktop administrator for your company's sales department. The company's network contains a RIS server. You need to install Windows XP Professional on a computer that has a SCSI disk subsystem. You start the computer by using the Windows XP Professional CD-ROM, and you begin the installation. However, Setup reports that it cannot find any disks on which to install Windows XP Professional. You start the computer by using a RIS bootable floppy disk, and you receive the same result. What should you do?
A. Add an answer file to the root directory of the RIS bootable floppy disk. Start the computer by using the RIS bootable floppy disk, and run Setup by using RIS.
B. Add the SCSI-controller driver to the root directory of the RIS bootable floppy disk. Start the computer by using the RIS bootable floppy disk, and run Setup by using RIS.
C. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide an answer file on a floppy disk.
D. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide a SCSI-controller driver on a floppy disk.
E. Start the computer by using the Windows XP Professional CD-ROM, and run Setup. After Setup starts, provide the appropriate HAL on a floppy disk.
Answer: D
QUESTION 12
You are the desktop administrator for your company. You are responsible for automating the deployment of Windows XP Professional to new computers in your company. You are preparing a Windows XP Professional computer, which you will use to test disk imaging. You install Windows XP Professional on the test computer and run the Sysprep utility. You use a third-party software package to create a disk image. You apply the disk image to a new computer and then restart the computer. Instead of completing the Windows XP Professional installation, the computer starts the Windows Welcome program, requiring you to enter additional setup information. Because you will be deploying a large number of computers, you want to ensure that the disk image can be applied without additional user interaction. What should you do?
A. Use a network-based RIS server to apply the disk image to new computers.
B. On the test computer, run the Sysprep -factory command. Re-create the disk image by using the third-party software.
C. Use Setup Manager to create a Sysprep answer file. Copy the answer file to a floppy disk, and insert the disk into new computers
D. Create an Unattend.txt answer file. Copy the file to the C:\Winnt\System32 folder on the test computer. Run the Sysprep the third-party software.
Answer: C
QUESTION 13
You are the desktop administrator for one of your company's branch offices. The network in the branch office consists of a single network segment, which contains a domain controller, a DHCP server, 10 Windows 2000 Server computers, and 50 Windows 2000 Professional computers. All servers and client computers are members of the company's Active Directory domain. You purchase 50 new client computers for the branch office. Each new client computer contains a built-in PXE-compliant network adapter. You install and configure RIS on one of the Windows 2000 Server computers that is on the network in the branch office. You create a Windows XP Professional RIS image on the Windows 2000 Server computer. You connect the new client computers to the network in the office, and you turn on each computer. Each computer displays a message stating that it cannot contact a PXE boot server. You verify that the RIS server is connected to the network.You need to ensure that the new client computers can connect to the RIS server and can begin installing Windows XP Professional. What should you do?
A. Ask a domain administrator to authorize the RIS server.
B. Grant the Everyone group Allow - Read NTFS permission on the RIS image.
C. Install RIS on the domain controller. Copy the RIS image to the domain controller.
D. Add a reservation for the RIS server to the DHCP server.
Answer: A
QUESTION 14
You are the desktop administrator for your company. You need to deploy Windows XP Professional to 50 new computers. You want to use a fully automated installation process. Each new computer is configured with a 20-GB hard disk, a CD-ROM drive, and a floppy disk drive. The computers do not contain network adapter cards.
You specify the company's standard installation settings and save them in an answer file. You want to use the Sysprep utility to prepare the source computer for the deployment. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Place the answer file in C:\Windows\System.
B. Place the answer file in C:\Windows\System32.
C. Place the answer file in C:\Sysprep.
D. Place Sysprep.exe and Setupcl.exe in C:\Windows\System.
E. Place Sysprep.exe and Setupcl.exe in C:\Windows\System32.
F. Place Sysprep.exe and Setupcl.exe in C:\Sysprep.
Answer: CF
QUESTION 15
You are a help desk technician for your company, which is in the process of deploying Windows XP Professional to all client computers. You upgrade Pierre’s Windows 98 portable computer to Windows XP Professional. After the upgrade, Pierre reports that some of his older software applications no longer work properly. Also, one of the hardware devices on his computer is not currently supported by Windows XP Professional. Pierre requests that you reinstall Windows 98 and all of his applications so that he can use his computer normally. You need to restore Pierre’s computer to its pre-upgraded state while retaining all of the applications, documents, and personal data on the computer. You want to accomplish this task in the minimum amount of time. What should you do?
A. Copy Pierre's documents and personal data to a shared folder on the network. Reinstall Windows 98 and Pierre's applications. data to the My Documents folder on Pierre's computer.
B. On Pierre's computer, run Setup.exe from a Windows 98 installation CD.
C. On Pierre's computer, use the Add or Remove Programs Wizard to remove the Windows XP Professional installation item.
D. On Pierre's computer, use a third party disk imaging software utility to apply a disk image that contains Windows 98
Answer: C
QUESTION 16
You are the desktop administrator for your company. You need to upgrade a Windows 98 computer to Windows XP Professional. Windows 98 is installed in a folder named C:\Win98. You need to ensure that the computer's applications and settings are retained after the upgrade. You insert the Windows XP Professional CD-ROM into the computer and restart the computer. The text-based portion of Setup appears. The text on the screen states that Windows XP Professional will be installed in a folder named C:\Windows, not in the C:\Win98 folder. You need to ensure that Windows XP Professional upgrades the existing Windows 98 installation. What should you do?
A. Rename the C:\Win98 folder to C:\Windows.
B. Modify the installation settings in the text-based portion of Setup so that Windows XP Professional is installed in the C:\
C. Restart the computer by using Windows 98. Then insert the Windows XP Professional CD-ROM into the computer
D. Use the Windows XP Professional CD-ROM to create a set of Setup floppy disks. Restart the computer by using the first
Answer: C
QUESTION 17
You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's computer currently runs Microsoft Windows NT Workstation 4. 0. Susan uses a legacy application that is compatible with only Windows NT Workstation. You want to install Windows XP Professional on Susan's computer. You plan to set up a dual-boot configuration so that Susan can run either Windows XP Professional or Windows NT Workstation. Susan's computer has two hard disks, named drive C and drive G. You install Windows XP Professional on drive G. After Windows XP Professional is installed, Susan reports that Windows NT Workstation is no longer available. You need to ensure that both operating systems are available on Susan's computer. What should you do?
A. Insert the Windows XP Professional CD-ROM into the computer. Run the Sfc.exe /scannow command. B. Insert the Windows XP Professional CD-ROM into the computer. Run the Winnt32. exe /cmdcons command.
C. Start the computer by using an MS-DOS bootable floppy disk. Run the Attrib.exe -r -h -s c:\bootsect.dos command.
D. Start the computer by using the Windows XP Professional CD-ROM. From the Recovery console, run the Bootcfg /rebuild command.
Answer: D
QUESTION 18
You are a help desk technician for your company. All employees use Windows XP Professional computers.A salesperson named Philippe receives a removable disk drive cartridge from his supervisor. Philippe now reports that he cannot edit files on the cartridge. When he tries to open any files or folders on the cartridge, he receives an “access denied” error message. Philippe’s supervisor is currently out of the office. You place the cartridge in the removable drive on your computer. You receive the same “access denied” error message when you try to access the files and folders. You call Philippe’s
supervisor. She asks you to grant permission to access the contents of the cartridge only to Philippe. However, she also wants to prevent Philippe from changing permissions on the contents of the cartridge. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. As Administrator, take ownership of the files and folders.
B. As Administrator, grant your help desk user account Allow - Full Control permission on the files and folders.
C. Grant Philippe Allow - Modify permission on the files and folders.
D. Grant Philippe Allow - Full Control permission on the files and folders.
E. Grant Philippe Allow - Take Ownership permission on the files and folders.
Answer: AC
QUESTION 19
You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's Windows XP Professional computer has a single hard disk, which is formatted as NTFS. Susan's computer contains a folder named C:\Files1. The C:\Files1 folder is shared as Files1. Users in the sales department have permissions to create files in the Files1 shared folder. Company policy allows interns to read files, but prohibits interns from creating files in the Files1 shared folder. Company policy allows members of the Sales group and the Marketing group to create files in the Files1 shared folder. Carlos is an intern. He is a member of the Interns group, the Sales group, and the Marketing group. Susan reports that Carlos is able to create files in the Files1 shared folder. You inspect Susan's computer to evaluate the Files1 shared folder. Permissions on Susan's computer are granted as shown in the following table.
You want ensure that Carlos cannot create files in the Files1 shared folder. What should you do?
A. On the Files1 shared folder, remove the Interns group's access.
B. On the C:\Files1 folder, remove the Interns group's access.
C. On the C:\Files1 folder, assign the Interns group Deny - Full Control permission.
D. On the C:\Files1 folder, assign the Interns group Deny - Write permission.
Answer: D
QUESTION 20
You are the desktop administrator for your company. The company's network consists of a single Active Directory domain. All client computers run Windows XP Professional. Bruno is a user in the graphics department. Bruno creates a new shared folder named GFXTemplates on his computer. The GFXTemplates folder contains custom templates that are used by various applications. The permissions on the GFXTemplates folder must meet the following requirements: ·Users must be able to access the GFXTemplates folder and all files it contains. ·Users must be able to add newly created template files to the GFXTemplates folder. ·Users must not be able to delete any files in the GFXTemplates folder. Bruno configures permissions on the GFXTemplates folder as shown in the following table.
The users in the graphics department report that they cannot add files to the GFXTemplates folder. What should you do to resolve this problem?
A. Modify the NTFS permissions on the GFXTemplates folder to grant the Everyone group Allow - Modify permission.
B. Modify the NTFS permissions on the GFXTemplates folder to grant the Users group Allow - Read and Allow - Write permissions.
C. Modify the shared folder permissions on the GFXTemplates folder to grant the Everyone group Allow - Change permission.
