70 270 q & a

321
Piratez 70-270 Q & A 431 Questions covering all exam objectives. 57 on Installation. 87 on Administration of resources. 74 on Hardware devices & drivers. 60 On System optimization. 31 On Desktop Environment. 75 On Network Protocols & services. 47 On Security. With How to register for an exam. Exam Objectives. Exam FAQs. Exam Retaking Hints & Tips.

Upload: samaja

Post on 25-Jun-2015

268 views

Category:

Education


2 download

DESCRIPTION

Microsoft Xp Exam MCP 70-270 Q & A

TRANSCRIPT

Page 1: 70 270 q & a

Pir

ate

z

70

-27

0 Q

& A

431 Questions covering all exam objectives.

57 on Installation. 87 on Administration of resources. 74 on Hardware devices & drivers. 60 On System optimization. 31 On Desktop Environment. 75 On Network Protocols & services. 47 On Security.

With

How to register for an exam. Exam Objectives. Exam FAQs. Exam Retaking Hints & Tips.

Page 2: 70 270 q & a

From Piratez

Thank you for your interest in this release. This book was written using Testout study guide CDs so the content doesn’t express the idea of Piratez. So if you find any problem don’t contact us ; but www.testout.com . This product is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. This is freely distributable and available for use by anyone, without restrictions. With this there is no need to worry about piracy. We encourage you to make as many copies as you like and to give them to your friends and colleagues. Everyone is permitted to copy and distribute verbatim copies of this document, but changing it is not allowed. You are under no moral or legal obligation to pay anyone for this right to use this. Wish you all the best for your 70-270 exam !

-Piratez

Page 3: 70 270 q & a

Exam FAQs

Exam FAQs

Click the questions for information about registering for an exam, taking the exam, and much more.

Where do I take an exam? What do I take with me to the exam? What specific information do I need to know to pass the exam? What's an adaptive test? How does the exam work? What types of questions will I be asked? How many questions are on an exam, and how long do I have to complete it? How soon after I take the exam will I know whether I've passed it? I didn't pass the exam. What do I do now? Can I retake the exam?

Where Do I Take an Exam?

When you contact Prometric or Pearson VUE, ask the customer service representative for a list of locations near you. You can also find testing locations on the Web at http://www.prometric.com for Prometric, or at http://www.vue.com/ for Pearson VUE.

Back to top

What Do I Take With Me to the Exam?

You will need two forms of identification, one with a picture. For example, you could use a driver's license and a credit card. Be sure to arrive on time. Prometric recommends that you come 20 minutes early. You will be given a pen and scratch paper to use during the exam. Notes or other reference materials are not allowed inside the testing center.

Back to top

What Specific Information Do I Need to Know to Pass the Exam?

People often ask, "What's on the exam?" This course and its posttest help you understand the concepts and tasks necessary to do your job. However, we highly recommend that you use the TestOut Exam Simulation in order to prepare for the certification exam.

While it does not include the exact questions, our TestOut Exam Simulation software can give you a good idea of the types of questions you will see on each certification exam. The test objectives for an exam are listed on the Report screen of the TestOut Exam Simulation software. These objectives outline the skills being measured by an exam. You must understand the material relating to each objective. The TestOut Exam Simulation software is designed to test your knowledge in these areas, and to focus your studies for the exam.

Back to top

What's an Adaptive Test?

Some exams you might take will be in an adaptive format. An adaptive test begins by giving you an easy-to-moderate question. If you answer the question correctly, it gives you a more difficult question. With each correct answer, the difficulty of the questions increases. On the other hand, if you answer the second question incorrectly, the next questions will be easier. The test changes the question difficulty until it determines your skill level.

There are two primary characteristics you will notice as you take an adaptive exam.

You cannot skip questions or review previously answered questions. This means you need to take a little more time to answer each question carefully before going on to the next question. (Adaptive exams display a warning screen at the beginning of the exam stating that you will not be allowed to review previous questions.) The tests are typically shorter than the traditional exams. (The current adaptive exams range between 15 and 35 questions.)

The TestOut Exam Simulation is not an adaptive test. However, because the content of the objectives for an exam are more comprehensive than any single adaptive test, the Exam Simulation is still the best way to prepare for taking the certification exam. Adaptive tests are too short to give you a thorough review and the chance to practice taking the test. You need to understand all of the questions before you take the actual test.

Page 4: 70 270 q & a

Back to top

How Does the Exam Work?

Certification exams are all computer based. After entering your testing ID and selecting the test you want to take, you will have the chance to view a tutorial on the exam software. Time spent reviewing the tutorial does not count towards the time you have to take the exam.

After starting an adaptive exam, you cannot go back to exam questions that you skipped, so answer each question. Some tests may be available in both adaptive and traditional versions.

Back to top

What Types of Questions Will I Be Asked?

Exam question types depend on the organization that publishes the exam. Common exam question types include the following:

Multiple-choice, single-select (one correct answer) Multiple-choice, multiple-select (several correct answers) Fill-in-the-blank Case-study questions (read a case study and answer questions) Hot-spot question (click the correct place on a graphic) Simulation (perform the task) Select-and-place question (drag elements to place them)

Case-study questions present a detailed case study, then ask you to design, configure, or answer questions based on that information. They include a tree view, as well as questions that ask you to select and connect elements, or place elements in the correct order.

Hot-spot questions require you to examine one or more graphics or exhibits and click the graphic to indicate your response.

The majority of questions will be multiple-choice questions. If more than one answer is required for a single question, you will be told either to select a number of answers or to select all that apply. Occasionally, you will be asked to click a specific area of a graphic to indicate your answer.

A scenario question presents a scenario problem, requirements, and a solution, then asks you to determine and indicate which requirements the solution fulfills.

Simulation questions require you to perform actual configuration tasks in a simulated interface. Be sure to stop and restart IIS services when you configure them.

Select-and-place questions ask you to drag elements to their appropriate places on a graphic or table.

Our TestOut Exam Simulation software is designed to give you a feel for the actual exam interface.

Back to top

How Many Questions Are on an Exam and How Long Do I Have to Complete It?

The number of questions on the exam and the time limit depend on which test you are taking, and which format it is in. For up to date information, check the vendor Web site for the exam you want to take.

A traditional, nonadaptive certification exam contains about 50-65 questions and allows you 90 minutes to complete the exam. A short-form traditional certification exam contains about 30 questions, and allows you 60 minutes to complete the exam. An adaptive exam contains between 15-35 questions, and has varying time limits. A case study exam contains about four case studies with about 10 questions each. You usually have between three and four hours to complete the exam.

Back to top

Exam FAQs

Page 5: 70 270 q & a

How Soon After I Take the Exam Will I Know Whether I've Passed It?

As soon as you have answered all of the questions, select Finish Test to end the test. The testing program provides immediate feedback (it just feels like a thousand years) and automatically prints a report showing the required passing score and your score on the exam. Before leaving the testing center, be sure to pick up your exam report and have it validated by a Prometric or Pearson VUE representative. You should keep this report in case there are any discrepancies in your certification program.

Back to top

I Didn't Pass the Exam. What Do I Do Now? Can I Retake the Exam?

If you do not pass an exam the first time you take it, you may retake it at any time. Individual certifications might have varying rules about how quickly you can retake the exam. You need to pay for each exam that you take or retake.

Back to top

Exam FAQs

Page 6: 70 270 q & a

How to Register for an Exam

How Do I Register for an Exam?

Exams are scheduled through Prometric and Pearson VUE. The number you call depends on the vendor that offers the exam (i.e. Microsoft, Novell, CompTIA, or Cisco). To register for a certification exam, call the number in the table that corresponds to the certification you want to receive.

Inform the customer service representative that you need to register for an exam, and then supply the exam name and/or number. The customer service representative will ask you for the following information when you register:

ID number (This is usually your Social Security Number.) Mailing address and telephone number E-mail address Organization or company name Method of payment (credit card number or check). Payment must be made in advance. Exams are $125 per exam at the time of this writing. Certification exam prices are subject to change. Please contact your local testing center for exact pricing.

Other important registration and cancellation information:

At the testing center, you must accept the terms of a non-disclosure agreement before you take your certification exam. You must also complete a brief demographic survey. You can schedule exams up to six weeks in advance or just one working day before the exam date. Be aware that the testing centers may be busy, so it is best to call for scheduling a few days before you want to take an exam. Same-day registration may be possible in some locations, if space is available. You must register at least 30 minutes before test time. You can cancel or reschedule your exam, but you must contact the testing vendor at least one working day before the exam. If you cancel, the exam must be taken within one year of payment. You may receive a full refund at any time after registration and before taking an exam. No refunds are given after you have taken an exam.

Certification Provider Phone NumberMicrosoft Prometric

Pearson VUE(800) 755-3926 (800) 837-8734

CompTIA A+ Prometric Pearson VUE

(800) 77-MICRO (64276) (877) 551-PLUS (7587)

CompTIA Network+ Prometric Pearson VUE

(888) 895-6116 (877) 551-PLUS (7587)

CompTIA Security+ Prometric Pearson VUE

(800) 977-EXAM (3926) (877) 551-PLUS (7587)

Novell Prometric Pearson VUE

(800) RED-EXAM (733-3926)(800) TEST-CNE (837-8263)

Cisco Prometric Pearson VUE

(800) 204-EXAM (3926) (877) 404-EXAM (3926)

Page 7: 70 270 q & a

Hacked by Piratez 70-270

Exam-taking Hints and Tips

Follow these hints to make your exam experience less stressful and more successful.

Before the Exam

Print out the review module included in the course materials, or prepare a short review sheet for the exam. It should contain reference tables and information that you have trouble remembering. Shortly before you start the exam, study your notes for a last-minute review. Your notes should include specific details, such as subnet charts for TCP/IP or predefined groups in Windows 2000. You can also print out the text from the review module of this course for a longer summary of the items covered on the exam. Arrive 10 to 15 minutes early, and relax for a few minutes before the exam. Take a deep breath. Look at the review sheet one last time. You will make fewer mistakes if you are not tense and rushed. Before the actual exam begins, you will have the option to take an orientation exam to familiarize yourself with the actual exam program. Take the orientation before you take your first exam. The time you spend on the orientation exam does not count toward the actual test time. If you have any questions, ask the exam administrator before the exam begins. The exams are timed, so don't use any of your test time asking questions that you could have asked earlier.

During the Exam

When answering a question you are not sure of, eliminate the obviously incorrect answers first. Eliminating the obvious makes it easier for you to try to select the correct answer, and increases your chances of selecting the correct answer if you have to guess. If you simply don't know, guess! Be sure you answer all the questions before you finish. Unanswered questions are wrong and scored as incorrect answers. If you are unsure of an answer, make an educated guess. There is no extra penalty for incorrect answers. If you have time, review your answers before going on to the next question. A word of caution: be absolutely sure before you change an answer! If you are positive that your answer is wrong, change it. But if you are not sure and cannot explain to yourself why you need to change an answer, leave it. Most of the time, your first instinct is correct.

Note: Remember, with an adaptive test, you cannot skip questions or go back to review previous questions. This means you will need to take the time to thoroughly read and understand each question. However, adaptive tests are also shorter, so you do not have to worry as much about running out of time.

Use Your Scratch Paper

You will be given scratch paper and a pen to use during the exam. Some testing centers provide paper and a pencil. Some provide laminated paper and an erasable marker. Right after you start the exam, write down anything that could be a useful reference during the exam. This is the time to remember what you studied on your review sheet. The information on the review sheet should be fresh in your mind because you just did a quick review. Write lists, reference tables, and any other vital information on the paper. (Don't spend a lot of time here--just a minute or two writing down reference material.) The list of information will save you time as you answer the questions. Use the paper to draw out permissions, domain diagrams, subnet masks, and so forth. A question may be easier to answer after you see a diagram.

Case Studies

Case studies are more complex than scenario questions. With case studies, you are given a large case study and about 10 questions to answer regarding the case study. You can refer to the case study while answering questions. To help familiarize you with this type of question, applicable TestOut exams contain questions that follow this format. Here are some other tips to keep in mind.