D. Modify the shared folder permissions on the GFXTemplates folder to grant the Users group Allow - Read and Allow - Write
Answer: B
QUESTION 21
You are the desktop administrator for your company's sales department. Each Windows computer in the sales department runs Windows XP Professional and a third-party Internet browser. Carmen is a user in the sales department. Carmen's computer has a single hard disk with two partitions, named drive C and drive G. Both partitions are formatted as FAT32. Carmen stores her data on drive G. A folder named Files1 on drive G is shared as Files1. Users in the sales department have permissions to save documents in the Files1 shared folder. Roger is the manager of the sales department. He wants to be able to read the documents that are in the Files1 shared folder from his UNIX client computer. Carmen reports that users of the Windows XP Professional computers are able to successfully save files in the Files1 shared folder. Roger reports that he is not ale to locate the Files1 shared folder while using his UNIX client computer. You need to ensure that Roger can read files in the Files1 shared folder from his UNIX computer. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Create an additional share for the G:\Files1 folder and name the new share Wwwroot.
B. Create a Web share for the G:\Files1 folder.
C. Install Internet Information Services (IIS) on Carmen's computer.
D. Install Internet Explorer on Carmen's computer.
E. Convert drive G to NTFS.
F. Convert drive C to NTFS.
Answer: BC
QUESTION 22
You and Stephen are the desktop administrators for your company. You install a printer on your Windows XP Professional computer. You share this printer on the company network. You want to ensure that only members of the DTAdmins local group can use this printer, and that only you and Stephen can manage the printer and all print jobs. You also want to ensure that members of the DTAdmins local group can manage only their own print jobs. How should you configure security on this printer?
A. Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents permission to your user account
B. Grant Allow - Print permission to the DTAdmins group. Grant Allow - Manage Documents and Allow - Manage Printers Stephen’s user account.
C. Grant Allow - Manage Documents permission to the DTAdmins group. Grant Allow - Manage Printers permission to your account.
D. Grant Allow - Print permission to the DTAdmins group. Remove Allow - Manage Documents permission from the Creator Printers permission to your user account and to Stephen’s user account.
Answer: B
QUESTION 23
You are the desktop administrator of your company’s network. You install a print device on a Windows XP Professional computer. This print device should be used only by the desktop administration staff and by managers. You share the printer on the network as DTA-Print and assign Allow - Print permissions to the DTA-S group, which includes staff members’ accounts, and the DTA-M group, which includes managers’ accounts. Later, the managers report that they must wait a long time for their jobs to print. You discover that the desktop administration staff generates many problematic print jobs. As a result, the managers’ print jobs must wait a long time in the print queue. You need to ensure that the managers’ print jobs print as quickly as possible while minimizing hardware costs. What should you do?
A. Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-to the DTA-M group only. Configure a priority setting of 1 on DTA-Print. Configure a priority setting of 99 on DTA-Manager.
B. Install a second printer for the same print device on the Windows XP Professional computer. Share this printer as DTA-to the DTA-M group only. Configure a priority setting of 99 on DTA-Print. Configure a priority setting of 1 on DTA-Manager.
C. Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. printer pool. Grant Allow - Manage Documents permission to DTA-M group.
D. Connect a second print device to the Windows XP Professional computer. Create a printer pool from the first defined printer. Configure a priority setting of 99 on the printer pool. Grant Allow - Manage Documents permission to DTA-M group.
Answer: A
QUESTION 24
You are the desktop administrator for your company. You connect a print device to a Windows XP Professional computer for the users in the help desk department. You share the printer on the network as HDPrint. You grant the HDUsers and HDManagers groups Allow - Print permission on HDPrint. Several users in the HDUsers group report that it often takes several minutes for their print jobs to print after they are submitted. You investigate and discover that under normal use, the print queue length often exceeds 50 print jobs. You want to improve printing performance for the users in the HDUsers group. What should you do?
A. Install a second printer that uses the same print device. Share the second printer as HDPrint2. Configure a priority setting
B. Increase the print job priority settings to 99 for all print jobs that are submitted by the users in the HDUsers group.
C. Connect a second, identical print device to the Windows XP Professional computer. In the properties for HDPrint
D. In the printer properties for HDPrint, select the Print directly to the printer option and clear the Enable advanced printing
Answer: C
QUESTION 25
You are the desktop administrator for your company. All employees have Windows XP Professional computers. All employees are members of the local Users group on their own computers. A user in the
graphics department has a removable disk cartridge drive on his computer. The disk cartridge contains an unsupported, third-party file system. When he tries to save data to the disk cartridge, the user is prompted to reformat the disk cartridge. However, he receives an “access denied” error message when attempting to reformat. You need to enable the user to save data to the disk cartridge. What should you do?
A. Instruct the user to format the cartridge as FAT32.
B. Remove the Read-only attribute from the disk cartridge.
C. Add the user to the Power Users local group on the computer.
D. Grant the user Allow - Full Control permission on the disk cartridge.
E. Configure the local security settings to allow the user to format and eject removable media.
Answer: E
QUESTION 26
You are the desktop administrator for your company. All employees have Windows XP Professional portable computers. A sales representative named Richard has a local user account on his computer. Richard is issued a portable USB print device. You log on to his computer and disable the restrictions on loading unsigned drivers. All other local computer policies are configured with the default settings. You restart Richard’s computer. Then Richard connects the USB print device, but the printer does not appear in the Printers folder, and Richard cannot print any documents. You need to ensure that Richard can install the printer and print successfully. What should you do?
A. Add Richard to the local Print Operators group on his computer.
B. Add the /fastdetect switch in the Boot.ini file on Richard’s computer.
C. Disable the Prevent users from installing printer drivers local security policy setting.
D. Modify the Driver Signing Options, selecting the Make this action the system default check box.
Answer: D
QUESTION 27
You are the desktop administrator for your company. All client computers run Windows XP Professional. Currently, 10 of the computers in the graphics department contain two processors. You want to install a second processor in each of the remaining computers in the graphics department. You install a second processor in a test computer. When you start the computer, the start process begins normally and then terminates. You receive the following error message:
"STOP: 0x00000079 HAL_MISMATCH." When you restart the computer, it stops again, and you receive the same error message. You remove the second
processor, and the computer starts normally. When you attempt to install a second processor in a different test computer, the same STOP error occurs.
You need to eliminate the error so that you can install the second processor on all of the computers. What should you do?
A. Before you install the second processor, install the multiprocessor HAL on each computer.
B. Before you install the second processor, configure the each computer's system BIOS for multiprocessor APM.
C. After you install the second processor, restart each computer by using the Recovery console, and copy the multiprocessor Professional CD-ROM.
D. After you install the second processor, start each computer in safe mode. Configure the SSDP Discovery Service startup
Answer: A
QUESTION 28
You are the desktop administrator for your company. All employees in the graphics department use
identical dual-processor Windows XP Professional computers. The employees in the graphics department use only 32-bit Windows applications. Veronica is a user in the graphics department. Veronica reports poor system performance when she runs a certain custom application. The application was designed for multiprocessor use with Windows 2000. Veronica reports that the performance problems have only recently begun. You run Task Manager on Veronica's computer. You view the performance statistics shown in the exhibit. (Click the Exhibit button.)
You need to improve application performance on Veronica's computer. What should you do?
Exhibit:
A. Create a shortcut for the application that includes the Start /separate command in the command line.
B. Configure the application to run by using Windows 2000 compatibility mode.
C. Upgrade the system BIOS on Veronica's computer to support Automatic Programmable Interrupt Controller (APIC) symmetric
D. Configure the processor affinity option on Veronica's computer so that all application processes use both processors.
Answer: D
Section: (none)
QUESTION 29
You are the desktop administrator for your company. All users in the network have Windows XP Professional computers. Users in the research department have dual-processor computers. Users in the research department report that when they run 16-bit Windows programs, their computer performance becomes very slow. You use System Monitor to monitor the users’ computers. You discover that when the users are running their 16-bit applications, one processor shows a sustained utilization of more than 90 percent while the other processor only shows utilization of less than 10 percent. You need to improve application performance for the users in the research department. What should you do?
A. Configure each application to run in a separate memory space.
B. Configure each application to run in AboveNormal priority class.
C. For each application, set the compatibility mode to Windows 95.
D. Configure processor affinity for each application to allow it to run on both processors.
Answer: A
QUESTION 30
You are the administrator of a Windows XP Professional computer. The computer has three identical 4-GB hard disks. The disk and volume configuration of the computer is shown in the following table.
At the beginning of a new project, you want to configure the computer's disks so that you can store 2. 5 GB of new data. You want to ensure that you optimize the performance with which the 2. 5 GB of data can be written to the disks. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)
A. Convert both disk 1 and disk 2 to dynamic disks.
B. Convert only disk 2 to a dynamic disk.
C. Extend volume D to include the unallocated space on disk 1.
D. Create a new spanned volume that contains the 1. 5 GB of unallocated space on disk 1 and 1. 5 GB of the unallocated space on disk 2.
E. Create a new striped volume that contains the 1. 5 GB of unallocated space on disk 1 and 1. 5 GB of the unallocated space on disk 2.
Answer: AE
QUESTION 31
You are the administrator of a Windows XP Professional computer. You run five 16-bit applications on the computer. You want to monitor the performance of the computer when all five applications run at the same time. You use System Monitor to collect the performance data. The performance counters you want to include in your analysis are IO Read Bytes/sec, IO Write Bytes/sec, and Page Faults/sec. You want to ensure that you can collect these counters for each application.
What should you do?
A. Run the five 16-bit applications in one process. Monitor each thread of Ntvdm.exe.
B. Run each of the five 16-bit applications in its own memory space. Monitor each instance of Ntvdm.exe.
C. Run the five 16-bit applications in Windows 95 compatibility mode.
Monitor each instance of the applications.
D. Start the five 16-bit applications by using the Start /normal command. Monitor each instance of the applications.
QUESTION 32
You are the administrator of 20 Windows XP Professional computers. Each computer has one hard disk that has three volumes named C, D, and E. Each volume is 4 GB in size and has approximately 1 GB of available space. The total physical memory of each computer is 196 MB in size. The paging file on each computer is located on drive D. A user named Andrea reports that every day, one hour after she starts her Windows XP Professional computer, the computer appears to perform very slowly for 15 seconds. This always happens after she receives an error message stating that the system is low on virtual memory. You want to improve the performance of Andrea's computer. You do not want to install additional memory. What should you do?
A. Increase the initial size of the paging file.
B. Move the current paging file to the system drive.
C. Increase the Buffers setting in the Config.sys file.
D. Enable the Adjust for best performance of: System cache memory usage option.
Answer: A
QUESTION 33
You are the desktop administrator for your company. A remote sales representative named Laura uses a Windows XP Professional portable computer. Laura travels to customer locations daily, and she usually works from home. She does not use a docking station when she starts the computer at home. Each time Laura starts her computer, she is prompted to choose between the Docked and Undocked hardware profiles from the Hardware Profile Menu. You need to ensure that Laura is not prompted to choose a hardware profile each time she starts her computer. You also need to allow her computer to start automatically with the undocked profile and without delay. How should you configure Laura’s computer?
A. Modify the BIOS settings, and disable support for the docking station.
B. Modify the hardware profiles, and remove the Docked hardware profile.
C. Modify the Device Manager settings to disable all devices used by the docking station.
D. Configure the hardware profiles so that the Undocked hardware profile is the default hardware profile for startup.
Answer: B
QUESTION 34
You are the desktop administrator for your company. You install Windows XP Professional on your portable computer. The computer is configured to use an IEEE 1394 PC card. You use the computer to download pictures from a digital camera while you are at the office. You attend a meeting every Monday. During the meeting you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at your office. How should you configure your computer?
A. Use Device Manager to disable the IEEE 1394 PC card power device.
B. In Control Panel, select the Minimal Power Management power scheme in the Power Options Properties. C. Create an additional hardware profile, and disable the IEEE 1394 PC card for this profile.
D. Use Device Manager to configure the IEEE 1394 PC card Host Controller power management scheme. Select the Allow standby check box.
Answer: C
QUESTION 35
You are the desktop administrator for your company. You install Windows XP Professional on a new portable computer that will be used by one of the company's software developers. You test the computer after you complete the installation and find out that the computer functions properly. The computer contains a 6-GB hard disk and a removable 4-GB hard disk. The 6-GB hard disk is configured as drive C, and the removable hard disk is configured as drive D. You install Windows 98 on drive D and deliver the computer to the software developer. The software developer reports that the computer does not start when drive D is not connected. Instead, the computer briefly displays an operating system menu, and then it displays an error message stating that an operating system could not be found. When drive D is connected, the computer starts Windows 98. You need to configure the computer so that it starts Windows XP Professional whether or not drive D is connected.
What should you do?
A. Modify the computer's BIOS so that it automatically detects whether drive D is connected.
B. Modify the computer's BIOS so that drive C is first in the computer's boot order.
C. Modify the Boot.ini file on the computer by changing the default= entry to the following value: multi(0)disk(0)rdisk(0)partition(1)="Microsoft Windows XP Professional" /fastdetect
D. Modify the Boot.ini file on the computer by changing the entry for Windows 98 to the following value: D: "Microsoft Windows 98" /fastdetect
Answer: C
QUESTION 36
You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked.You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?
A. Remove the storage device from the hardware profile on Tom's computer.
B. Create a local user account for Tom on his computer. Copy the JZXDRV.dll file to the profile folder for Tom's local user computer by using his local user account whenever the computer is undocked.
C. Copy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device
D. Copy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device Instruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.
Answer: D
QUESTION 37
You are the desktop administrator for your company. Laura is a user in the company's accounting department. Laura uses a Windows XP Professional computer. Laura installs a new software application that was listed on her Add or Remove Programs list. Laura reports that the new application now opens whenever she double-clicks any file that has a .doc file name extension. She also reports that 24 new icons appear on the New menu when she right-clicks her desktop. Laura asks you to reconfigure her computer so that Microsoft Word opens when she double-clicks files that have a .doc file name extension. She also wants you to remove the new icons from the New menu. You instruct Laura to uninstall the new application. After she uninstalls the application, she reports that she can no longer open .doc files by double-clicking them. She also reports that the unwanted icons on the New menu are still present. You reinstall the new application, and it continues to open when Laura double-clicks .doc files. You want to restore the .doc file association and to remove the unwanted icons from the New menu on Laura's computer. You want to accomplish these tasks as quickly as possible. You also want to ensure that none of Laura's other documents or personal settings are affected. What should you do?
A. Restore the computer to the restore point that was created when Laura installed the new application.
B. Restore the System State data to Laura's computer from a backup tape.
C. Use the Windows XP Professional CD-ROM to perform an Automated System Recovery (ASR) restore. D. Restart the computer by using the last known good configuration.
Answer: A
QUESTION 38
You are the desktop administrator for Contoso, Ltd. A graphic designer named Peter saves all his files in the My Documents folder on his Window XP Professional computer. Peter now needs to work on several computers each day to complete his work. Peter needs to be able to access his files at any time. You implement a roaming user profile and a home directory for Peter. However, Peter reports that when he uses his roaming profile, it takes 10 minutes for him to log on to computers other than his own. You need to reduce the amount of time it takes for Peter to log on to computers when using his roaming profile. What should you do?
A. Change the UNC path of Peter’s roaming profile to his home directory folder.
B. Log on as a local administrator on Peter’s computer. Change the roaming profile to a local profile.
C. Log on as a local administrator on Peter’s computer. Edit the local Group Policy to exclude Directories in Roaming Profile.
D. Log on as a local administrator on Peter’s computer. In the properties of the My Documents folder, change the Target folder
Answer: D
QUESTION 39
You are the desktop administrator for your company's sales department. The IT manager for the sales department creates a custom policy that will apply to a custom application that is loaded on the department's Windows XP Professional computers. He deploys this policy by using Group Policy. When you inspect the sales department's computers, you find out that the application has not been modified by the policy. You want to examine Windows XP Professional to find out whether the custom policy is affecting the correct location in the Registry. Which command should you run?
A. Msinfo32.exe
B. Gpresult.exe
C. Gpedit.msc
D. Rsop.msc
Answer: B
QUESTION 40
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute a custom application to the Windows XP Professional computers in the sales department. He deploys the software by using Group Policy. Susan is a user in the sales department. She reports that the custom application is not available. You examine her computer, and you verify that the application is not present on her computer.You want to ensure that the software is deployed the next time Susan logs on. Which command should you run?
A. Secedit /refreshpolicy user_policy /enforce
B. Secedit /refreshpolicy machine_policy /enforce
C. Gpupdate /target:computer /sync
D. Gpupdate /target:user /sync
Answer: C
QUESTION 41
You are the desktop administrator for your company's sales department. The IT manager for the sales department needs to distribute three custom applications to the department's Windows XP Professional computers. She deploys these applications by using Group Policy. Some users report that they must log on several times before the newly deployed applications are present on their computers. You need to ensure that all software is deployed the next time the users log on. What should you do?
A. Enable the Always wait for the network at computer startup and logon policy.
B. Enable the Always use classic logon policy.
C. Enable the Turn off background refresh of Group Policy policy.
D. Enable the Group Policy slow link detection policy.
Answer: A
QUESTION 42
You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger. You want to ensure that Roger cannot modify his roaming profile. What should you do?
A. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.
B. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.
C. In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.
D. In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.
Answer: C
QUESTION 43
You are the administrator of 15 Windows XP Professional portable computers in the sales department of your company. The company network uses DHCP to configure the IP addresses of the portable computers when the computers are used in the office. Company policy allows the company portable computers to be connected to users' home networks. The sales department reports that users who use home networks that have manually configured IP addresses are unable to connect the portable computers to their home networks. You want to ensure that users can connect portable computers to their home networks when they are at home and to the company network when they are in the office. You do not want to change the configuration of home computers on users' home networks. You do not want to change the administrative privileges of the sales department users. What should you do?
A. Configure the network adapters of the portable computers to enable Internet Connection Sharing (ICS). B. Configure the network adapters of the portable computers to enable Automatic Private IP Addressing (APIPA).
C. Add a script to the users' desktops that changes the IP configuration between dynamic and manual.
D. Configure the IP properties of the portable computers so that they have an alternate configuration.
Answer: D
QUESTION 44
You are the administrator of your company’s network. The network consists of a single Active Directory domain. The network includes Windows XP Professional and Windows 2000 Professional client computers. All computers have manually configured IP addresses.You install a new Windows XP Professional client computer on Subnet2. The user of this computer reports that she cannot access an application hosted on APPSRV1. When she tries to access the application, she receives the following error message: “Network path not found.” The user verifies that she can access resources on other servers located on both subnets. You view the configuration of her network connection You need to ensure that the user can access the application on APPSRV1. What should you do?
A. Configure the computer to use the address of the DNS server on Subnet1.
B. Configure the computer to use the address of the WINS server on Subnet1.
C. Configure the computer to use DHCP to automatically receive its TCP/IP configuration.
D. Configure the computer to use an IP address from Subnet1 as an alternate configuration.
Answer: B
QUESTION 45
You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains two IP subnets that are connected by a router. The router is configured as shown in the following table.
Each subnet contains one domain controller. Each domain controller runs the DNS Server service and hosts an Active Directory integrated zone. The domain controller on Subnet1 also runs the WINS Server service. All client computers run Windows XP Professional and have statically configured IP addresses. Pierre is a visiting user on Subnet2. Pierre reports that he cannot access resources on servers located on Subnet1. Pierre is able to connect to resources on Subnet2. All other users on Subnet2 are able to access resources on Subnet1. You run the Ipconfig /all command on Pierre's portable computer and receive the following response.
Windows IP Configuration
Host Name . . . . . . . . . . . : Accounting201
Primary DNS Suffix??. . . . : contoso.com
Node Type . . . . . . . . . . . .: Hybrid
IP Routing Enabled. . . . . . : No
WINS Proxy Enabled . . . . : No
DNS Suffix Search List . . . : contoso.com
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix:
Description . . . . . . . . . . . : 10/100 Ethernet Adapter
Physical Address. . . . . . . : 00-8C-D2-55-F1-C9
DHCP Enabled. . . . . . . . . : No
IP Address. . . . . . . . . . . . : 192. 168. 2. 201
Subnet Mask . . . . . . . . . . : 255. 255. 255. 0
Default Gateway . . . . . . . .: 192. 168. 2. 201
DNS Servers . . . . . . . . . . : 192. 168. 2. 10
Primary WINS Server . . . . :
What should you do on Pierre's computer to resolve this problem?