Create an optimal test-taking environment. Flickering monitors, noise, and interruptions can cause you to lose concentration. Explain the nature of the test to the testing personnel and ask to be placed in the best seat possible. Be sure to use the restroom and eat before the exam. Case study exams may take nearly four hours. Pace yourself. Although there are only forty questions, you will probably need the entire testing time to consult the scenarios and decide your answers. Understand the way the question count works. On a 40 question exam, the question count says Question 1 of 48 and so forth. Understand that each Instructions and Case screen counts in the question total. Look first for exhibits. Before wasting time trying to diagram what a case is trying to describe, look for an exhibit. There is not always an exhibit, but if there is one, you can save a lot of time.

Page 8: 70 270 q & a

Be conservative on your note taking. You could take a lot of unnecessary notes and waste a lot of time while reading a scenario. It might be better to read the scenario through, get oriented regarding where certain types of information is located, and consult the specific parts of the scenario and take more detailed notes as required to answer specific questions. That said, you should still ask for extra paper and pencils because you may need to take many notes. Consider the pros and cons of reading the questions first. Reading the questions first can give you an idea of what to look for as you read the scenarios. However, depending on the computer being used, it might take up to 6 seconds per click just to move from one question to another. Clicking Next, then Back, then Next through every question can take a fair amount of time. Also, it might be a better strategy to get an overview of the scenario. Then consult specific parts of the scenario in more detail as you read and answer each question. Consider the pros and cons of using the All tab. The All tab lists the content of all the other tabs and radio buttons in a single scrollable document. While it might be convenient to read everything in one place, it also might be harder to orient yourself to the structure of the scenario and relocate information when you need it. Consider becoming familiar with the other tabs and radio buttons so you can more quickly find information you are looking for (and decrease the use of the scroll bar). Don't worry if the scenario lacks all the details, and in fact be grateful for it. For example, if a scenario mentions that an organization has 20 buildings but only mentions subnet IDs for three of them, it is just that much useless information you need to wade through to come up with an answer for a question. In fact, it may indicate a clue regarding what to focus on. Be tolerant with ambiguity. Sometimes its hard to figure out what Microsoft is talking about. Try to tolerate the ambiguity and give it your best guess rather than spending a lot of time trying to reason through what does not seem reasonable. That said, if there is something you need to reason through, spend the time to get it right.

Exam Retakes

If you do not pass the exam, use the score report on your transcript to identify areas needing further study. As soon as possible, think carefully about the exam and make notes about the questions that you couldn't answer. Look up the correct answers in your study materials. You may get the same or similar questions the next time. Don't wait too long to retake the exam. You already know much of the material, and you may forget what you know if you wait too long.

Hacked by Piratez 70-270

Page 9: 70 270 q & a

Hacked by Piratez 70-270

Exam Objectives

Exam 70-270 Installing, Configuring, and Administering Microsoft® Windows® XP Professional

This certification exam measures your ability to implement, administer, and troubleshoot information systems that incorporate Microsoft Windows XP Professional. Before taking the exam, you should be proficient in the job skills listed below.

# Exam Objective Module-Section

100 Installing Windows XP Professional101 Perform and troubleshoot an attended installation of Windows XP Professional. 10-1

10-2102 Perform and troubleshoot an unattended installation of Windows XP Professional.

Install Windows XP Professional by using Remote Installation Services (RIS). Install Windows XP Professional by using the System Preparation Tool. Create unattended answer files by using Setup Manager to automate the installation of Windows XP Professional.

10-2

103 Upgrade from a previous version of Windows to Windows XP Professional.

Prepare a computer to meet upgrade requirements. Migrate existing user environments to a new installation.

10-1 10-2

104 Perform post-installation updates and product activation. 10-1105 Troubleshoot failed installations. 10-2

200 Implementing and Conducting Administration of Resources201 Monitor, manage, and troubleshoot access to files and folders.

Configure, manage, and troubleshoot file compression. Control access to files and folders by using permissions. Optimize access to files and folders.

4-3 5-1 5-2 5-3

202 Manage and troubleshoot access to shared folders.

Create and remove shared folders. Control access to shared folders by using permissions. Manage and troubleshoot Web server resources.

5-3 5-5 7-1

203 Connect to local and network print devices.

Manage printers and print jobs. Control access to printers by using permissions. Connect to an Internet printer. Connect to a local print device.

6-1 6-2 6-3 6-4

204 Configure and manage file systems.

Convert from one file system to another file system. Configure NTFS, FAT32, or FAT file systems.

4-1

205 Manage and troubleshoot access to and synchronization of offline files. 5-4

300 Implementing, Managing, Monitoring, and Troubleshooting Hardware Devices and Drivers301 Implement, manage, and troubleshoot disk devices.

Install, configure, and manage DVD and CD-ROM devices. Monitor and configure disks. Monitor, configure, and troubleshoot volumes. Monitor and configure removable media, such as tape devices.

2-1 4-2 4-3 8-3

302 Implement, manage, and troubleshoot display devices.

Configure multiple-display support. Install, configure, and troubleshoot a video adapter.

2-3

Page 10: 70 270 q & a

303 Configure Advanced Configuration Power Interface (ACPI). 2-3304 Implement, manage, and troubleshoot input and output (I/O) devices.

Monitor, configure, and troubleshoot I/O devices, such as printers, scanners, multimedia devices, mouse, keyboard, and smart card reader. Monitor, configure, and troubleshoot multimedia hardware, such as cameras. Install, configure, and manage Infrared Data Association (IrDA) devices. Install, configure, and manage wireless devices. Install, configure, and manage USB devices. Install, configure, and manage hand held devices. Install, configure, and manage network adapters. Install, configure, and manage modems.

2-1

305 Manage and troubleshoot drivers and driver signing. 2-2306 Monitor and configure multiprocessor computers. 2-3

400 Monitoring and Optimizing System Performance and Reliability401 Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Optimize and troubleshoot memory performance. Optimize and troubleshoot processor utilization. Optimize and troubleshoot disk performance. Optimize and troubleshoot application performance. Configure, manage, and troubleshoot Scheduled Tasks.

8-1 8-2

402 Manage, monitor, and optimize system performance for mobile users. 2-4 8-2

403 Restore and back up the operating system, System State data, and user data.

Recover System State data and user data by using Windows Backup. Troubleshoot system restoration by starting in safe mode. Recover System State data and user data by using the Recovery Console.

8-3

500 Configuring and Troubleshooting the Desktop Environment501 Configure and manage user profiles and desktop settings. 0-1

1-1 1-2 1-4

502 Configure support for multiple languages or multiple locations.

Enable multiple-language support. Configure multiple-language support for users. Configure local settings. Configure Windows XP Professional for multiple locations.

1-1

503 Manage applications by using Windows Installer packages. 8-1

600 Implementing, Managing, and Troubleshooting Network Protocols and Services601 Configure and troubleshoot the TCP/IP protocol. 3-2

3-3602 Connect to computers by using dial-up networking.

Connect to computers by using a virtual private network (VPN) connection. Create a dial-up connection to connect to a remote access server. Connect to the Internet by using dial-up networking. Configure and troubleshoot Internet Connection Sharing (ICS).

3-1 3-4 3-5 3-6

603 Connect to resources by using Internet Explorer. 3-5 7-1

604 Configure, manage, and implement Internet Information Services (IIS). 5-5605 Configure, manage, and troubleshoot Remote Desktop and Remote Assistance. 3-7606 Configure, manage, and troubleshoot an Internet Connection Firewall (ICF). 3-6

700 Configuring, Managing, and Troubleshooting Security701 Configure, manage, and troubleshoot Encrypting File System (EFS). 5-1702 Configure, manage, and troubleshoot security configuration and local security policy. 1-5

Hacked by Piratez 70-270

Page 11: 70 270 q & a

9-1703 Configure, manage, and troubleshoot local user and group accounts.

Configure, manage, and troubleshoot auditing. Configure, manage, and troubleshoot account settings. Configure, manage, and troubleshoot account policy. Configure, manage, and troubleshoot user and group rights. Troubleshoot cache credentials.

1-2 1-3 1-5 9-1 9-2 9-3

704 Configure, manage, and troubleshoot Internet Explorer security settings. 9-4

Hacked by Piratez 70-270

Page 12: 70 270 q & a

100

Installing Windows XP Professional

Page 13: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

To start a Windows XP installation, run either Winnt.exe or Winnt32.exe. If you are booted to a 32-bit Windows environment such as Windows 95, 98, ME, NT 4 (or NT 3.5), 2000, or XP, run Winnt32.exe. If you are booted to a 16-bit environment, such as MS-DOS or Windows 3.x, run Winnt.exe.

Note: Booting with a Windows 95/98 boot floppy boots you to a 16-bit, command-line DOS environment. You need to use Winnt.exe to start the installation.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[101 #186]

Explanation:

Winnt32 uses switches to control the installation process. The /makelocalsource switch makes Setup copy the installation files to the local hard drive. Thus, the installation is run off the local hard drive, and you don't need access to the

You are the desktop administrator for your company. You are getting ready to install Windows XP Professional on a new computer.

You previously copied the Windows XP source files to a folder on Server1 and shared the folder using XPPro as a share name. You boot the computer with a Windows 98 boot floppy.

You want to begin the Windows XP installation program. What should you do?

nmlkj Run //Server1/XPPro/Setup.exe.

nmlkj Run //Server1/XPPro/Winnt32.exe.

nmlkj Run //Server1/XPPro/Setup32.exe.

nmlkji Run //Server1/XPPro/Winnt.exe.

You are the desktop administrator for your company. You are preparing to install Windows XP Professional on a computer. The computer is a 266 MHz computer with a single 6 GB drive with three partitions. Both the D: and the E: drives have 1.5 GB of free space.

You consult the Windows XP HCL and discover that the computer's CD-ROM drive is not supported under Windows XP. The computer is currently running Windows 95, which supports the CD-ROM drive.

You want to install Windows XP on this computer from the source files on the Windows XP installation CD. What should you do?

nmlkji Boot the computer to Windows 95 and run Winnt32 /makelocalsource.

nmlkjBoot to Windows 95 and copy all the files to the hard drive. Then run Winnt32 /m:folder_name, where folder_name is the location of the installation files.

nmlkj Boot to Windows 95 and copy all the files to the hard drive. Then run Winnt.

nmlkj Boot the computer with a Windows 95 boot disk and run Winnt /b.

Page 14: 70 270 q & a

unsupported CD-ROM drive.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #194]

Explanation:

To apply a new service pack to a distribution folder, use the Update.exe -s:[distribution_folder] switch. This applies the service pack changes to the installation files in the folder, updating all files to the latest files. Administrators can then install Windows XP as usual to get the latest copy.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[101 #202]

You are the network administrator for your company. To simplify administration, you have created a shared folder that holds the Windows XP Professional installation files. Administrators use this folder to install new workstations.

You receive a new service pack, and you want to modify the installation folder to include the service pack. What should you do?

nmlkjCreate a new share for the service pack. Instruct administrators to install Windows XP as usual, then run Update.exe to apply the service pack.

nmlkj From the service pack, copy Layout.inf, Dosnet.inf and Txtsetup.sif to each distribution share.

nmlkji Run the Update.exe -s command in the service pack, specifying the path to the network share.

nmlkjRun Package.exe from the service pack to create new installation files. Replace all files in the share with those generated by this utility.

nmlkj From the service pack, copy Driver.cab, Layout.inf, Dosnet.inf and Txtsetup.sif to the distribution share.

nmlkjCopy all files in the service pack to the network share. Run Update.exe to install both Windows XP and the service pack at the same time.

You are the desktop administrator for your company. You are installing Windows XP Professional on a Pentium II computer. The computer has two hard drives, each of which contains a single 8 GB FAT32 partition. Windows 98 is installed on the first drive.

You want to use both Windows 98 and Windows XP. You also want the existing directories and data to remain on the first drive.

What should you do to minimize the amount of effort while achieving the desired results?

Hacked by Piratez 70-270

Page 15: 70 270 q & a

Explanation:

For this scenario, install Windows XP on the second drive. The installation program will not remove the existing data directories and files on the first drive, and you will be able to boot to both Windows 98 and Windows XP.