A. Add the address of the WINS server on Subnet1.
B. Configure an alternate gateway that has a metric of 1 for the router's Subnet1 interface.
C. Create an alternate TCP/IP configuration that specifies an address for Subnet1.
D. Change the default gateway parameter to 192.168.2.1.
Answer: D
QUESTION 46
You are the desktop administrator for your company. The company's network consists of a single Active Directory domain. All client computers are Windows XP Professional computers that have manually configured IP addresses.A new user named Marc reports that he cannot connect to the network. All other users can connect to the network. You run IPconfig.exe on Marc's computer, and you receive the following response. Windows IP Configuration
Ethernet adapter Local Area Connection:
Connection-specific DNS Suffix??. :
IP Address. . . . . . . . . . . . : 169. 254. 7. 216
Subnet Mask . . . . . . . . . . : 255. 255. 0. 0
Default Gateway . . . . . . . . :
You want to ensure that Marc can connect to the network. What should you do?
A. Run the Netstat -n command on Marc's computer.
B. Run the Netdiag /test:ipconfig /fix command on Marc's computer.
C. Manually configure Marc's computer so that it has an appropriate IP address and subnet mask.
D. Disable Automatic Private IP Addressing (APIPA) on Marc's computer.
Answer: C
QUESTION 47
You are the network administrator for your company. The company has a main office and a branch office. All client computers run Windows XP Professional. Computers in the main office receive their TCP/IP configuration from DHCP. TCP/IP settings are manually configured on computers in the branch office.Marc is a user who works in the main office. He uses a Windows XP Professional portable computer named Portable1. When he uses Portable1 in the main office, he is able to access resources that are located in both offices. Marc reports that when he visits the branch office and uses Portable1, he is not able to access any network resources that are located in either office. All other users in the branch office are able to access all network resources that are located in both offices. You need to ensure that Marc is able to use Portable1 to access all network resources when he is in either the main office or the branch office. You want to ensure that this goal is accomplished with the minimum amount of administrative effort, with no future
administrative action required. What should you do?
A. Enable Automatic Private IP Addressing (APIPA) on Portable1.
B. On Portable1, manually set an alternate TCP/IP configuration for the branch office subnet.
C. Configure the VPN2 server as a DHCP relay agent.
D. On Portable1, specify the address of the VPN2 server as an additional gateway address.
Answer: B
QUESTION 48
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Susan asks you to configure her computer so that she can dial in to the company network when she is out of the
office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card
authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Select the Advanced (custom settings) security option. B. Select the Require data encryption check box. C. Select the Typical (recommended settings) security option. D. Select the Use smart card item from the Validate my identity as follows list. E. Select the Maximum strength encryption item from the Data encryption list. F. Select the Allow these protocols option, and select the MS-CHAP v2 check box. G. Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.
Answer: AEG
QUESTION 49
You are the network administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional.
The company has a large number of sales representatives who need access to the company network when they travel. A Windows 2000 Server computer is configured to allow users to access the network by using a dial-up connection. Several of the sales representatives occasionally travel to rural locations that have telephone lines that use outdated technology. The sales representatives report that when they attempt to establish a dial-up connection in these locations, they receive the following error message: "The server is not responding." They cannot connect to the remote access server or to the company network. Users who travel to urban areas do not report this problem. You investigate and find out that the server is running properly, but the problem persists. The sales representatives need to be able to use the dial-up connection to access the company network. What should you do?
A. Change the flow control option in the modem properties to Xon / Xoff.
B. Disable error correction in the modem's default data connection preferences.
C. Adjust the modem's default connection speed to a lower rate.
D. Disable the first-in, first-out (FIFO) receive and transmit buffers on the modem.
Answer: C
QUESTION 50
You are a network administrator for your company. The company has a main office and a branch office. The branch office has a cable modem connection to the Internet and uses a virtual private network (VPN) connection to access resources on the main office network. The cable modem is connected to a Windows XP Professional computer named Pro1. You configure Internet Connection Sharing (ICS) on Pro1 to allow users in the branch office to use the VPN connection. ICS sets the network adapter to use the IP address 192. 168. 0. 1. Several sales representatives in the branch office use wireless network adapters to share files between their client computers. They need access to the VPN connection to upload sales reports to the main office. You install a wireless network adapter in Pro1 and configure it with the appropriate settings for the wireless LAN. The sales representatives who use the wireless LAN report that they cannot access the VPN connection. However, they are able to connect to resources in the branch office. Users on the wired network do not report any connectivity problems. The sales representatives need to be able to access the VPN. What should you do?
A. Configure the wireless network connection on Pro1 so that it has an IP address of 192. 168. 0. 2.
B. Disable and then re-enable Internet Connection Sharing (ICS) on Pro1.
C. Create a network bridge between the wired and wireless connections on Pro1.
D. Clear the Allow other network users to control or disable the shared Internet connection check box in the advanced properties
Answer: C
QUESTION 51
You are the desktop administrator for Contoso, Ltd. Philippe is a user in the accounting department. Philippe reports that he is not able to download a file from an FTP server by using Internet Explorer on his Windows XP Professional computer. When Philippe attempts to access the FTP server by using the URL ftp://ftp.contoso.com, Internet Explorer displays the following error message: "The password was rejected." Philippe informs you that he has a user name and password for the FTP server, but that Internet Explorer does not prompt him to type the user name or password. You need to ensure that Philippe can access the FTP server by using Internet Explorer on his computer. Which URL should you instruct Philippe to use?
A. ftp://ftp.contoso.com/Philippe B. ftp://Philippe:password@ftp.contoso.com C. ftp://Philippe/ftp.contoso.com D. ftp://ftp.contoso.com@Philippe:password
Answer: B
QUESTION 52
You are the desktop administrator for your company. Bruno is a user in the accounting department. Bruno uses a new Windows XP Professional computer. Bruno reports that he cannot access Web sites on the Internet by using Internet Explorer. However, he can access intranet Web sites that are located on other network subnets by using Internet Explorer. Other users on the network can successfully access Internet Web sites. You need to ensure that Bruno can access Internet Web sites by using Internet Explorer on his computer. What should you do?
A. Configure Internet Explorer on Bruno's computer to use the proxy server.
B. Configure Internet Explorer on Bruno's computer to permit SSL connections.
C. Configure TCP/IP on Bruno's computer to use 192. 168. 10. 57 as the default gateway.
D. Configure TCP/IP on Bruno's computer to use 192. 168. 10. 56 for DNS name resolution.
Answer: A
QUESTION 53
You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?
A. Start the default Web site.
B. Start the IIS Admin Service.
C. Run the IPconfig /registerdns command.
D. In the default Web site properties, disable the host header setting.
Answer: A
QUESTION 54
You are the manager of your company's Web development department. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. You install Internet Information Services (IIS) on a Windows XP Professional computer. Users in your department use the computer as a test Web server for new content that they develop. You are a member of the Administrators group on the computer, and you use Remote Desktop to perform routine administrative tasks. Several of the virtual directories on the Web server contain confidential company data. You assign NTFS and IIS permissions to the folders and files on the Web server, the default Web site, and the virtual directories, as shown in the following table.
You administer the default Web site, which contains a page that lists the Web development projects in progress. The Web page also contains links to each of the virtual directories that are hosted on the Web server. You use Microsoft FrontPage to manage the default Web site. Users in the Web development department control the permissions on their own NTFS folders and virtual directories. Occasionally, users report that the permissions on their folders and virtual directories are reset to the default values. You investigate and discover that this occurs whenever you update the default Web site. What should you do to resolve this problem?
A. In the default Web site's properties, on the Server Extensions tab, select the Manage permissions manually check box.
B. Change the NTFS permissions on the default Web site to only Allow - Read and Allow - Write.
C. Change the IIS permissions on the default Web site to only Read.
D. In the properties for each virtual directory, set the Execute Permissions option to Scripts only.
Answer: A
QUESTION 55
You are a help desk technician for your company. Michael is an employee in your company’s marketing department. Michael uses a Windows XP Professional computer that is located on Subnet A. You use a Windows XP Professional computer that is located on Subnet B. The company’s firewall does not use Network Address Translation (NAT).Michael sends you a Remote Assistance invitation. In Windows Messenger, you accept the invitation, but you cannot connect to Michael’s computer.Next, you run the Ping command, which verifies connectivity to Michael’s computer. You need to establish a Remote Assistance connection with Michael’s computer. What should you do next?
Exhibit:
A. Ask your firewall administrator to open the TCP/IP ports that are used by Windows Messenger.
B. Ask your firewall administrator to open the TCP/IP ports that are used by Remote Desktop Services.
C. Instruct Michael to create an invitation file and then e-mail the file to you as a file attachment. When you receive the e-mail,
D. Instruct Michael to edit the System properties for his computer and add your domain user account to the Remote Desktop
Answer: B
QUESTION 56
You are the help desk manager for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. All help desk technicians are members of the Help Desk Technicians group. They use Remote Assistance to remotely control user sessions to provide online support and training to users. The users currently use Windows Messenger to submit Remote Assistance invitations to the help desk technicians. You want to reduce the time required for help desk technicians to respond to Remote Assistance requests. To accomplish this goal, you want to configure the client computers to allow help desk technicians to establish a Remote Assistance session with a client computer without requiring an invitation from a user.What should you do?
A. In the Default Domain Policy, set the Remote Assistance - Solicited Remote Assistance policy setting to Disabled.
B. In the Default Domain Policy, set the Remote Assistance - Offer Remote Assistance policy setting to Enabled and add the Helpers list.
C. In each computer's Local Security Policy, grant the Help Desk Technicians group the Allow logon through Terminal Services
D. In the System properties for each computer, select the Allow users to connect remotely to this computer option, and add of allowed users.
Answer: B
QUESTION 57
You are a help desk technician for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional. The help desk technicians use Remote Assistance to remotely control user sessions to provide online support to users. The users currently use Microsoft Exchange and Microsoft Outlook to submit Remote Assistance invitations to the help desk technicians.Stephen is a user in the sales department. Stephen has a portable computer and frequently travels to customer locations. While Stephen is in the corporate office, he submits a Remote Assistance invitation to the help desk.
When you attempt to answer the invitation and establish the Remote Assistance session, you receive an error. You verify that Stephen's computer is connected to the network and that he did not cancel the invitation. You also verify that the invitation did not expire. You do not experience similar problems when establishing Remote Assistance sessions with other computers. You need to be able to establish a Remote Assistance session with Stephen's computer. What should you do?
A. Enable the Remote Desktop service definition in Internet Connection Firewall (ICF) on Stephen's computer.
B. Add your user account to the Remote Desktop Users list on Stephen's computer.
C. In the System properties of Stephen's computer, select the Allow users to connect remotely to this computer option, and users.
D. In the Local Security Policy of Stephen's computer, grant your user account the Allow logon through Terminal Services
Answer: A
QUESTION 58
You are the administrator of a Windows XP Professional computer named Pro1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Internet Connection Firewall (ICF) on Pro1.
You run an application named App1 on Pro1. App1 communicates with an online training company on the Internet. In order to display an online seminar, the training company needs to contact the App1 application at port 5800.You want to ensure that the training company can connect to the App1 application. What should you do?
A. Configure ICF to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application
B. Create a new service definition named App1. Use port 5800 as the external and internal port number.
C. Edit the %systemroot%\System32\Drivers\Etc\Services file on Pro1 to include a service definition named App1 for port
D. Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800.
Answer: B
QUESTION 59
You are a help desk technician for your company. All users have Windows XP Professional computers. Ten users run a custom application named Finance on their computers. Finance stores user passwords in a file named Passwords.ini. By default, the Passwords.ini file is stored in a folder named C:\Winnt\App1. The location and name of the file can be changed by an administrator. Each Passwords.ini file is unique. Each computer contains a single logical drive, which is drive C and is formatted as NTFS. In order to comply with a new company security policy, you need to ensure that the Passwords.ini files are encrypted. What should you do?
A. In the properties of the C:\Winnt\App1 folder, use Windows Explorer to select the option to encrypt the contents of the folder. Confirm Attributes Changes dialog box.
B. Ask a network administrator to share a new encrypted folder named PassFiles on a network server and to permit users Copy the Passwords.ini file from each computer into the PassFiles folder. On each computer, configure Finance to use folder.
C. Create a folder named C:\Files. Copy the Passwords.ini file to the C:\Files folder. In the properties of the C:\Files folder, the folder. Accept the default settings on the Confirm Attributes Changes dialog box. Configure Finance to use the C:\Files\
D. Create a folder named C:\Files. Move the Passwords.ini file to the C:\Files folder. Instruct the user of each computer to select the option to encrypt the contents of the folder. Accept the default settings on the Confirm Attributes Changes dialog C:\Files\Passwords.ini file.
Answer: D
QUESTION 60
You are the administrator of the Windows XP Professional portable computers that are used by your company's sales representatives. The computers are members of a Windows 2000 domain. A Windows 2000 Server computer named Server1 contains the sales data used by the sales representatives in a shared folder named
Data. When sales representatives travel, they use the Offline Files feature to access the files in the \\Server1\Data shared folder. You want to ensure that the offline files on the portable computers are not accessible by unauthorized persons, in the event that a portable computer is lost. What should you do?
A. Instruct the sales representatives to configure the permissions on the offline files on their portable computers to allow access
B. On Server1, configure the permissions on all files in the Data shared folder to allow access for only the sales representatives.
C. Use a Group Policy object (GPO) to enable the Encrypt the Offline Files cache option for the portable computers.
D. On the portable computers, enable encryption of the %systemroot%\CSC folder.
E. Apply this setting to the folder and files in the CSC folder.
F. On Server1, encrypt all files in the Data shared folder.
G. Add all sales representatives to the encryption details.
Answer: C
QUESTION 61
You are the desktop administrator for one of your company's branch offices. The network in the branch office contains 20 Windows XP Professional computers. Windows XP Professional was installed on the computers by using a RIS image. The computers also use a security template named Standard.inf, which you created and applied to the computers. The company's information security department releases a new security template named Corporate.inf. You are instructed to apply Corporate.inf to all 20 Windows XP Professional computers in your office. You are also instructed to make a list of all policies that are defined in Corporate.inf but that are not already enforced on the Windows XP Professional computers. You import Corporate.inf into the Security Configuration and Analysis console on your Windows XP Professional computer.You need to document the security policies that will be enforced for the first time when Corporate.inf is applied to the computers in your office. Which policies should you document?
A. the policies that are displayed with an X or an exclamation point in the analysis
B. the policies that are displayed with a check mark in the analysis
C. the policies that are displayed as Enabled in the Computer Setting column
D. the policies that are displayed as Disabled in the Computer Setting column
Answer: A
QUESTION 62
You are the desktop administrator for Contoso, Ltd. The company's network contains 1,000 Windows XP Professional computers, which are members of a single Active Directory domain. The computers' hard disks are formatted as NTFS. The company's software developers release a new custom application. The application uses a .dll file named AppLib.dll, which is installed in a folder named \Program Files\Contoso\OpsApp. The company's help desk technicians report that several users experience problems when they use the application because the AppLib.dll file was deleted on their client computers. The company's software developers recommend
that you modify the file permissions on AppLib.dll so that users have only Read permission on the file. You need to ensure that all users have only Read permission on the AppLib.dll file on all 1,000 Windows XP Professional computers. What should you do?
A. Write a logon script that moves the AppLib.dll file into the %systemroot%\System32 folder. Ensure that Windows File Protection Professional computers. Apply the logon script to all domain user accounts.
B. Use the Security Configuration and Analysis console to create a new security template that modifies the file permissions Group Policy to import and apply the template to all 1,000 Windows XP Professional computers.
C. Repackage the customer application in a Windows Installer package. Ask a domain administrator to create a Group Policy to all domain user accounts.
D. Write a Microsoft Visual Basic Scripting Edition (VBScript) file named Modify.vbs that modifies the file permissions on AppLib.employees and instruct them to double click the file in order to run it.
Answer: B
QUESTION 63
You are the desktop administrator for your company. The company's network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers. The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named
NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers. What should you do?
A. Use the Security Configuration and Analysis console to export a template named NewSec.inf from NewSec.sdb. Copy NewSec.
B. Write a logon script that copies NewSec.sdb to the %systemroot%\System32 folder on each client computer.
C. Copy NewSec.sdb to the Netlogon shared folder on each domain controller.
D. Write a logon script that runs the Secedit /configure /db \\Server1\Sec\NewSec.sdb command. Apply the logon script.
Answer: D
QUESTION 64
You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy.What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Run the Secedit /configure /db C:\NewSec.sdb command.
B. Run the Secedit /refreshpolicy machine_policy command.
C. Copy NewSec.inf to the C:\Windows\Inf folder.
D. Copy NewSec.sdb to the C:\Windows\System32\Microsoft\Protect folder.
E. Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation.
F. Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.
Answer: AE
QUESTION 65
You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?
A. Run the Secedit.exe command in validation mode and specify the new security template.
B. Run the Secedit.exe command in configuration mode and specify the new security template.
C. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform
D. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform
Answer: C
QUESTION 66
You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network
administrator has told them that a domain controller is not available.As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers?
A. Enable the Require domain controller to unlock policy.
B. Set the Number of previous logons to cache policy to 0.
C. Remove all user and group accounts from the Log on locally user right.
D. Remove all user and group accounts from the Access this computer from the network user right.
Answer: B
QUESTION 67
You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files. What should you do?
A. Reset Stephen's password and instruct Stephen to log on with the new password.
B. Reset Stephen's password and then use the password reset disk. Instruct Stephen to log on with his previous password.
C. Instruct Stephen to use the password reset disk to set a new password on his account.
D. Use the Forgotten Password Wizard to create a new password reset disk for Stephen. Use this disk to set a new password on Stephen's account.
Answer: C
QUESTION 68
You are the administrator of 10 Windows XP Professional computers for your company. The computers are members of a Windows 2000 domain. Because the computers are used in a public area in the cafeteria, you audit all security events on the computers. A user named Marc reports that he was using one of the Windows XP Professional computers when the computer suddenly shut down with a STOP error. When the computer restarted, Marc attempted to log on by using the same user name and password that he used before. Marc received the following error message: "Your account is configured to prevent you from using this computer. Please try another computer." Marc states that he did not do anything to cause the STOP error to occur. You want to ensure that Marc can use this computer. What should you do?
A. On the computer, save and clear the security log, set the CrashOnAuditFail setting to 1, and restart the computer.
B. On the computer, modify the local audit policy so that system events are not audited, set the CrashOnCtrlScroll setting
C. In the domain, modify Marc's Logon Workstations list to include the name of the computer.
D. In the domain, modify Marc's account properties to unlock the account.
Answer: A
QUESTION 69
You are a help desk technician for your company. All users have Windows XP Professional computers.A user named Richard reports that he cannot access www.southridgevideo.com, an Internet Web site, by using Internet Explorer. Whenever Richard types http://www.southridgevideo.com into the Internet Explorer address bar, he receives the following error message: “Your security settings prohibit the display of unsigned ActiveX Controls.” According to company policy, users should download unsigned ActiveX controls only from Internet Web sites that have been approved by the company’s information security department.You verify that www.southridgevideo.com is listed as an approved Web site. On Richard’s computer, you also verify that Internet Explorer is configured with the default settings. You need to ensure that Richard can access www.southridgevideo.com without receiving an error message. You also want to comply with company policy. You need to configure Richard’s computer. First, you open the Security properties for Internet Explorer on Richard’s computer.Which two actions should you perform next? (Each correct answer presents part of the solution. Choose two.)
A. Add www.southridgevideo.com to the Trusted Sites list.
B. Remove www.southridgevideo.com from the Restricted Sites list.
C. In the Internet zone settings, enable the Allow unsigned ActiveX controls option.
D. Open the Local intranet Sites dialog box and clear the Include all network paths check box.
E. Open the Trusted Sites dialog box and clear the Require server verification for all sites in this zone check box.
F. Open the Intranet Sites dialog box. In Advanced properties, add www.southridgevideo.com to the list of Web sites.
Answer: AE
QUESTION 70
You plan to install Windows XP Professional on a new computer. The computer has only one hard disk drive. The hard disk drive is connected to an onboard SCSI controller. During the text-mode phase of the Windows XP Professional installation, you receive the following error message: “Setup did not find any hard disk drives installed in your computer.” You need to ensure that Windows XP Professional can be installed on the computer. What should you do?