If you upgrade from Windows 98 to Windows XP, Windows 98 will no longer exist. Deleting the existing partition without backing up the data would result in a data loss. Backing up the data, reformatting the partition, and installing Windows XP would also remove Windows 98.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #212]

Explanation:

Use the /duprepare and /dushare switches with the Winnt32 command to perform an installation of Windows XP Professional from a network share using dynamic updates downloaded from Microsoft. For example, if Tiffany had downloaded the dynamic updates and extracted them to the \\Server1\Updates share, she would do the following to install Windows XP:

1. Run \\Server1\XPpro\winnt32 /duprepare:\\Server1\Updates to ready the files for use. 2. Run \\Server1\XPpro\winnt32 /dushare:\\Server1\Updates to start the installation with the downloaded update files.

nmlkjBack up the data on the first drive. Reformat the partition on the first drive with NTFS. Install Windows XP and restore the data and directories.

nmlkji Install a new Windows XP installation on the second drive.

nmlkj Install a Windows XP upgrade installation on the first drive.

nmlkj Delete the partition on the first drive. Then create a new partition and install Windows XP.

You are the desktop administrator for your company. Your company has recently decided to upgrade ten Windows 2000 Professional computers to Windows XP Professional.

You create a network share called XPpro on Server1 with the Windows XP installation files. You want to make sure that the most recent device drivers are used during the installation. You download the dynamic update file and extract it to the Updates share on Server1.

You want to install Windows XP from the network and use the most updated drivers from the network share. What should you do? (Choose two. Each correct choice is part of the correct solution.)

gfedc Run //Server1/Updates/Update.exe -s://Server1/XPpro.

gfedc Run //Server1/XPpro/winnt /duprepare://Server1/XPpro.

gfedc Run //Server1/XPpro/winnt32.exe.

gfedcb Run //Server1/XPpro/winnt32 /duprepare://Server1/Updates.

gfedc Run //Server1/XPpro/winnt32 /dushare://Server1/Updates -s://Server1/XPpro.

gfedc Run //Server1/XPpro/winnt.exe.

gfedcb Run //Server1/XPpro/winnt32 /dushare://Server1/Updates.

Hacked by Piratez 70-270

Page 16: 70 270 q & a

The /dudisable switch prevents the dynamic update from occurring. The Update.exe command and the -s switch are not required because you are not slipstreaming a service pack. You also do not need to specify a source for the installation files when running Winnt32 from the \\Server1\XPpro share (that would use the /s switch).

Note: The Windows XP Dynamic Update package only works if you are running an upgrade that is initiated by Winnt32.exe. It does not work with Winnt.exe, booting off of the CD-ROM, booting off of the floppy disks, RIS installations, and Winnt32.exe installations that are started from within WINPE.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[101 #260]

Explanation:

Use the /dudisable switch to install Windows XP Professional without performing the Dynamic Update. After the installation, you will need to update Windows XP.

Copying installation files to the hard drive with the /makelocalsource switch or performing an unattended installation without a custom script file will not disable automatic updates. The other options are not valid switches for the Winnt32 command.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #268]

You are the workstation administrator for your company. You have been asked to upgrade to Windows XP Professional on 30 department computers that are currently running Windows 2000 Professional.

You copy the contents of the i386 folder from a Windows XP Professional CD-ROM to the //Server7/XPImage network share. You start the installation on the first system and notice that there is a long pause as the computer tries to perform dynamic updates over the Internet connection. You contact the router administrator who says the Internet connection will be down all day.

You want to continue to upgrade to Windows XP, but prevent the install from trying to download any updates during the install. What should you do?

nmlkj Run //Server7/XPImage/Winnt32.exe /makelocalsource, then run Winnt32.exe from the hard drive.

nmlkj Run //Server7/XPImage/Winnt32.exe /nodownload.

nmlkj Run //Server7/XPImage/Winnt32.exe /noupdate.

nmlkj Run //Server7/XPImage/Winnt32.exe /unattend.

nmlkji Run //Server7/XPImage/Winnt32.exe /dudisable.

You are the desktop administrator for a small branch office. The branch office uses a shared 56k dialup connection on Server2 to connect to the Internet You have been asked to upgrade 20 computers running

Hacked by Piratez 70-270

Page 17: 70 270 q & a

Explanation:

To complete the installation, you will need to perform two tasks:

1. Prepare the updates for use during installation. Run Winnt32.exe from the XPInstall directory with the /duprepare switch pointing to the Updates folder. You will only need to run this once to prepare the folder on the server.

2. On each computer, install Windows XP using the updated files. Run Winnt32.exe from the XPInstall directory with the /dushare switch pointing to the Updates share. The installation files will use the updated files in the Updates share when necessary.

Be sure to run Winnt32.exe each time from the XPInstall share (not the Updates share). Running \\Server2\XPInstall\winnt32.exe /duprepare:\\Server2\Updates from each Windows 98 computer would prepare the updates 20 different times, whereas a single preparation is required (in addition, because of a bug this update procedure will not work when run from a Windows 98 system). Running C:\XPInstall\winnt32.exe /dushare:\\Server2\Updates on the server would attempt to install Windows XP on the server.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[101 #277]

connection on Server2 to connect to the Internet. You have been asked to upgrade 20 computers running Windows 98 to Windows XP Professional.

You check the HCL and find that the network card on each of the computers requires an updated driver for Windows XP that is not included on the Windows XP CD-ROM, but it is included as a dynamic update. The C:/XPInstall folder is shared on Server2 using the share name XPInstall. The C:/Updates folder is shared on Server2 using the share name Updates. You copy the i386 directory from the Windows XP installation CD-ROM to the XPInstall share on Server2. Next, you download the XP updates and extract them to the Updates shared folder on Server2.

You want to install Windows XP on each computer while keeping Internet usage to a minimum and using the updated driver for the network card. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc On each computer, run //Server2/Updates/winnt32.exe /duprepare://Server2/XPInstall.

gfedc On each computer, run //Server2/XPInstall/winnt32.exe /duprepare://Server2/Updates.

gfedc On each computer, run //Server2/Updates/winnt32.exe /dushare://Server2/XPInstall.

gfedc On Server2, run C:/Updates/winnt32.exe /duprepare://Server2/XPInstall.

gfedc On Server2, run C:/Updates/winnt32.exe /dushare://Server2/XPInstall.

gfedcb On each computer, run //Server2/XPInstall/winnt32.exe /dushare://Server2/Updates.

gfedc On Server2, run C:/XPInstall/winnt32.exe /dushare://Server2/Updates.

gfedcb On Server2, run C:/XPInstall/winnt32.exe /duprepare://Server2/Updates.

You are the desktop administrator for your company. You are installing Windows XP Professional on a Pentium II computer. The computer has two hard drives, each of which contains a single 8 GB FAT32 partition. Windows 95 is installed on the first drive. All user data is stored on the second drive.

You want to use Windows XP rather than Windows 95 from now on. When you are finished, you want Windows XP rather than Windows 95 on the first drive. You also want the existing user data on the second drive to be accessible.

What should you do to minimize the amount of effort while achieving the desired results?

Hacked by Piratez 70-270

Page 18: 70 270 q & a

Explanation:

For this scenario, install Windows XP on the existing partition. The installation program will not remove the existing data directories and files. (Keep in mind that it is always a good idea to back up the computer before performing major operations such as this, although backing up is not a requirement in this scenario.)

You cannot upgrade from Windows 95 to Windows XP. Deleting the existing partition without backing up the data would result in a data loss. Backing up the data, reformatting the partition, and installing Windows XP would provide the desired results. However, reformatting the drive and restoring the data is unnecessary. If user data were stored on the first drive, this would be the desired action because data stored in a user profile folder can be overwritten when installing Windows XP to an existing Windows folder. The existing Windows folder is removed before the new Windows XP installation takes place (you should be warned of this before the Windows XP installation begins.)

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #289]

Explanation:

To upgrade Windows 98, Windows NT 4.0, or Windows 2000, start the Winnt32.exe installation program from inside the existing operating system rather than booting to the Windows XP Professional CD and running Winnt.exe. Winnt.exe installs a clean copy of Windows XP Professional.

nmlkji Install a new Windows XP installation on the existing partition of the first drive.

nmlkjBack up the data on the first drive. Reformat the partition on the first drive with NTFS. Install Windows XP and restore the data and directories.

nmlkj Delete the partition on the first drive. Then create a new partition and install Windows XP.

nmlkj Install a Windows XP upgrade installation on the existing partition of the first drive.

You are the desktop administrator for your company. You are upgrading a Windows 98 computer to Windows XP Professional. The computer has a single 20 GB hard drive with a single FAT32 partition that has 9.3 GB of free space.

You insert the Windows XP Professional CD-ROM, restart the computer, and boot to the installation program on the CD. You choose to install Windows XP Professional to the existing partition and keep the existing file system intact. The installation program then displays a message indicating that the current files in the /Windows folder (and perhaps even documents in the My Documents folder) will be deleted.

You want to upgrade Windows 98, including upgrading system and user settings and keeping user files. What should you do?

nmlkj Specify a different installation folder and continue the setup process.

nmlkj Continue the setup process. Afterwards, convert the drive from FAT32 to NTFS.

nmlkjBoot the computer to Windows 98. Back up user data files and the registry. Re-run the installation program as you did previously. Afterwards, restore the registry settings and user data that you backed up.

nmlkjiBoot the computer to Windows 98, insert the Windows XP Professional CD, and run the 32-bit installation program.

Hacked by Piratez 70-270

Page 19: 70 270 q & a

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #300]

Explanation:

You need to supply the appropriate SCSI adapter driver from a floppy disk and restart the installation of Windows XP. Most likely the driver for the SCSI adapter is not accessible to Windows XP Professional, which is preventing XP from locating the hard drive attached to the SCSI adapter. During the text-mode portion of the XP installation you will see an informational message at the bottom that says to press F6 if you need to install a third-party SCSI or RAID driver.

Replacing the SCSI adapter reduces the overall functionality and configuration options of your computer, and would be costly to do on all machines. The new computer should already be configured to boot from the hard drive, and the IRQ for the SCSI adapter should also be pre-set.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #308]

You are the desktop administrator for your company. You are installing Windows XP Professional on a new computer that has the following hardware:

PCI video adapter PCI network adapter 24-bit sound card ISA SCSI adapter and one internal SCSI hard disk CD-ROM drive Floppy drive

You boot to the Windows XP Professional CD-ROM and begin the installation. During the installation, you receive an error message indicating that Setup cannot locate a hard drive. You verify that the SCSI hard drive is in working condition and is supported under Windows XP. You also verify SCSI IDs and terminations. You then restart the installation, but receive the same error message.

You want to successfully complete the installation of Windows XP Professional on this computer. What should you do?

nmlkj Replace the SCSI Adapter with an IDE adapter.

nmlkj Set the IRQ for the SCSI adapter.

nmlkji Restart the Installation, and choose F6 to install the driver for the SCSI adapter.

nmlkj Modify the system BIOS to allow the computer to boot from the SCSI hard drive.

You are the desktop administrator for your company. Shanda, a software tester, contacts you and asks you to

Hacked by Piratez 70-270

Page 20: 70 270 q & a

Explanation:

You must increase the amount of free disk space to complete the installation. Windows XP Professional requires a minimum of 1.5 GB for the install. If the computer has too little disk space, you'll receive the error 'Not enough disk space for installation.'

You can use Setup to create a partition from existing free space on the hard drive. If there isn't enough free space, you must delete files from the installation partition. You can also delete existing partitions and create a new partition that's large enough for installation. Be aware that you will lose all data if you delete a partition.

Objective(s):

101. Perform and troubleshoot an attended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[101 #316]

Explanation:

An automated installation of Windows XP performed from the CD-ROM requires the name of the answer file to be Winnt.sif. During the CD installation of Windows XP, the setup program looks for the Winnt.sif file on the floppy drive of the computer

walk her through the process of installing Windows XP Professional on a lab computer.

You first ask Shanda to summarize the computer's hardware requirements. Shanda indicates that the computer is a Pentium II 300 MHz computer with 64 MB of RAM. It has an 8 GB hard drive formatted with FAT32. The drive has 1 GB of free space.

You need to make sure Shanda can install Windows XP. What should you instruct Shanda to do?

nmlkj Update the system BIOS.

nmlkj Add more memory.

nmlkj Reformat the hard drive with NTFS.

nmlkji Free up hard disk space.