A. Restart the installation from the Windows XP Professional installation CD. Select F5 during the text-mode phase
B. Restart the installation from the Windows XP Professional installation CD. Select F6 during the text-mode phase.
C. Restart the computer from a MS-DOS-based startup disk, and then run fdisk.exe /mbr. Restart the installation
D. Disable the onboard SCSI controller in the BIOS, and then restart the installation from the Windows XP Professional installation phase. Insert the drivers for the onboard SCSI controller.
Answer: B
QUESTION 71
You plan to install Windows XP Professional on a new computer.You have an answer file named
unattend.txt and a uniqueness database file named unattend.udb. Unattend.udb contains a section for a computer named Computer1. You copy the Windows XP Professional source files, unattend.txt, and unattend.udb to a network share named Source. You start the new computer by using a network startup disk, and then map X: to the Source share. You need to start an unattended installation of Windows XP Professional on Computer1. What should you run?
A. setupmgr.exe /m:computer1
B. sysprep.exe /t:s:\computer1
C. Winnt.exe /unattend:unattend.txt /udf:computer1, unattend.udb /s:x:
D. Winnt32. exe /unattend:unattend.txt /udf:computer1, unattend.udb /s:x:
Answer: C
QUESTION 72
You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional.
You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete.
What should you do?
A. Add a [GuiUnattend] section to unattend.txt.
B. Include a [GuiRunOnce] section in unattend.txt.
C. Create an unattend.bat file. Place the file in the root of the installation source files.
D. Create a registry file named setup.reg. Place the file in the root of the installation source files.
Answer: B
QUESTION 73
You plan to deploy Windows XP Professional on 100 client computers. You need to create an answer file for a Sysprep setup. What should you do from the Windows XP Professional installation CD?
A. Extract support.cab, and then run rsdir.exe.
B. Extract deploy.cab, and then run sysprep.exe.
C. Extract support.cab, and then run windiff.exe.
D. Extract deploy.cab, and then run setupmgr.exe
Answer: D
QUESTION 74
You plan to upgrade a computer that runs Windows 2000 to Windows XP Professional. You need to verify that the applications currently installed on the computer will run after the upgrade. What should you do before you start the Windows XP Professional installation?
A. From the Windows XP Professional source files, run winnt.exe /u.
B. From the Windows XP Professional source files, run Winnt32 /checkupgradeonly.
C. Review the Windows Hardware Compatibility List on the Microsoft Web site.
D. Start the computer from the Windows XP Professional installation CD. When prompted, press F6.
Answer: B
QUESTION 75
You need to upgrade a computer that runs Windows 2000 to Windows XP Professional. The solution must maintain all current user and application configuration settings. What should you do?
A. From Windows 2000, run winnt.exe.
B. From Windows 2000, run winnt32. exe.
C. Start the computer from the Windows XP Professional installation CD.
D. Download the Windows XP Setup Boot Disks for Windows XP Professional from the Microsoft Web site. Start the computer by using the startup disks.
Answer: B
:
QUESTION 76
A user has a computer that runs Windows 2000 Professional. The user plans to upgrade the computer to Windows XP Professional. You need to instruct the user how to perform the upgrade. You must ensure that the user is only prompted to enter the Window XP product ID during the installation. Which command should you instruct the user to run?
A. sysprep.exe -nosidgen
B. sysprep.exe -reseal
C. winnt32 /duprepare
D. winnt32. exe /unattend
Answer: D
QUESTION 77
You have a computer that runs Windows XP Professional. The computer is configured as a Simple Network Management Protocol (SNMP) agent and is monitored by an SNMP management server. You install Windows XP Professional Service Pack 2 (SP2) and Windows Defender on the computer. You discover that the SNMP management server can no longer collect SNMP data from the computer. You need to ensure that the SNMP management server can collect data from the Windows XP Professional computer. What should you do?
A. Reinstall the SNMP.
B. Perform a Windows Update.
C. Uninstall Windows Defender.
D. Create an exception in Windows Firewall.
Answer: D
QUESTION 78
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). You need to configure the computer so that Windows updates are downloaded nightly. You must prevent the updates from being installed automatically. What should you do?
A. Modify Automatic Updates.
B. Install and configure Windows Defender.
C. Create a scheduled task that runs gpupdate.exe /sync.
D. Create a scheduled task that runs winnt32. exe /duprepare.
Answer: A
QUESTION 79
You have 20 computers that run Windows XP Professional. You need to configure the computers to use your company’s internal Windows Server Update Services (WSUS) server. What should you do?
A. Create a scheduled task that runs wuauclt.exe.
B. Modify the Automatic Updates settings from Control Panel.
C. Modify the Automatic Updates settings in the Local Computer Policy.
D. Connect to the Windows Update Web site and select Change settings.
Answer: C
QUESTION 80
You have a stand-alone computer that runs Windows XP Professional. Five users use the computer. Each user has a local user account. The user accounts are member of only the Users group. You need to share a document between all users of the computer. What should you do?
A. Copy the file to the Shared Documents folder.
B. Copy the file to the My Documents folder of the local administrator.
C. Copy the file to the %SystemRoot%\CSC folder. Add all user accounts to the guests group.
D. Enable Offline File and Folder Caching. Copy the file to the %SystemRoot%\CSC folder.
Answer: A
QUESTION 81
You have a computer that runs Windows XP Professional. The computer is part of a workgroup. You need to configure advanced NTFS permissions on a folder stored on the computer. What should you do first?
A. Run cipher.exe.
B. Disable simple file sharing.
C. Enable folder encryption for the folder.
D. Request that an administrator adds your user account to the local Power Users group.
Answer: B
QUESTION 82
You share a folder named Folder1 on a computer that runs Windows XP Professional. Users report that they cannot access the folder from other computers on the network. You verify that all users can access Folder1 when logged on to the computer. You need to ensure that all users can access Folder1 from the network.
What should you do?
A. On Folder1, modify the share permissions.
B. On Folder1, modify the NTFS permissions.
C. Add all local user accounts to the Guests group.
D. Add all local user accounts to the Network Configuration Operators group.
Answer: A
QUESTION 83
You have a computer that runs Windows XP Professional. The computer is joined to an Active Directory domain. The domain contains a global group named Group1.
You share a folder named Folder1 on the computer. You modify the NTFS permissions on Folder1 to assign Full Control to Group1. Users from Group1 report that they are unable to add files to Folder1 from the network. You need to ensure that members of Group1 can add files to Folder1 from the network. What should you do?
A. Add Group1 to the Power Users group.
B. Add Group1 to the HelpServicesGroup.
C. Modify the share permissions on Folder1.
D. Enable simple file sharing and modify the NTFS permissions on Folder1.
Answer: C
:
QUESTION 84
You have a computer that runs Windows XP Professional. Many users share the computer. You install a local print device on the computer. You need to ensure that only members of a local group named Engineering can print documents to the local print device. Which settings should you modify on the printer?
A. port
B. priority
C. security
D. share
Answer: C
QUESTION 85
You have a computer that runs Windows XP Professional. The computer is a member of an Active Directory domain. A server administrator installs and shares a new printer on a server that runs Windows Server 2003. You need to configure the computer to print to the new printer. What should you do?
A. From the computer, install a local printer.
B. From the computer, install a network printer.
C. From the Active Directory domain, add the computer account for the Windows XP Professional computer to the Print Operators
D. From the Windows Server 2003 server, add the computer account for the Windows XP Professional computer to the Print
Answer: B
QUESTION 86
You have two computers named Computer1 and Computer2 that run Windows XP Professional. A local printer is connected to Computer1. From Computer1, you establish a Remote Desktop Connection to Computer2. You discover that there are no printers available from within the Remote Desktop Connection. The event log on Computer 2 displays the following event:
Source: TermServDevices
ID: 1111
Description: Driver Printer 1000 required for printer Printer 1000 is unknown. Contact the administrator to install the driver before you log on again.
You need to ensure that you can send a print job to the print device connected to Computer1 from the Remote Desktop Connection. What should you do?
A. On Computer1, reinstall the printer.
B. On Computer1, run mstsc /console, and then connect to Computer2.
C. On Computer2, install the driver from the print device manufacturer.
D. On Computer1, disable printers in the Remote Desktop Connection configuration.
Answer: C
:
QUESTION 87
You have a FAT32-formatted volume. You need to enable file-level security on the volume. The solution must maintain all files on the volume. What should you do?
A. Run the sfc.exe command-line tool.
B. Run the convert.exe command-line tool.
C. From Disk Management, format the volume and select the NTFS file system.
D. From Disk Management, upgrade the disk that contains the volume to a dynamic disk.
Answer: B
:
QUESTION 88
You have a computer that runs Windows XP Professional. The computer has a limited amount of free disk space. You need to identify the amount of disk space that is used to store the following:
·Temporary Internet Files
·Files in the Recycle Bin
·Downloaded program files
What should you do?
A. From the command prompt, run chkdsk.exe.
B. From the System Tools menu, run Disk Cleanup.
C. From Internet Explorer, view the Internet Options.
D. From System Properties, view the User Profiles settings.
Answer: B
QUESTION 89
You have a portable computer and a desktop computer that both run Windows XP Professional. Both computers are members of a domain named Contoso. The desktop computer hosts a shared folder named Share1. You need to ensure that all files in the Share1 folder are automatically available on the portable computer when the computer is disconnected from the network. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From the portable computer, enable offline files.
B. From the portable computer, modify the properties of the Shared Documents folder.
C. From the desktop computer, enable simple file sharing.
D. From the desktop computer, modify the properties of Share1.
Answer: AD
QUESTION 90
You have a portable computer that runs Windows XP Professional. When the computer is disconnected from the network, you receive a message in the notification area that says you are working offline. The message reappears every hour. You need to prevent the message from appearing while you are working offline. What should you modify?
A. Disk Quota settings
B. My Documents properties
C. Offline Files properties
D. Synchronization settings
Answer: C
QUESTION 91
You perform a clean installation of Windows XP Professional on a computer. The computer is a member of a workgroup. You need to enable offline files on the computer. What should you do first?