You are the desktop administrator for your company. You are installing Windows XP Professional on a new computer.

You have created an answer file with the Setup Manager Wizard. The answer file supports a fully-automated Windows XP installation.

You want to use the answer file you have created as you install Windows XP Professional from the Windows XP installation CD. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Name the answer file Winnt.sif.

gfedc Copy the answer file to a network share.

gfedc Name the answer file Unattend.inf.

gfedc Name the answer file Udf.txt.

gfedc Name the answer file Unattend.txt.

gfedcb Copy the answer file to a floppy.

Hacked by Piratez 70-270

Page 21: 70 270 q & a

where the installation is being performed. The unattended installation will not check for any other file names in any other locations while performing the installation from the CD-ROM.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #260]

Explanation:

To modify the RIS image, copy the local administrator account profile to the Default User profile. When you created the RIS image, you were logged on as an administrator. When the applications were installed, icons were added to the current user (not to the All Users profile or the Default User profile). You need to copy the icons (shortcut files) from the administrator profile to the Default User profile so that the changes will be applied to all new users. You can do this by copying the individual shortcut files or by copying the entire profile. If you copy the entire profile, you should log on to the computer using a different administrative account (you should not copy to or from the profile of a currently logged on user). You should perform the copy to the Default User profile rather than the All Users profile. Because each new user's profile is a copy of the Default User profile, each user will be able to update his or her own profile without affecting other users. The All Users profile applies to all users and only users with appropriate administrative privileges can update the All Users profile.

Rbfg.exe is used to create the boot disk for non-PXE compliant network adapters, and will not impact the RIS image. Riprep.exe is used to create the image of the reference computer. If you ran it before you added the applications, the applications would not be available to anyone. The All Users profile will not contain the custom settings that were created during the installation of the applications.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

You are the desktop administrator for your company. You have been asked to install Windows XP Professional on 15 new systems that have identical hardware. Microsoft Office and the company's standard anti-virus software also needs to be installed on each system.

You prepare a source computer with the required software and create an RIS image. After deploying the RIS Image to the first computer, you notice that icons for Microsoft Office and the anti-virus software do not appear. You restart the source computer and verify that the icons are present.

By default, you want the icons to appear on new computers as they do on the source computer. However, you do not want to prevent users from deleting or moving the icons to a different location, if they so desire. What should you do?

nmlkjiOn the source computer, copy the local administrator account profile to the Default User profile. Recreate the RIS image.

nmlkj On the source computer, copy the All Users profile to the Default User profile. Recreate the RIS image.

nmlkj On the source computer, run Rbfg.exe before installing the standard applications. Recreate the RIS image.

nmlkj On the source computer, run Riprep.exe before installing the standard applications. Recreate the RIS image.

nmlkjOn the source computer, copy the local administrator account profile to the All Users profile. Recreate the RIS image.

Hacked by Piratez 70-270

Page 22: 70 270 q & a

[102 #270]

Explanation:

An RIS installation of Windows XP requires DHCP, DNS, RIS, and Active Directory. When the PXE-compliant machine boots up, it requests IP information, including a DNS Server address, from DHCP. If RIS is running on the DHCP server, DHCP also provides the RIS server address. Otherwise, the RIS server responds to a subsequent client DHCP broadcast to identify itself as a boot server. Both DHCP and RIS must therefore be authorized to respond to DHCP requests on the network. The client then contacts the RIS server to begin the installation of Windows XP Professional. Before beginning the installation, the RIS server contacts Active Directory (which requires a DNS lookup) and gets configuration information, some of which determines whether the RIS server will respond to the installation request at all.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #278]

You are a temporary administrator hired to assist in the rollout of 500 Windows XP Professional clients at a new office building in Phoenix. No services currently exist on the network.

You verify that all the new machines have PXE-compliant network cards and decide to use RIS to perform the installation.

You want to install and configure the necessary services to perform an RIS installation. What should you do? (Choose all that apply.)

gfedcb Install and configure DHCP.

gfedcb Install and configure RIS.

gfedcb Install and configure DNS.

gfedcb Install and configure Active Directory.

gfedc Install and configure SMS.

gfedcb Authorize the RIS server.

gfedcb Authorize the DHCP server.

gfedc Install and configure WINS.

gfedc Install and configure SNMP.

You are the desktop administrator for K.J. Fountains. You have been asked to create an automated installation process for 75 Windows XP Professional installations. Each new computer contains a 40 GB hard drive, floppy drive, and a DVD-ROM drive. They do not contain a network card or sound card.

You create an answer file that contains the standard installation settings and decide to use the Sysprep utility to prepare a source computer image, which you will duplicate.

Which two actions should you take in preparation to use Sysprep? (Choose two. Each correct answer is part of the solution.)

Hacked by Piratez 70-270

Page 23: 70 270 q & a

Explanation:

Sysprep.exe prepares the system for duplication. Setupcl.exe runs a mini-setup wizard when the duplicated drive is booted. Sysprep.inf is an optional answer file that automates the mini-setup wizard. It follows the same format as a typical answer file, but it must be named Sysprep.inf. Typically, you put all these files in the Sysprep folder at the root of the system drive (C:\Sysprep in this case). You can also put the Sysprep.inf file on a floppy disk, which can be inserted when the mini-setup wizard begins.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #288]

Explanation:

Sysprep.exe prepares the system for duplication. Setupcl.exe runs a mini-setup wizard when the duplicated drive is booted. Sysprep.inf is an optional answer file that automates the mini-setup wizard. It follows the same format as a typical answer file, but it must be named Sysprep.inf. Typically, you put all these files in the Sysprep folder on the C: drive (Windows XP should be installed on the C: drive). You can also put the Sysprep.inf file on a floppy disk, which can be inserted when the mini-setup wizard begins.

gfedc Copy Setupcl.exe to the C:/Windows directory.

gfedc Copy Setupcl.exe to the C:/Windows/System32 directory.

gfedcb Copy Setupcl.exe to the C:/Sysprep directory.

gfedc Copy Setupcl.exe to the root of the C: drive.

gfedc Copy Sysprep.exe to the C:/Windows directory.

gfedc Copy Sysprep.exe to the C:/Windows/System32 directory.

gfedcb Copy Sysprep.exe to the C:/Sysprep directory.

gfedc Copy Sysprep.exe to the root of the C: drive.

You are the desktop administrator for K.J. Fountains. You have been asked to create an automated installation process for 75 Windows XP Professional installations. Each new computer contains a 40 GB hard drive, floppy drive, and a DVD-ROM drive. They do not contain a network card or sound card.

You want to prepare a source computer for imaging. You copy the Sysprep.exe and Setupcl.exe files to the source computer’s C:/Sysprep folder.

You want to automate the setup process. Which additional actions should you take? (Choose two. Each correct answer is part of the solution.)

gfedc Create an answer file named Winnt.sif.

gfedc Create an answer file named Unattend.txt.

gfedcb Create an answer file named Sysprep.inf.

gfedc Copy the answer file to the C:/Windows directory.

gfedc Copy the answer file to the C:/Windows/System32 directory.

gfedcb Copy the answer file to the C:/Sysprep directory.

Hacked by Piratez 70-270

Page 24: 70 270 q & a

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #300]

Explanation:

You can use RIS with clients that don't support the Net PC specification (non-PXE compliant) by creating a remote installation boot disk. This boot disk simulates the PXE boot process. Use the Windows Remote Boot Disk Generator (Rbfg.exe) to create the boot disk. The Rbfg.exe file is located in the RemoteInstall\admin\i386 folder on the Remote Installation Server. Not all network adapters are supported, so the computer must contain one of the PCI adapters listed in the Adapters List in the Remote Boot Disk Generator.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #310]

You are the desktop administrator for your company. You use RIS to install Windows XP Professional on client computers.

You have been asked to install Windows XP Professional on a computer that has the following attributes:

1.2 GHz CPU 256 MB RAM 10 GB hard drive PCI network adapter Floppy drive PXE-compliant = No

You want to use RIS to complete the installation. What should you do?

nmlkji Run Rbfg.exe, located in the RemoteInstall/admin/i386 folder on the Remote Installation Server.

nmlkj Run Rbfg.exe, located in the i386 folder on the Windows 2000 Server installation CD-ROM.

nmlkj Run Makeboot.exe, located in the RemoteInstall/admin/i386 folder on the Remote Installation Server.

nmlkj Run Makeboot.exe, located in the i386 folder on the Windows 2000 Server installation CD-ROM.

You are the desktop administrator for your company. You have been asked to install Windows XP Professional on 30 PXE-compliant computers and 35 non-PXE-compliant computers. All hardware for the 65 computers is included on the current hardware compatibility list (HCL).

You create an RIS image and copy the image to multiple RIS servers. You also pre-stage each computer in Active Directory. You then start the 65 computers. The 30 PXE-compliant computers connect to the RIS server and begin the installation. However, the 35 non-PXE-compliant computers cannot connect to the RIS server.

You want to use RIS to complete the Windows XP installation on all the computers What should you do?

Hacked by Piratez 70-270

Page 25: 70 270 q & a

Explanation:

Because the installation works for the PXE-compliant computers, permissions are not likely the problem. Use the Remote Boot Disk Generator (Rbfg.exe) to create a floppy disk for computers that do not contain the PXE-based remote boot ROM. You can then use the Remote Installation Services feature for these computers. Not all network adapters are supported, so the computer must contain one of the PCI adapters listed in the Adapters List in the Remote Boot Disk Generator.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #318]

Explanation:

When PXE-compliant computers begin the installation process, they request a new IP address from the DHCP server. If your Windows 98 computers leased IP addresses from the DHCP server for the default time of eight days, there is still some time before those 60 IP addresses will be free. If you run out of IP addresses, you will need to increase the size of the DHCP scope or release IP addresses on some of the computers. You do not make startup disks with Riprep. You only make startup disks with Rbfg when your computers are non-PXE-compliant. If there is a problem with the CMOS configuration of some computers, it is highly unlikely that the problem will manifest itself as described in the question.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

You want to use RIS to complete the Windows XP installation on all the computers. What should you do?

nmlkj Grant the Everyone group NTFS Read permission for the RIS image.

nmlkj Grant the Administrators group NTFS Read permission for the RIS image.

nmlkji Run Rbfg.exe to create a non-PXE-compliant startup disk.

nmlkj Run Riprep.exe to create a non-PXE-compliant startup disk.

You are the network administrator for your company. You have 60 Windows 98 computers on your network on which you want to install Windows XP Professional.

Because there is no important data on the computers, you decide to use RIS to install a clean copy of Windows XP over the top of the existing Windows 98 installation. The computers all require the same Hardware Abstraction Layer (HAL) and are PXE-compliant. However, the installation works only on the first 20 computers.

You want to complete the Windows XP installation on the remaining computers. What should you do?

nmlkj Change the CMOS settings.

nmlkji Add more IP addresses to the DHCP server.

nmlkj Make startup disks using Rbfg.exe.

nmlkj Make startup disks using Riprep.exe.

Hacked by Piratez 70-270

Page 26: 70 270 q & a

TestOut for Windows XP Administration, Section 10.2

[102 #326]

Explanation:

The proposed solution does not install the company applications. You must use Riprep.exe to create an RIS image of a source computer after installing the company applications. The proposed solution does not use RIS at all.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #334]

You are the administrator of your company's network. Your network has 10 Windows 2000 Server computers in the westsim.com domain. Your network also has 175 Windows 98 computers. You want to perform a clean installation of Windows XP Professional on all of the Windows 98 computers. All of the Windows 98 computers use the same Hardware Abstraction Layer (HAL) and are PXE-compliant.

You want to accomplish the following goals:

Perform an unattended installation of Windows XP Professional. Perform an unattended installation of company-standard applications during the installation of Windows XP Professional. Assign each computer a unique security identifier (SID). Modify the unattended installation script so computers automatically join the westsim.com domain.

You propose the following course of action:

1. Install Windows XP Professional on a Windows 98 computer. 2. Install and configure company-standard applications on that computer. 3. Use Setup Manager on the computer to create an Unattend.txt file based on the current configuration,

including domain membership. 4. Start the remaining Windows 98 computers, and then install Windows XP Professional. Use the

Unattend.txt file from the first computer to provide the settings for the installation.