A. Disable Fast User Switching.
B. Run the Accessibility Wizard.
C. Set the Startup type of the Volume Shadow Copy Service (VSS) to Automatic.
D. Set the Startup type of the Network Location Awareness (NLA) service to Automatic.
Answer: A
:
QUESTION 92
You have a USB drive. You connect the drive to a computer that runs Windows XP Professional Service Pack 2 (SP2). You discover that after 15 minutes, the USB drive fails to appear in My Computer. You need to ensure that the USB drive appears in My Computer. What should you do?
A. At the command prompt, run defrag.exe -f. B. At the command prompt, run chkdsk.exe /f. C. From Disk Management, assign a drive letter to the USB drive. D. Delete the usbui.dll file from the computer, and then restart the computer.
Answer: C
:
QUESTION 93
You have a computer that runs Windows XP Professional. The computer has multiple FAT32- formatted You install a new disk drive. You create a new FAT32-formatted partition in the new disk drive. You need to mount the new partition as a folder in drive C.What should you do?
A. Convert the C partition to NTFS. From Disk Management, modify the drive path of the new partition. B. Convert the new partition to NTFS. From Disk Management, modify the drive path of the C partition. C. Upgrade all disks to dynamic disks. From Diskpart, set the new partition as Active. Add an entry to the boot.ini file. D. Upgrade all disks to dynamic disks. From Diskpart, clear all configuration information for the new disk. Add an entry to the Answer: A
QUESTION 94
You have a computer that runs Windows XP Professional. You replace the video graphics adapter in the computer and restart the computer. You discover that the hardware acceleration features of the video graphics card fail to function. You verify that the new video graphics adapter is certified for Windows XP Professional.
You need to ensure that the hardware acceleration features of the video card function. What should you do?
A. At the command prompt, run sigverif.exe.
B. Install the most up-to-date driver for the video graphics adapter.
C. Restart the computer in Safe Mode. Copy a new version of the vga.dll file to the computer.
D. Restart the computer in VGA Mode. Copy a new version of the vga.dll file to the computer.
Answer: B
QUESTION 95
You connect an external monitor to a portable computer. You need to increase the available desktop area to include the external monitor. What should you do?
A. From the Display properties, extend the display.
B. From the Display properties, modify the resolution settings.
C. Restart the computer in VGA Mode. Run dxdiag.exe.
D. Restart the computer in VGA Mode. Install the most up-to-date driver for the video graphics adapter.
Answer: A
QUESTION 96
You have a computer that runs Windows XP Professional. You download new video card driver from the Internet, and then install the driver. You restart the computer.
You discover that the newly loaded video driver is named VgaSave. You need to restore the previous version of the video card driver. What should you do?
A. From the Device Manger, scan for hardware changes.
B. From the Device Manager, access the video card properties, and then select Roll Back.
C. From the Device Manager, access the VgaSave properties, and then run the Hardware Troubleshooter. D. Restart the computer. From the Advanced Startup Options menu, select Last Known Good Configuration.
Answer: B
:
QUESTION 97
You have a computer that runs Windows XP Professional. The computer has the following hardware installed:
·3 GB page file
·2. 4 GHz processor
·2 GB of physical memory
·20 GB hard disk that has 1 GB of free space
You need to enable hibernation support on the computer. What should you do first?
A. Upgrade the processor.
B. Add additional physical memory.
C. Increase the size of the page file.
D. Create additional free hard disk space.
Answer: D
QUESTION 98
You need to enable hibernation support for a computer that runs Windows XP Professional. What should you do?
A. From Control Panel, configure the Power Options.
B. From the System properties, configure the Data Execution Prevention settings.
C. From the Services console, set the Startup type for the Human Interface Devices service to Automatic.
D. From the Services console, set the Startup type for the Uninterruptable Power Supply service to Automatic.
Answer: A
QUESTION 99
You have a portable computer that runs Windows XP Professional. The computer supports Advanced Configuration and Power Interface (ACPI). You need to ensure that the computer enters Sleep Mode when you close the lid of the computer. What should you do?
A. From Control Panel, configure the Power Options.
B. From the System properties, configure the Data Execution Prevention settings.
C. From the Services console, set the Startup type for the Human Interface Devices service to Manual.
D. From the Services console, set the Startup type for the Uninterruptable Power Supply service to Manual.
Answer: A
QUESTION 100
You have a computer that runs Windows XP Professional. You connect one local print device and install a printer. You share the printer. You need to give a user the ability to manage all new print jobs submitted to the printer. Your solution must prevent the user from installing additional local printers. What should you do?
A. In the printer properties, assign the Manage Printers permission to the user. B. In the printer properties, assign the Manage Documents permission to the user. C. From the Local Users and Groups snap-in, add the user to the Power Users group. D. From the Local Users and Groups snap-in, add the user to the Replicators group.
Answer: B
QUESTION 101
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?
A. From the Device Manager, open the wireless network adapter properties and click Advanced.
B. From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C. From the Wireless Network Connection Properties, select View Wireless Networks.
D. From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab
Answer: D
QUESTION 102
You have a computer that runs Windows XP Professional. You need to verify that all drivers installed on the computer are digitally signed by Microsoft. What should you do?
A. Review the contents of the boot.ini file.
B. Review the contents of the setup.log file
C. At the command prompt, run sigverif.exe.
D. From the Device Manager snap-in, view resources by type.
Answer: C
:
QUESTION 103
You have a computer that runs Windows XP Professional. You attempt to install a device driver for a new printer and receive the error message.
You need to ensure that you can install the device driver. What should you do?
A. Add your user account to the local Power Users group.
B. Add your user account to the local Administrators group.
C. From the Device Manager, uninstall the current display driver.
D. From the System properties, modify the Driver Signing option.
Answer: D
QUESTION 104
You have a computer that runs Windows XP Professional. You run a background application named app1. exe. The application becomes unresponsive. You need to forcibly shut down the application. You must achieve this goal without restarting the computer. Which tool should you use?
A. System Configuration Utility
B. System Information
C. Task Manager
D. tasklist.exe
Answer: C
QUESTION 105
You have a portable computer that runs Windows XP Professional Service Pack 2 (SP2).You need to configure the computer to generate an alert when only 25 percent of the battery life is available. What should you do?
A. From the Performance console, create a trace log.
B. From the Performance console, create a counter log.
C. From the Power Options, modify the Alarm Action.
D. From the Power Options, select the Minimal Power Management power scheme.
Answer: C
QUESTION 106
You have a computer that runs Windows XP Professional.You need to configure the computer to make the Recovery Console available from the Operation System Selection menu. What should you do?
A. Modify the boot.ini file, and then run sysprep.exe /reseal.
B. Run winnt32 /cmdcons from the Windows XP Professional installation CD.
C. Start the computer from the Windows XP Professional installation CD, and then start a repair installation. D. Copy the installation source files to the local hard disk drive. Add the path to the source files to the config.sys file.
Answer: B
QUESTION 107
You have a computer that runs Windows XP Professional.Normal backups are scheduled to run every Sunday at 22:00 Eastern Time. Differential backups are scheduled to run every Monday through Saturday at 22:00 Eastern Time. The computer fails on Thursday at 9:00 Eastern Time. You need to restore the computer from the backup by using the most recent data available. You must achieve this goal by using the minimum amount of administrative effort. You reinstall Windows XP Professional on the computer. What should you do next?
A. Restore Wednesday’s differential backup.
B. Restore Sunday’s normal backup. Restore Wednesday’s differential backup.
C. Restore Sunday’s normal backup. Restore Monday’s differential backup. Restore Tuesday’s differential backup.Restore
D. Restore Sunday’s normal backup. Restore Wednesday’s differential backup. Restore Tuesday’s differential backup. Restore
Answer: B
QUESTION 108
You have a computer that runs Windows XP professional. The computer contains one partition and a floppy disk drive. You connect a new USB drive.
You need to back up the computer to meet the following requirements:
·Enable a complete recovery if the hard disk fails.
·Enable an automatic restore of the operating systems.
·Automatically recreate the partitions during a restore process.
What should you do?
A. From System Restore, create a system restore point.
B. From the System Tools menu, run the Files and Settings Transfer Wizard.
C. From Windows Backup, run the Automated System Recovery (ASR) Wizard.
D. From Windows Backup, run the Backup Wizard, and then select Only backup the System State data.
Answer: C
QUESTION 109
You have a computer that runs Windows XP Professional. You need to create a floppy disk to start Windows XP Professional on the computer if the start files become
corrupt. What should you do?
A. From the Windows XP Professional computer, run diskcopy.exe /v a:.
B. From a computer that runs Windows 98, create a MS-DOS-based startup disk.
C. From the Windows XP Professional computer, create an Automated System Recovery (ASR) disk.
D. From the Windows XP Professional computer, format a floppy disk. Copy the NTLDR, ntdtetect.com, and boot.ini files
Answer: D
QUESTION 110
You have a computer that runs Windows XP Professional. You use Microsoft Outlook Express to download e-mail messages. You need to copy the e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. What should you do?
A. Copy all *.dbx files from the old computer to the new computer.
B. Establish a Remote Assistance session from the old computer to the new computer.
C. Back up the system state on the old computer. Restore the system state on the new computer.
D. Run the File and Settings Transfer Wizard on the old computer. Run the File and Settings Transfer Wizard on the new computer.
Answer: D
QUESTION 111
You have a computer that runs Windows XP Professional. Multiple users share the computer. You log on to the computer by using the local administrator account and install a custom application. You need to add an application shortcut to the desktop of all new users who use the computer. The shortcut must
appear on the desktop of new users only. What should you do?
A. Copy the shortcut to "%systemdrive%\documents and settings\default user\desktop\"
B. Copy the shortcut to "%systemdrive%\documents and settings\all users\desktop\"
C. Copy the shortcut to your desktop. Modify the %comspec% system environment variable.
D. Copy the shortcut to the guest user’s desktop. Assign the Everyone group Read permission to the guest user profile.
Answer: A
QUESTION 112
You have a computer that runs Windows XP Professional. You need to ensure that the Administrative Tools menu appears on the Start menu. What should you do?
A. Modify the Display Properties.
B. Modify the Taskbar and Start Menu Properties.
C. Switch to Classic View from Control Panel.
D. Change the desktop theme to Windows Classic.
Answer: B
:
QUESTION 113
Your network contains a computer that runs Windows XP Professional. Multiple users share the computer. You create a custom user profile on the computer.