Which result or results do these actions produce? (Select all that apply.)

gfedcb Assign each computer a unique security identifier (SID).

gfedcb Modify the unattended installation script so computers automatically join the westsim.com domain.

gfedcb Perform an unattended installation of Windows XP Professional.

gfedcPerform an unattended installation of company-standard applications during the installation of Windows XP Professional.

You are the desktop administrator for your company. You need to upgrade several computers from Windows NT Workstation 4.0 to Windows XP Professional.

You manually create an Unattend.txt file using a text editor and copy the file to a floppy disk. You then start the installation on a test computer using the Windows XP Professional CD-ROM. You insert the floppy disk after the computer starts. Although you have set the user interaction level to full unattended mode, you are prompted for all the required parameters.

Hacked by Piratez 70-270

Page 27: 70 270 q & a

Explanation:

Windows XP provides the ability to perform an unattended installation from a CD-ROM. To perform an unattended installation from a CD-ROM, the following conditions must be met:

The computer must support booting from a CD-ROM, and must adhere to the El-Torito non-emulation specification. The unattended answer file must be renamed to Winnt.sif and copied to a floppy disk so Setup can access it. When Setup displays the message that it is examining the hardware configuration, insert the floppy disk containing the Winnt.sif file. The answer file must contain a valid [Data] section with the following entries to the unattended answer file:

UnattendedInstall=Yes - Value must be set to "yes". MSDosInitiated=No - Value must be set to "no" or Setup will stop during the graphical portion of Setup. AutoPartition=1 - If the value is set to 1, the installation partition is automatically selected. If the value is set to 0 (zero), you are prompted for the installation partition during the text portion of Setup.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #342]

Explanation:

While in Setup Manager, you will be asked to accept the terms of the license agreement for all unattended installations if you choose the Fully Automated option. Using the /unattend switch with Winnt32 also affirms that you and/or the user have read and accepted the Microsoft License Agreement for Windows XP. However, you use Winnt32 when upgrading from Windows 98/ME or NT/2000, not on a new computer.

You want to ensure that the unattended installation does not prompt you for input. What should you do? (Choose two. Each choice represents part of the solution.)

gfedcb On the floppy disk, rename Unattend.txt to Winnt.sif.

gfedc On the floppy disk, rename Unattend.txt to Win2000.sif.

gfedc On the floppy disk, rename Unattend.txt to Winnt.inf.

gfedcb Under [Data] in the Unattend.txt file, verify that the Unattendedinstall parameter is set to Yes.

gfedc In the [Unattended] section of the Unattend.txt file, set the Unattendmode parameter to Fullunattended.

You are the desktop administrator for your company. You are preparing an unattended answer file for ten new Windows XP Professional computers. The person initiating the setups should not have to answer questions during the installations.

You want to comply with Microsoft licensing requirements. How do you accept the terms of the license agreement for all new installations?

nmlkj Create the license agreement answer in the [LicenseFilePrintData] section of the answer file.

nmlkj Include /L:Yes as a switch when you run Winnt32.exe.

nmlkjCreate the license agreement answer in a UDF file associated with the computer name of each computer that will be installed.

nmlkji Accept the terms of the license agreement while using Setup Manager to prepare the answer file.

Hacked by Piratez 70-270

Page 28: 70 270 q & a

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #351]

Explanation:

Because you are running the setup from MS-DOS (a Windows 98 boot disk starts MS-DOS), you must use Winnt. You can only use Winnt32 when starting the installation from inside a 32-bit operating system (Windows 95, 98, ME, NT 4, 2000, or XP). Use the /u switch to indicate that you will be using an unattended answer file. Use the /udf switch to use a Uniqueness Database File. The computer's ID goes before the name of the Uniqueness Database File name. Use the /s switch to specify the path to the source files.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #359]

You are the desktop administrator for your company. You are installing Windows XP Professional on several computers throughout your company’s site.

You copy the installation files to the XPPro share on the NY-CORP-SRV1 server. You also create an answer file named Unattend.txt and a Uniqueness Database File named Unique.udb. You copy both the answer file and uniqueness database to the XPPro share. You boot a computer with a Windows 98 boot disk in the A: drive. You also connect to the XPPro share. The computer will be named NY-DEV-WRK4, and appropriate entries have been made in the Uniqueness Database File under that name.

What command should you enter to begin the installation?

nmlkj Winnt /u:unattend.txt /udb: unique.udb,NY-DEV-WRK4 /s://NY-CORP-SRV1/XPPro

nmlkj Winnt32 /unattend:unattend.txt /udf:unique.udb,NY-DEV-WRK4 /s://NY-CORP-SRV1/XPPro

nmlkj Winnt32 /unattend:unattend.txt /udb:unique.udb,NY-DEV-WRK4 /s://NY-CORP-SRV1/XPPro

nmlkj Winnt /u:unattend.txt /udb:NY-DEV-WRK4,unique.udb /s://NY-CORP-SRV1/XPPro

nmlkj Winnt /u:unattend.txt /udf:unique.udb,NY-DEV-WRK4 /s://NY-CORP-SRV1/XPPro

nmlkji Winnt /u:unattend.txt /udf:NY-DEV-WRK4,unique.udb /s://NY-CORP-SRV1/XPPro

nmlkj Winnt32 /unattend:unattend.txt /udf:NY-DEV-WRK4,unique.udb /s://NY-CORP-SRV1/XPPro

nmlkj Winnt32 /unattend:unattend.txt /udb:NY-DEV-WRK4,unique.udb /s://NY-CORP-SRV1/XPPro

You are the desktop administrator for K.J. Fountains. You have been asked to create an automated installation process for 75 Windows XP Professional installations. Each new computer contains a 40 GB hard drive, floppy drive, and a DVD-ROM drive. They do not contain a network card or sound card.

You prepare a source computer for imaging using Sysprep and apply the image to the first computer's hard drive.

Hacked by Piratez 70-270

Page 29: 70 270 q & a

Explanation:

A mini-setup wizard runs when a Sysprep image is booted. Sysprep.inf is an optional answer file that automates the mini-setup wizard. It follows the same format as a typical answer file, but it must be named Sysprep.inf. Typically, you put all these files in the Sysprep folder on the system drive (C:\Sysprep in this case). You can also put the Sysprep.inf file on a floppy disk, which can be inserted when the mini-setup wizard begins.

Objective(s):

102. Perform and troubleshoot an unattended installation of Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #375]

However, when you boot the computer, you must complete a short setup process.

You want to ensure that users do not need to complete a setup program when they turn their new computers on. What can you do? (Choose two. Each correct answer is part of the solution.)

gfedcCreate an answer file named Winnt.sif and copy it to the C:/Sysprep folder on the source computer. Recreate the image.

gfedcCreate an answer file named Unattend.txt and copy it to the C:/Sysprep folder on the source computer. Recreate the image.

gfedcbCreate an answer file named Sysprep.inf and copy it to the C:/Sysprep folder on the source computer. Recreate the image.

gfedcbCreate an answer file named Sysprep.inf and copy it to a floppy disk. Instruct each user to insert the floppy disk when their new computer boots for the first time.

gfedcCreate an answer file named Winnt.sif and copy it to a floppy disk. Instruct each user to insert the floppy disk when their new computer boots for the first time.

gfedcCreate an answer file named Unattend.inf and copy it to a floppy disk. Instruct each user to insert the floppy disk when their new computer boots for the first time.

You are the desktop administrator for your company. You use RIS to install Windows XP Professional on client computers.

You have been asked to install Windows XP Professional on a computer that has the following attributes:

1.2 GHz CPU 256 MB RAM 10 GB hard drive ISA network adapter Floppy drive PXE-compliant = No

You want to use RIS to complete the installation. What should you do?

nmlkj Run Rbfg.exe, located in the RemoteInstall/admin/i386 folder on the Remote Installation Server.

nmlkj Run Makeboot.exe, located in the i386 folder on the Windows 2000 Server installation CD-ROM.

nmlkj Run Makeboot.exe, located in the RemoteInstall/admin/i386 folder on the Remote Installation Server.

nmlkj Run Rbfg.exe, located in the i386 folder on the Windows 2000 Server installation CD-ROM.

nmlkji Run Rbfg.exe and examine the list of supported network adapters. Install a supported PCI network adapter.

Hacked by Piratez 70-270

Page 30: 70 270 q & a

Explanation:

You can use RIS with clients that don't support the Net PC specification (non-PXE compliant) by creating a remote installation boot disk. This boot disk simulates the PXE boot process. Use the Windows Remote Boot Disk Generator (Rbfg.exe) to create the boot disk. The Rbfg.exe file is located in the RemoteInstall\admin\i386 folder on the Remote Installation Server. Not all network adapters are supported, so the computer must contain one of the PCI adapters listed in the Adapters List in the Remote Boot Disk Generator. ISA and PCMCIA adapters are not supported.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #387]

Explanation:

There is a BIOS setting that must be enabled to permit the computer to boot from the network. This BIOS setting, in conjunction with the PXE-compliant network card, enables the computer to contact the RIS server. The PXE-compliant computer receives IP configuration information by contacting a DHCP server. If the RIS service is installed on the same computer as the DHCP service, the RIS server address is also returned. Otherwise, the RIS server responds to a subsequent DHCP broadcast by the client. If a RIS server cannot be found and an existing operating system does not exist on the computer, a message indicating that an operating system could not be found might occur. RIS uses DNS to contact an Active Directory server and obtain RIS configuration information. The domain-user account used to perform the installation requires the Log on as a Batch Job user right on the RIS server.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[102 #396]

You are the desktop administrator for your company. You have just installed and configured a network RIS Server to assist in the deployment of Windows XP Professional.

When booting the Accounting manager's new computer to begin installing Windows XP Professional, you receive an error message indicating that an operating system is not found. You review the Windows XP Professional HCL and verify that the PXE-compliant network card is supported by XP.

You need to complete the Windows XP installation using RIS as soon as possible. What should you do?

nmlkj Configure the DHCP server to assign a DNS server address.

nmlkj Install and configure a DNS server on the same subnet as the RIS server.

nmlkji Configure the computer's BIOS settings to allow it to boot from the network.

nmlkjModify the RIS Server permissions to give yourself administrative permissions to the Windows XP Professional image.

You are the desktop administrator for your company. A software tester needs you to install Windows XP Professional on a computer currently running Windows 95. You need to retain the Windows 95 installation and set up a dual-boot configuration.

You examine the computer's hardware and discover that it is a Pentium II 266 MHz computer with 64 MB of RAM and 500 MB of free space remaining on the hard disk.

You need to complete the Windows XP installation. What should you do before starting the installation?

Hacked by Piratez 70-270

Page 31: 70 270 q & a

Explanation:

Before beginning the installation, you will need additional disk space. Windows XP requires a minimum of 1.5 GB of free disk space. Although additional memory and a faster processor are recommended, they are not required. You would not run Winnt32 /checkupgradeonly from within Windows 95 because you will not be upgrading the operating system (Windows 95 cannot be upgraded to Windows XP directly).

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #260]

Explanation:

The minimum processor speed for a Windows XP Professional installation is 233 MHz, with a recommended processor speed of 300 MHz. The Windows XP installation also requires at least 1.5 GB free disk space, 64 MB of RAM, (recommended 128), a Super VGA card, CD-ROM or DVD-ROM drive, as well as the standard keyboard and pointing device. You should also check that the CD-ROM or DVD-ROM drive is on the Windows XP Hardware Compatibility List (HCL).

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

nmlkj Upgrade the processor.

nmlkj Add more memory.

nmlkji Free up more disk space.

nmlkj Run Winnt32 /checkupgradeonly.

You are the desktop administrator for your company. The manager of your Human Resources department has recently acquired an application that will help manage employee benefits. The application will run only on Windows 2000 or Windows XP Professional. She is currently running Windows 98 on her computer and wants you to upgrade her computer to Windows XP Professional.

You begin by checking the hardware of her computer and discover she has 256 MB of RAM, a Pentium 166 MHz processor, a 4 GB drive that has 2 GB of free space, a super VGA video adapter, and an 8 speed CD-ROM.

You want to perform an unattended installation of Windows XP from the CD-ROM. What should you do to ensure you have a successful installation?

nmlkj Install an additional 4 GB hard drive.

nmlkj Add an additional 128 MB of RAM.

nmlkji Upgrade the processor to a 300 MHz processor.

nmlkj Upgrade the CD-ROM drive to faster model.

Hacked by Piratez 70-270

Page 32: 70 270 q & a

TestOut for Windows XP Administration, Section 10.1

[103 #268]

Explanation:

Running winnt32/checkupgradeonly on a Windows 98 machine performs a check on your computer for upgrade compatibility with Windows XP. If you use this option with /unattend, no user input is required. Otherwise, the results are displayed on the screen, and you can save them under the file name you specify. The default file name is Upgrade.txt and it is stored in the %systemroot% folder.

Performing a Windows XP installation on another machine and then installing the required applications would not be an efficient way to determine the compatibility of an existing Windows 98 machine with Windows XP Professional. Installing Windows XP on a different partition would also require you to install and test all applications on the new XP installation. You cannot use RIS to perform an upgrade.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #276]

You are the desktop administrator for your company. You are preparing to upgrade a Windows 98 computer to Windows XP Professional.

In preparation for the upgrade, you consult the Windows XP Professional minimum hardware requirements and discover that the computer meets minimum requirements.

You want to verify that the computer's existing applications are compatible with Windows XP. What should you do?

nmlkjCreate an Unattend.txt file and perform a Windows XP Professional installation on a similar machine. Test all applications on the Windows XP system.

nmlkjInstall Windows XP on a different partition on the Windows 98 machine. Delete the Windows 98 partition after you have successfully used all applications under Windows XP.

nmlkj Create a Windows XP Professional image, copy it to a network share, and perform the installation using RIS.

nmlkji Run the winnt32/checkupgradeonly command on the Windows 98 computer.

You are the desktop administrator for your company. You are upgrading 26 Windows 98 computers to Windows XP Professional. You need to examine each computer's hardware and software readiness for Windows XP Professional.

You boot each computer and run the Winnt32 /checkupgradeonly command, along with the /unattend switch.

Which file should you examine after the command completes successfully?

nmlkj %systemroot%/compat.txt

nmlkj C:/compat.inf

nmlkji %systemroot%/upgrade.txt

nmlkj C:/compat.txt

Hacked by Piratez 70-270

Page 33: 70 270 q & a

Explanation:

The default file name is Upgrade.txt and it is stored in the %systemroot% folder (the folder where the current operating system files are stored). Running winnt32/checkupgradeonly on a Windows 98 machine performs a check on your computer for upgrade compatibility with Windows XP. If you use this option with /unattend, no user input is required. Otherwise, the results are displayed on the screen, and you can save them under the file name you specify.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #284]

Explanation:

The Scanstate command-line utility allows you to save existing settings and files for use with Windows XP Professional. After the successful installation of Windows XP, you use the Loadstate utility to load the settings and files on to the destination machine.

Manually copying files or exporting and importing policy or registry settings will be insufficient to capture all settings completely and apply them to the new systems. Windows 98 and Windows XP user profiles are incompatible, so simply using a roaming profile will not work.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #292]

You are the desktop administrator for your company. You need to upgrade the company CEO's computer from Windows 98 to Windows XP Professional without losing any files or settings.

You begin by running the Winnt32 /checkupgradeonly command to ensure the computer and its applications are compatible with Windows XP Professional. You quickly discover that the hardware is not adequate for an installation of Windows XP, and you acquire a new computer.

You need to ensure that all of the CEO’s files and settings are migrated to Windows XP Professional. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Manually copy the personal data files and settings to the new computer.

gfedc Export registry settings from the old computer and import them on the new computer.

gfedc Use the local group policy editor on the new system to import all personal settings.

gfedcb Run the Scanstate command-line tool on the old system.

gfedc Use the local group policy editor on the old system to export all personal settings.

gfedc Change the CEO’s local profile to a roaming profile.

gfedcb Run the Loadstate command-line tool on the new system.

Hacked by Piratez 70-270

Page 34: 70 270 q & a

Explanation:

The minimum memory requirement for a Windows XP Professional installation is 64 MB (recommended 128).

The minimum processor speed is 233 MHz with a recommended processor speed of 300 MHz. Windows XP also requires at least a 1.5 GB hard drive, a Super VGA card, a CD-ROM (recommended 12x) or DVD-ROM drive, as well as the standard keyboard and pointing device.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #303]

You are the desktop administrator for your company. You are preparing for an installation of Windows XP Professional on a computer that is currently running Windows 95. Chad, the user of the computer, has noticed that Windows 95 operating system is slow compared to other users in his group but is not sure why.

You perform a hardware inventory on the computer and note the following:

Processor – 300 MHz Free Hard Drive Space – 2 GB RAM – 48 MB CD-ROM - 8x 10/100 Mbps NIC

You need to prepare this computer to ensure it meets the minimum hardware requirements of Windows XP Professional. What should you do?

nmlkj Add a 12x CD-ROM.

nmlkji Add additional RAM.

nmlkj Add another hard drive with a minimum of 4GB of free space.

nmlkj Add a second 300MHz processor.

You are the desktop administrator for your company. You are preparing to upgrade a Windows NT machine to Windows XP Professional.

You begin by checking the machine and discovering that it is running Windows NT 4 Workstation with Service Pack 3. It also has 2 GB of free disk space, a 300 MHz processor, and 128 MB of RAM. You verify that the computer and its components are listed on the Hardware Compatibility List for Windows XP Professional.

You want to ensure a successful upgrade. What should you do before beginning the upgrade to Windows XP Professional?

nmlkj Upgrade the processor.

nmlkji Install Windows NT 4.0 Service Pack 5 or later.

nmlkj Upgrade to Windows NT 4.0 Server.

nmlkj Create an additional 2 GB partition.

Hacked by Piratez 70-270

Page 35: 70 270 q & a

Explanation:

You must install Service Pack 5 or later on an NT 4.0 Workstation to upgrade directly to Windows XP Professional.

The system meets the minimum processor requirement of 233 MHz and the minimum free disk requirement of 1.5 GB. You cannot perform an upgrade from Windows NT 4.0 Server to Windows XP Professional.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #311]

Explanation:

To upgrade this computer, take the following actions:

Increase the free disk space by adding another hard drive. A Windows XP installation requires at least 1.5 GB of available disk space. Upgrade to Windows 98, because you cannot perform a direct upgrade from Windows 95 to Windows XP Professional. Upgrade Windows 98 to Windows XP Professional.

The minimum memory requirement is 64 MB (recommended 128) with a maximum of 4 GB. The minimum processor speed for a Windows XP Professional installation is 233 MHz with a recommended processor speed of 300 MHz. Windows XP recognizes both basic and dynamic disks. You cannot upgrade from Windows 98 to Windows 2000 Server or from Windows 2000 Server to Windows XP Professional.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

You are the desktop administrator for your company. Michelle, a user in the marketing department, is currently running Windows 95 and has recently acquired an application that was developed to run most efficiently on Windows XP. Michelle has asked you to upgrade her computer to Windows XP Professional.

You begin by checking the hardware on Michelle's machine. You discover that her computer has a 233 MHz processor, 64 MB of RAM, and one basic disk with 500 MB of free space. You also check the Hardware Compatibility List for Windows XP. All of the computer's hardware is listed on the HCL.

You need to ensure a successful upgrade to Windows XP Professional. What steps should you take? (Choose all that apply. Each correct answer is part of the solution.)

gfedc Upgrade to Windows 2000 Server.

gfedc Add a second processor to the computer.

gfedcb Add a 2 GB hard drive to the computer.

gfedcb Upgrade to Windows XP Professional.

gfedc Add 64 MB of RAM to the computer.

gfedcb Upgrade to Windows 98.

gfedc Convert the basic disk to a dynamic disk

Hacked by Piratez 70-270

Page 36: 70 270 q & a

TestOut for Windows XP Administration, Section 10.1

[103 #319]

Explanation:

Use the Scanstate command to capture the user's configuration and save it to a network share that can be accessed from the destination computer. Use the Loadstate command to apply the user's state on a Windows XP computer.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #330]

You are the desktop administrator for your company. Upper-level managers have asked you to acquire and install Windows XP Professional for each of them. The managers currently run Windows 98 on some older machines and have recently purchased new machines for the installation of Windows XP.

You install Windows XP Professional on the new computers and prepare a shared network folder to store the managers' personal settings and files as you migrate them to Windows XP Professional.

You now need to transfer each manager's files and settings folders to the appropriate new Windows XP computer. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Run Savestate on the Windows XP systems after installation.

gfedc Run Savestate on the Windows XP systems before installation.

gfedcb Run Scanstate on the Windows 98 systems.

gfedc Run Savestate on the Windows 98 systems.

gfedcb Run Loadstate on the Windows XP systems after installation.

gfedc Run Loadstate on the Windows XP systems before installation.

You are a help desk technician for your company. Chad, a user of a Windows 98 computer, calls the help desk. Chad has recently installed a second 20 GB hard drive in the computer and installed Windows XP Professional to a NTFS partition on the new drive.

Chad wants to import his Windows 98 user profile settings to the new Windows XP Professional installation. What should you instruct the Chad to do? (Choose three. Each correct choice is part of the solution.)

gfedc Boot into Windows XP, and import the HKEY_CURRENT_USER registry key.

gfedcBoot into Windows XP and copy the appropriate user profile folder from the computer’s FAT32 partition to the NTFS partition.

gfedc Boot into Windows 98, and export the HKEY_CURRENT_USER registry key.

gfedcb Boot into Windows XP, run the File Settings and Transfer Wizard, and import the user profile settings.

gfedcbBoot into Windows 98, run the File Settings and Transfer Wizard, and export the user profile settings to a file on the FAT32 partition.

Hacked by Piratez 70-270

Page 37: 70 270 q & a

Explanation:

The File Settings and Transfer Wizard is useful for small scale transfers of user settings and files from a previous Windows operating system to Windows XP Professional. You need to run the File Settings and Transfer Wizard from both the new and old operating system. Running the wizard from the old operating system lets you export your files and settings. Running the wizard from the new operating system lets you import your files and settings. To run it on the old operating system, you can use a copy of the wizard on the Windows XP installation CD, or you can make a Wizard Disk (a floppy disk). Making a Wizard Disk is an option any time you run the wizard.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #340]

Explanation:

If you install the latest service pack (service pack 5 or later) for Windows NT 4.0, you can read and write basic NTFS volumes created by Windows XP Professional. However, you won’t have access to updated features such as encryption and disk quotas.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[103 #351]

gfedcBoot into Windows 98, run the File Settings and Transfer Wizard, and export the user profile settings to a file on the NTFS partition.

gfedcb Boot into Windows XP, run the File Settings and Transfer Wizard, and create a Wizard Disk.

You are the desktop administrator for your company. Rodney, a user in the research department, currently uses a computer with Windows NT 4.0 Workstation SP 3. Rodney wants you to install Windows XP Professional on a new 2 GB partition of the computer’s hard drive.

Rodney does not want to upgrade his copy of Windows NT to Windows XP because he uses an application that only runs in Windows NT 4.0. However, Rodney wants to ensure that he can access data on the new 2 GB partition when booted to Windows NT 4.0.

What should you do before installing Windows XP Professional?

nmlkjInstall Windows XP Professional to the new partition. Copy all updated file system drivers from the System32 folder in Windows XP to the System32 folder in Windows NT 4.0.

nmlkjInstall Windows XP Professional to the new partition. Download and install the latest service pack for Windows XP Professional.

nmlkji Install the latest service pack for Windows NT 4.0.

nmlkj Make sure to use dynamic updates when installing Windows XP Professional.

Hacked by Piratez 70-270

Page 38: 70 270 q & a

Explanation:

You can revert to the previous operating system after upgrading to Windows XP. System files are automatically saved unless there is not enough disk space on the system drive. If another partition with enough space exists, you will be prompted to save the system files in that location. To revert to the previous operating system, run Uninstall Windows XP from Add or Remove Programs (to remove the saved system files, use the Change/Remove option rather than running the uninstall program). You can also execute osuninst.exe from the %SystemRoot%\System32 folder, which can be useful if you need to uninstall XP using a batch file.