You need to ensure that all new users of the computer receive the custom user profile. What should you do?
A. Run the Files and Settings Transfer Wizard.
B. At the command prompt, run scanstate.exe.
C. Use the Copy To function from the User Profiles settings.
D. Rename the folder that contains the custom user profile to winnt_user.
Answer: C
QUESTION 114
You have a computer that runs Windows XP Professional. Multiple users share the computer.Users work in either French or English. You need to ensure that users can change the language in which the system menus appear. What should you do first?
A. From the Display Properties, modify the Desktop settings.
B. From Internet Explorer, modify the Language Preferences.
C. From the Multilingual User Interface (MUI) pack installation CD, run muisetup.exe.
D. From Regional and Language Options, modify the Location settings and the Input Languages settings.
Answer: C
QUESTION 115
Your network contains multiple computers that run Windows XP Professional. Multiple users share the computers. You need to ensure that users can switch their keyboard layouts between multiple languages. What should you do?
A. Install the Multilingual User Interface (MUI) pack.
B. From Internet Explorer, modify the Language Preferences.
C. From the Keyboard settings, update the driver for the keyboard.
D. From Regional and Language Options, modify the Text services and input languages settings.
Answer: D
:
QUESTION 116
You have a computer that runs Windows XP Professional. You attempt to install an application by using a Windows Installer package name app1. msi. The application
installation fails. You plan to install the application again. You need to create an application installation log for the application setup. What should you do?
A. At the command prompt, run msiexec /log app1.msi /passive
B. At the command prompt, run msiexec /log app1.log /package app1.msi
C. From the Local Security Policy, enable auditing for object access, and then run app1.msi
D. From the Event Viewer, increase the size of the application log, and then run app1.msi
Answer: B
:
QUESTION 117
You network contains two domains named contoso.com and nwtraders.com. A single DNS server hosts both DNS zones. The DNS server has an IP address of 10. 10. 0. 10. You have 100 computers that run Windows XP Professional. The computers are members of the contoso.com domain. All computers have static IP addresses. The network does not contain a WINS server. You need to ensure that users can access servers in both domains by using single-label host names. What should you do on the client computers?
A. Add nwtraders.com to the DNS suffix list.
B. Add nwtraders.com to the LMHOSTS file.
C. Change the WINS server address to 10. 10. 0. 10.
D. Run ipconfig /setclassid "local area connection" nwtraders.com.
Answer: A
:
QUESTION 118
Your network contains a Web server named server1. contoso.com. All client computers on the network run Windows XP Professional. Server1. contoso.com is located in a remote site. You suspect a communication problem between a computer and server1. contoso.com. You need to view the amount of packet loss occurring on each network segment between the computer and server1. contoso.com. What should you do?
A. Repair the local area connection.
B. Review the status for the local area connection.
C. At the command prompt, run tracert server1.contoso.com.
D. At the command prompt, run pathping server1.contoso.com.
Answer: D
QUESTION 119
You network contains a Web site named www.contoso.com.Your user account has write permissions to the c:\inetpub\wwwroot folder on the Web server. You need to copy files to www.contoso.com. What should you do first?
A. From the command prompt, run ftp www.contoso.com.
B. From the command prompt, run http \\www.contoso.com\web$.
C. In the Address bar in Internet Explorer, type https://www.contoso.com/webdav.
D. From the File menu in Internet Explorer, click Open. Type http://www.contoso.com and select the Open as Web Folder
Answer: D
QUESTION 120
You network contains 500 computers. You have a computer that runs Windows XP Professional. The computer is used to perform application testing and has Internet Information Services (IIS) installed. The computer has a group named Developers. You need to ensure that only the members of the Developers group can access the Web site. Which two configuration changes should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Modify the properties of the Developers group.
B. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder.
C. From the properties of the default Web site, assign an SSL certificate.
D. From the properties of the default Web site, modify the Authentication Methods.
Answer: BD
QUESTION 121
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). A remote user has a computer that runs Windows XP Professional SP2. The remote user experiences several errors while attempting to install an application. You need to remotely observe the actions the user performs. What should you do first?
A. Instruct the user to send you a Remote Assistance invitation.
B. Instruct the user to start the Remote Desktop Help Session Manager service.
C. At the command prompt, establish a telnet session to the user's computer.
D. Enable a Remote Desktop and establish a Remote Desktop Connection. Log on by using the local administrator account.
Answer: A
QUESTION 122
A user has a computer that runs Windows XP Professional. The user attempts to connect to the computer by using a Remote Desktop Connection and receives the following error message: “The local policy of the system does not permit you to log on interactively.” You need to ensure that the user can log on to the computer by using a Remote Desktop Connection. What should you do?
A. From the System settings, disable Remote Assistance.
B. Add the user's account to the Remote Desktop Users group.
C. From Windows Firewall, modify the scope of the Remote Desktop exception.
D. Set the Remote Desktop Help Session Manager service Startup type to Automatic, and then start the service.
Answer: B
QUESTION 123
You have two computers named Computer1 and Computer2. The computers run Windows XP Professional and are joined to an Active Directory domain. Computer1 contains the recovery agent certificate for the domain. A domain user named User1 encrypts files on Computer2 in a folder named C:\User1. The user leaves the
company and the administrator deletes User1’s account. You need to decrypt the files encrypted by User1. What should you do?
A. Log on to Computer2 by using the domain administrator account. At the command prompt, run cipher.exe /u c:\user1\*.*.
B. Create a new domain user account named User1. Log on to Computer2 as User1. Modify the properties of the encrypted
C. Remove Computer2 from the domain. Log on to Computer2 by using the local administrator account. Modify the properties
D. Back up the encrypted files on Computer2. Restore the files on Computer1. Log on to Computer1 by using the recovery the encrypted files.
Answer: D
QUESTION 124
You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer.
User1 encrypts a file named file1. doc. You need ensure that both User1 and User2 can view the contents of file1. doc. What should you instruct User1 to do?
A. Add the certificate of User2 to file1. doc.
B. Assign User2 the Full Control NTFS permission on file1. doc.
C. Copy file1. doc the %systemroot%\documents and settings\all users\ folder.
D. Move file1. doc to the %systemroot%\documents and settings\all users\ folder.
Answer: A
QUESTION 125
A user named User1 has a computer named Computer1 that runs Windows XP Professional. User1 has a folder that contains encrypted files. You purchase a new computer named Computer2. You back up User1's files and restore them to Computer2. You need to ensure that User1 can access the encrypted files on Computer2.
What should you do?
A. Instruct User1 to create a new user certificate on Computer2.
B. Instruct User1 to take ownership of the encrypted files on Computer2.
C. Instruct User1 to import the user certificate from Computer1 to Computer2.
D. Log on to Computer2 by using the local administrator account. Configure User1 as the recovery agent account.
Answer: C
:
QUESTION 126
You have a computer named Computer1 that runs Windows XP Professional. Computer1 is a member of a workgroup. You need to prevent all users from encrypting files on Computer1. What should you do?
A. For all files, deny the Take ownership permission to the Everyone group.
B. From the Local Security Policy, modify the Encrypting File System (EFS) properties.
C. From the Certificates snap-in, delete the recovery agent certificate.
D. From the Certificates snap-in, delete all trusted root certification authority (CA) certificates.
Answer: B
QUESTION 127
You have a computer that runs Windows XP Professional. Five users share the computer. A user named User1 is a member of the Power Users group and the Administrators group. User1 has encrypted files on the computer.User1 takes an extended leave of absence. You need to ensure that users cannot access the computer as User1. You must be able to provide User1 access to the files upon User1’s return. What should you do?
A. Disable the User1 account.
B. Add User1 to the Guests group.
C. Reset the password for the User1 account.
D. Rename ntuser.dat as ntuser.man in the User1 user profile.
Answer: A
QUESTION 128
A user named User1 uses a computer that runs Windows XP Professional. You need to enable User1 to create local user accounts. You must minimize the rights assigned to the User1 account. Which group should you add User1 to?
A. Administrators
B. Power Users
C. Users
D. Network Configuration Operators
Answer: B
:
QUESTION 129
You network contains a server named Server1. You have a computer named Computer1 that runs Windows XP Professional. Employees log on to Computer1 by using local user accounts. You need to configure the user profiles on Computer1 to be stored on Server1. What should you do?
A. On Computer1, map a drive to an administrative share on Server1. Configure each user's profile path to point to the mapped
B. Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's profile
C. Create a shared folder on Server1. Assign Full Control permissions to all users. On Computer1, configure each user's home
folder.
D. On Computer1, map a drive from each client computer to an administrative share on Server1. Configure each user's home
Answer: B
:
QUESTION 130
Your network contains a stand-alone certification authority (CA) and a Web server. The Web server hosts a secure Web site. The Web site uses a server certificate that was issued from the CA. Users report that they receive a certificate warning message when they connect to the Web site. You need to prevent users from receiving the certificate warning message when they connect to the Web site. What should you do from the Internet Options in Internet Explorer?
A. Import the CA certificate to the trusted root CA certificate store.
B. Import the server authentication certificate to the trusted publishers certificate store.
C. Clear the Check for publisher's certificate revocation check box.
D. Clear the Require server verification (https:) for all sites in this zone check box for the Trusted sites zone.
Answer: A
QUESTION 131
You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site.What should you do?
A. Add an entry to the Lmhosts file.
B. From the local area connection, add a DNS suffix.
C. From Internet Explorer, modify the Privacy settings.
D. From Internet Explorer, modify the Manage Add-ons settings.
Answer: C
QUESTION 132
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account.
What should you do next?
A. Modify the Internet Explorer Pop-up Blocker settings.
B. Move all URLs from the local Web servers to the Internet Explorer Favorites list.
C. From the Local Computer Policy, modify the User Configuration settings.
D. From the Local Computer Policy, modify the Computer Configuration settings.
Answer: A
QUESTION 133
You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?
A. Run ipconfig /flushdns at the command prompt.
B. Reset the password for the local administrator user account.
C. From the Internet Options in Internet Explorer, clear the AutoComplete history.
D. From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
Answer: C
Subscribe to:
Posts (Atom)