Objective(s):

103. Upgrade from a previous version of Windows to Windows XP Professional.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[103 #359]

You are the desktop administrator for your company. You just upgraded the company CEO’s computer from Windows 98 to Windows XP Professional.

During the upgrade, you save existing system files to the computer’s D: drive, which is a 2 GB FAT32 partition with 1.7 GB free space. After the upgrade, the CEO reports that an important application no longer works. Because the application is important to fulfilling a deadline, he asks you to revert to Windows 98.

You need to uninstall Windows XP Professional and revert to Windows 98 as soon as possible. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Boot to Safe mode and log on as a computer administrator.

gfedc At the command prompt, change to the %SystemRoot%/System32 folder and execute spuninst.exe.

gfedcb In Add or Remove Programs run Uninstall Windows XP.

gfedc In Add or Remove Programs change or remove Uninstall Windows XP.

gfedc At the command prompt, change to the %SystemRoot%/$NTUninstall$ folder and execute osuninst.exe.

You are a junior-level administrator responsible for the networked resources of a branch sales office for your company. You have been directed by the head of the IT Office to set up a network file share to be used by the IT support staff to upgrade existing workstations to Windows XP. Current plans involve upgrading 240 workstations, and there are concerns that if the process takes too long per machine, the process may extend beyond the project's approved timeframe.

You notice that the installation of the service packs seems to take almost as long as the initial load of the operating system. You want to find a way to reduce the time necessary to perform an installation of the operating system and any required service packs. You have the following CD-ROMs available for this task:

Windows XP Professional (Gold) Service Pack 1 Service Pack 2

What steps should you take? (Choose all that apply.)

gfedc Execute the Qchain.exe command.

gfedc Extract the files for Service Pack 1.

dc

Hacked by Piratez 70-270

Page 39: 70 270 q & a

Explanation:

You can improve the time necessary to perform each installation by:

1. Creating a network share including all files from the \i386 folder on the Windows XP CD-ROM. 2. Extracting the files for Service Pack 2. 3. Executing the Update.exe command using the -s option to update the installation files with the service pack files.

There is no \setup folder on the Windows XP CD-ROM to be used for installation. There is no reason to extract Service Pack 1's files, because Service Pack 2 includes all prior updates. The Qchain.exe utility is used to install multiple hotfixes with a single reboot of an existing installation, and is not appropriate for use in slipstreaming the service pack into the installation share.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #260]

Explanation:

Use the Add or Remove Programs applet in the Control Panel to remove hotfixes. Each hotfix also has a hidden uninstall folder named $NTUninstallid$ in the %systemroot% folder, where id is a unique identifier corresponding to the Technet article that addresses the hotfix (e.g., Q314862). You can also uninstall a hotfix by running \Spuninst\Spuninst.exe from the hotfix's uninstall folder. This is useful if you want to uninstall a hotfix using a batch file.

There is no -r option that will remove an applied hotfix, and the -z option will simply reinstall the hotfix without requiring an automatic reboot. Reapplying Service Pack 1 will not automatically remove all of the components installed by a later hotfix.

gfedcb Execute the Update.exe command using the -s option.

gfedc Create a network share including all files from the /setup folder on the Windows XP CD-ROM.

gfedcb Create a network share including all files from the /i386 folder on the Windows XP CD-ROM.

gfedcb Extract the files for Service Pack 2.

You are a network administrator responsible for managing the networked resources of your company. The network is a Windows 2000 mixed-mode domain with Windows XP workstations. After downloading and installing Service Pack 1 and a pre-SP2 hotfix for Internet Explorer from the Windows Update site, you find that a custom web application used by the Marketing department fails to work.

After checking newsgroups, you discover that the pre-SP2 hotfix has a known error that may cause this type of effect. You decide to remove the hotfix until a new version is released.

You want to remove the failed update while minimizing downtime and administrative effort. What should you do?

nmlkji Use Add or Remove Programs to remove the hotfix.

nmlkj Use the Recovery Console to remove the hotfix.

nmlkj Run the hotfix executable from the command line using the -r option.

nmlkj Edit the registry to prevent the hotfix from loading.

nmlkj Run the hotfix executable from the command line using the -z option.

nmlkj Reapply Service Pack 1 to roll back a configuration that does not include the hotfix.

Hacked by Piratez 70-270

Page 40: 70 270 q & a

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #270]

Explanation:

You cannot undo an Update.exe execution. Winnt32 /u is designed for unattended installations. You must recopy the contents of the original CD-ROM to the shared folder.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #280]

You are the desktop administrator for your company. You install Windows XP Professional from a shared network folder named //Srv2/WinXP.

You receive a Windows XP Service Pack CD. You apply the Service Pack to the //Srv2/WinXP folder. You then discover that the service pack contains several files that are incompatible with some new computers you have acquired.

You need to install Windows XP Professional on the new computers, but you want to make sure that the service pack files are not installed on the new computers until the problem has been corrected. What should you do?

nmlkj Run //Srv2/WinXP/Winnt32.exe /u on the new computers

nmlkjiCopy the contents of the Windows XP Professional CD to //Srv2/WinXP again, allowing the operating system to overwrite newer files.

nmlkj Run Update.exe /s //Srv2/WinXP /u from the Service Pack CD on Server1.

nmlkj Use Update.exe from the Service Pack CD on Srv2. Select the uninstall option.

You are the administrator of your company's network. Your company uses Windows XP Professional as a desktop operating system.

You receive a Windows XP Service Pack CD. You create a Windows Installer package file for the service pack and assign it to an OU named XPPro that contains all Windows XP Professional computers.

The desktop administrator for the marketing department reports that the service pack does not install. The desktop administrator for the research department verifies that the service pack is not installing.

You want the service pack to be deployed to all computers in the XPPro OU. What should you do?

nmlkj Use Computer Management to start the Windows Installer service on all computers in the XPPro OU.

Hacked by Piratez 70-270

Page 41: 70 270 q & a

Explanation:

The Read & Execute permission is required to the shared folder distribution point where the Windows Installer package is located. Without appropriate permission to the software distribution point, the software package cannot be accessed and deployed during the Group Policy application process.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #288]

Explanation:

You can use the Add or Remove Programs Wizard to uninstall a Windows XP installation that was performed as an upgrade on a Windows 98 computer. This will revert back to the Windows 98 operating system, and maintain user files, documents, and applications. Running the Windows 98 Setup will not save the existing applications.

System Restore is used to roll back the Windows XP operating system to a previous point. This is useful when you want to undo harmful changes made to your Windows XP operating system. The USMT wizard is used to migrate user files and settings from Windows 98 to Windows XP, or from one Windows XP installation to another. This tool cannot be used to migrate settings from Windows XP to Windows 98.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

nmkj Use Computer Management to start the Windows Installer service on all computers in the XPPro OU.

nmlkjRun WinINSTALL LE to repair the package file. Then redeploy the service pack to the computers in the XPPro OU.

nmlkjUse the local Administrator account to log on to the computers in the XPPro OU. Then redeploy the service pack to the computers in the XPPro OU.

nmlkji Grant Everyone the Read & Execute permission to the service pack deployment directory.

You are the desktop administrator for your company. Before leaving for vacation, you upgrade Rodney's computer from Windows 98 to Windows XP Professional.

After the upgrade, Rodney discovers that not all of his mission-critical applications work. Rodney needs these applications running immediately, without losing any of his original applications and documents.

You need to remove Windows XP and return Rodney's computer to Windows 98 using the least amount of effort and time. What should you do?

nmlkjUse the USMT wizard to save Rodney's files and application settings from the Windows XP installation. Reinstall Windows 98 and restore his files and settings.

nmlkjBack up all of Rodney's files and documents and use System Restore to restore Windows 98 and his files and documents.

nmlkji Use Add or Remove Programs to revert back to the Windows 98 installation.

nmlkjRun the Setup program from the Windows 98 installation CD and install Windows 98 in the same directory as the Windows XP installation.

Hacked by Piratez 70-270

Page 42: 70 270 q & a

TestOut for Windows XP Administration, Section 10.2

[104 #296]

Explanation:

You have a 30-day grace period in which to activate your Windows product installation. If the grace period expires and you have not completed activation, all features of Windows XP except the product activation feature will stop working. All customers who purchase retail packaged products or a new computer from an original equipment manufacturer (OEM) have to activate the product. However, product activation is not required for licenses that customers acquire through one of Microsoft's volume licensing programs, such as Open License or Select License.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[104 #304]

You are the network administrator for a company that has a volume license agreement with Microsoft. The company recently opened a small branch office in Las Vegas and sent you to Las Vegas to install Windows XP Professional on the branch office’s eight new computers.

Shortly after you arrive in Las Vegas, you realize you don't have your Windows XP Professional installation CD, so you purchase eight copies at a local retail outlet. Your installations are successful, and you return to your main office. A month later you receive a call from one of the Las Vegas employees and she informs you that no one can log on to their machines.

You need to make sure users in the branch office can log on to their machines. What should you do?

nmlkji Instruct the employees to activate their XP installation.

nmlkj Instruct the employees to boot into Safe Mode and choose Normal.

nmlkj Instruct the employees to perform an Emergency Repair Process using the ERD you created for them.

nmlkj Instruct the employees to disable the BIOS anti-virus software.

You are the desktop administrator for your company. You have just downloaded the latest Service Pack for Windows XP Professional to a local network share called XPsp on Server5. Your manager is experiencing problems that are resolved by applying the service pack.

You locate a test machine configured similar to your manager's computer and install the service pack. The installation of the service pack is successful on the test machine so you perform a successful installation of the service pack on your manager's computer. You now want to remove the service pack from the test machine.

You create a batch file that can be used for removing the service pack from the test machine (or any other machine).

What command should you include in the batch file to remove the service pack?

nmlkji %systemroot%/$NtServicePackUninstall$/spuninst/Spuninst.exe

nmlkj //Server5/XPsp/Servicepack.exe -r

nmlkj //Server5/XPsp/Update.exe -r

Hacked by Piratez 70-270

Page 43: 70 270 q & a

Explanation:

When installing a service pack, you have the option to save uninstall data. Uninstall data is saved to the %systemroot%\$NtServicePackUninstall$ folder. You can run the spuninst.exe program in the spuninst folder to remove the service pack. This gives you the ability to create a batch file that can be used to uninstall service packs. Possible switches for spuninst include:

-u Unattended mode -f Force other apps to close at shutdown -z Do not reboot when complete -q Quiet mode (no user interaction)

You can also remove a service pack using Add or Remove Programs.

The Update.exe -u command performs an unattended installation of the Windows XP service packs. There is no -r switch for Update.exe command. The Servicepack.exe command is used to integrate a service pack with the Windows XP installation files located on a network share. This network share is then accessed and the Windows XP installation, including the service pack, is installed on the target computer.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #312]

Explanation:

To complete the installation, you should:

1. Enable automatic registration by adding AutoActivate=yes to the Unattend section of the answer file. 2. Identify the product key by using the ProductKey= productkey entry in the answer file. (In Windows 2000, ProductKey

was called ProductID.) 3. Rename the Unattend.txt file to Winnt.sif to use the answer file with the CD-ROM.

nmlkj //Server5/XPsp/Update.exe -u

You are the desktop administrator for you company. You have been asked to install Windows XP Professional on the accounting manager's computer.

On your way to work, you stop and purchase a copy of Windows XP Professional. While creating an Unattend.txt file using your favorite text editor, you realize that you want to automatically activate the Windows XP Professional operating system during the installation from the CD-ROM.

What should you do to allow the automatic activation to take place? (Choose all that apply. Each correct answer is part of the solution).

gfedcb Rename the Unattend.txt file to Winnt.sif and copy it to a floppy disk.

gfedc Rename the Unattend.txt file to Unattend.udf and copy it to a floppy disk.

gfedcbAdd ProductKey=productkey (located on the Certificate Of Authenticity sticker) to the UserData section of the answer file.

gfedc Add AutoRegister=yes to the Unattend section of the answer file.

gfedcb Add AutoActivate=yes to the Unattend section of the answer file.

Hacked by Piratez 70-270

Page 44: 70 270 q & a

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[104 #320]

Explanation:

Heather will need to call the toll-free number to speak to a Microsoft representative and manually register her software. She could register through the Internet or directly through a modem, but neither an Internet connection nor a modem is available in this scenario. An installation to another partition might also work, although another partition might not exist. Also, if she were to install to another partition, she would need to reinstall all her applications. She would also need to make sure she does not break the license agreement by installing another copy of Windows XP.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[104 #329]

You are the desktop administrator for your company. Heather is a sales representative that travels quite frequently with her laptop. During one of her visits to the main office, she asks you to upgrade her computer to Windows XP Professional.

You perform the upgrade to Windows XP Professional and return the laptop to Heather. A month later, while sitting in an airport, Heather boots her laptop to get ready for her latest sales presentation. However, she is unable to use Windows XP. She calls you and admits that she never activated the operating system as instructed. She also cannot find an Internet connection in the airport and her laptop does not have a modem.

You need to ensure that Heather can boot up to Windows XP and give her presentation on time. What should you do?

nmlkjInstruct Heather to insert the Windows XP Professional CD-ROM and reactivate the trial-period for another thirty days.

nmlkj Instruct Heather to re-install Windows XP Professional to another partition.

nmlkji Instruct Heather to call Microsoft and activate the operating system over the phone.

nmlkj Instruct Heather to boot to Safe mode and log on as Administrator using a grace login.

You are the network administrator for a company that has a volume license agreement with Microsoft. The company recently opened a small branch office in Las Vegas and sent you to Las Vegas to install Windows XP Professional on the branch office’s eight new computers.

Shortly after you arrive in Las Vegas, you realize you don't have your Windows XP Professional installation CD, so you purchase a copy at a local retail outlet. You successfully install and activate the first computer. After installing the next computer, the activation process fails.

You want to activate all copies of Windows XP that you install at the branch office. What should you do?

Hacked by Piratez 70-270

Page 45: 70 270 q & a

Explanation:

Product activation is not required for licenses that customers acquire through one of Microsoft's volume licensing programs, such as Open License or Select License. However, you need to use the appropriate volume licensed media.

Objective(s):

104. Perform post-installation updates and product activation.

Reference(s):

TestOut for Windows XP Administration, Section 10.1

[104 #338]

Explanation:

The Windows XP Setup makes changes to the master boot record during setup. If the BIOS reports an error during Windows XP installation, it is simply detecting that a change in your master boot record has occurred. You should disable the BIOS virus checker.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #292]

nmlkjCreate an unattended.txt file that includes the product serial number of the retail copy of Windows XP that you purchased.

nmlkji Obtain the Windows XP Professional volume licensing media.

nmlkj Telephone Microsoft's clearing house to obtain the correct product ID.

nmlkj Enter your company's volume licensing product key as the product ID during the activation process.

You are the desktop administrator for your company. You are upgrading a computer from Windows 98 to Windows XP Professional. The computer is a 600 MHz Pentium III with 128 MB of RAM and a 10 GB hard disk. You are performing the installation using the Windows XP Professional CD-ROM.

After the text mode installation portion is complete, you restart the computer. The BIOS virus checker on your computer indicates that your computer is infected with a Master Boot Record virus.

You need to complete the Windows XP Professional installation. What should you do before continuing the installation?

nmlkji Disable virus scanning in the BIOS.

nmlkj Run Mbrfix.exe from the Windows XP Professional CD-ROM.

nmlkj Modify the Boot.ini file to include a signature parameter on the ARC path of the system partition.

nmlkj Remove the virus checker in Windows 98.

Hacked by Piratez 70-270

Page 46: 70 270 q & a

Explanation:

Adding the /sos switch to the Boot.ini statement that starts the Windows XP installation allows you to view the drivers as they are being loaded and can be helpful in determining which driver is causing the problem. Alternatively you can use the Windows XP CD-ROM to boot to the Recovery Console and use the More command to view the contents of the Setup.log file. This file, located in the %systemroot%\repair directory, contains the steps that had taken place during the installation and can help you determine which driver is causing the installation to fail.

A different source path will not resolve the driver problem. It will only allow the files to be copied from a different location.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #300]

You are the desktop administrator for your company. You have been asked to install Windows XP Professional on a computer that is currently running Windows 98.

You successfully complete the text-based portion of the installation. However, before the GUI-portion begins, the installation stops unexpectedly. You start the installation again and experience the same result. You then do some research and discover that the problem is occurring while the drivers are being loaded.

You want to determine which driver is causing the problem. What should you do? (Choose two possible solutions.)

gfedc Restart the installation using the /verify switch.

gfedc Restart the installation using the /s switch and specify a different source path.

gfedcb Modify the Boot.ini file. Add the /sos switch.

gfedcb Restart the computer. Use the Recovery Console to view the Setup.log file.

You are the network administrator for your company. A junior administrator upgrades a user's computer from Windows 98 to Windows XP Professional without first consulting the Windows XP Hardware Compatibility List.

The user then logs in and tries to run an application that was previously accessible in Windows 98. The application displays an error and stops working. The junior administrator calls you for help. The application is one that you know will not run on Windows XP. You direct the junior administrator to uninstall Windows XP and revert to Windows 98, but the option is not available. The junior administrator explains that there was not enough disk space to save uninstallation files.

You need to help the junior administrator revert to Windows 98. What should you instruct the junior administrator to do?

nmlkjiCopy all of the user's folders and files to a network share. Re-install Windows 98 and the required applications. Copy the user's folders and files from the network share to the new Windows 98 installation.

nmlkjBack up all of the user's files and documents and use System Restore to restore Windows 98 and the user's files and documents.

nmlkj Use Add or Remove Programs to revert to Windows 98.

nmlkj Start the computer in Safe Mode with Command Prompt. Run osuninst.exe from the System32 directory.

Hacked by Piratez 70-270

Page 47: 70 270 q & a

Explanation:

Because no uninstall data was created, you need to save the folders and files by copying them to a safe location before re-installing Windows 98. After reinstalling, copy the files back to the computer and reinstall the user's applications.

System Restore is used to roll back the Windows XP operating system to a previous point. This is useful when you want to undo harmful changes made to your Windows XP operating system.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #316]

Explanation:

Start the installation using the winnt32 /debug0:xpdebug.log switch. This creates a debug log at the level specified, for example, /debug0:XPDebug.log. The format of this switch is /debuglevel:logfile. The log levels are as follows:

0 represents severe errors 1 represents errors 2 represents warnings 3 represents information 4 represents detailed information for debugging

Setting debugging to a higher level includes all debug information included in lower debug levels. For example, debug level 2 includes all information reported for level 1. The default debug level (if the switch is omitted) is 2, and the default log file (if a log file is omitted in the switch) is C:\%systemroot%\Winnt32.log.

Booting to the Windows 2000 Professional installation and adding the /debug switch allows you to debug that installation, but not the XP installation. Likewise, booting to the Recovery Console or using Debugging Mode can allow you to troubleshoot the Windows 2000 Professional installation, but will not be helpful in determining the problem with the XP installation.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

You are the desktop administrator for your company. You are attempting to upgrade a computer from Windows 2000 Professional to Windows XP Professional. However during the installation of Windows XP, you keep receiving a blue screen and the installation stops and hangs.

Which of the following steps should you take to determine why the installation of Windows XP is not successful?

nmlkji Start the installation of Windows XP using the winnt32.exe /debug0:XPDebug.log command.

nmlkjBoot into the Recovery Console and list the services and drivers that are available using the Listsvc command. Check to ensure the drivers are current.

nmlkjReboot to the Windows 2000 Professional installation, and add the /debug switch to the Windows 2000 Professional boot menu choice. Restart the installation.

nmlkjBoot the computer and choose Debugging Mode from the Advanced Boot Options menu. Use the DumpExam and CheckDump commands to determine the problem.

Hacked by Piratez 70-270

Page 48: 70 270 q & a

TestOut for Windows XP Administration, Section 10.2

[105 #324]

Explanation:

A Windows XP computer must have a computer account in a domain it is trying to join. Before you start the Windows XP Setup wizard, ask your network administrator to create a computer account. Or, if you have the appropriate privileges, you can create the account during the setup process and join the domain. If you have difficulty joining a domain during the setup process, join a workgroup instead, then join the domain after you finish installing Windows XP Professional.

Removing the Windows 98 installation from the domain will not have any impact on the problem being seen by the installation of Windows XP Professional.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #332]

You are the desktop administrator for your company. You are upgrading a Windows 98 computer named Everest to Windows XP Professional. The Everest computer is currently part of the Mountains.com domain.

During the upgrade, you are asked whether to join a domain or be part of a workgroup. You try to join the BigMountains.com domain but the installation fails because it cannot locate a computer account for Everest.

You need to install Windows XP Professional on the Everest computer. What can you do? (Choose all that apply.)

gfedcbContact an administrator for the domain and ask them to create a computer account for Everest in the BigMountains.com domain.

gfedcReboot the computer to Windows 98, remove Everest from the Mountains.com domain, and join a workgroup. Then restart the Windows XP installation and join the BigMountains domain during the installation process.

gfedcb During the installation, choose to join a workgroup.

gfedcbSupply the appropriate credentials to create the Everest computer account during the installation of Windows XP.

You are the desktop administrator for your company. You are attempting to install a new copy of Windows XP Professional on a Windows 98 computer. The new Windows XP operating system files will be located on a separate partition.

You have already tried to perform the installation, but failed. On your next installation attempt, you want to find out as much information as possible regarding what succeeds and fails during the installation. Which command should you use to start the installation?

nmlkj Winnt32 /debug5

nmlkji Winnt32 /debug4

nmlkj Winnt32 /debug3

nmlkj Winnt32 /debug2

nmlkj Winnt32 /debug1

nmlkj Winnt32 /debug0

Hacked by Piratez 70-270

Page 49: 70 270 q & a

Explanation:

By adding a /debug switch to the winnt32 command, you can generate a log file with information about the installation process. The format of this switch is /debuglevel:logfile. The log levels are as follows:

0 represents severe errors 1 represents errors 2 represents warnings 3 represents information 4 represents detailed information for debugging

More detailed levels include less detailed levels. For example, level 2 also includes level 1. The default debug level (if the switch is omitted) is 2, and the default log file (if a log file is omitted in the switch) is C:\%systemroot%\Winnt32.log.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #340]

Explanation:

You cannot uninstall Windows XP and revert to the previous operating system when the operating system was upgraded from Windows NT 4.0 or Windows 2000. This option is only available when upgrading from Windows 98 or Windows ME. Therefore, you will need to back up the user's files, reinstall the operating system, restore the user's files, and reinstall the user's applications.

System Restore is used to roll back the Windows XP operating system to a previous point. This is useful when you want to undo harmful changes made to your Windows XP operating system.

Objective(s):

105. Troubleshoot failed installations.

You are the network administrator for your company. A junior administrator upgrades a user's computer from Windows 2000 to Windows XP Professional without first consulting the Windows XP Hardware Compatibility List.

The user then logs in and tries to run an application that was previously accessible in Windows 2000. The application displays an error and stops working. The junior administrator calls you for help. The application is one that you know will not run on Windows XP.

You need to help the junior administrator revert to Windows 2000. What should you instruct the junior administrator to do?

nmlkj Use Add or Remove Programs to revert to Windows 2000.

nmlkj Start the computer in Safe Mode with Command Prompt. Run osuninst.exe from the System32 directory.

nmlkjBack up all of the user's files and documents and use System Restore to restore Windows 2000 Professional and the user's files and documents.

nmlkjiCopy all of the user's folders and files to a network share. Re-install Windows 2000 and the required applications. Copy the user's folders and files from the network share to the new Windows 2000 installation.

Hacked by Piratez 70-270

Page 50: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #350]

Explanation:

Installing Windows 2000 after Windows XP replaces the master boot record and system files, such as Ntldr and Ntdetect.com. The Windows 2000 versions of Ntldr and Ntdetect.com cannot be used to boot to Windows XP. You need to replace the Windows 2000 versions of Ntldr and Ntdetect.com with the Windows XP versions. You can use the repair features of the Windows XP Professional CD to do this, but not the Windows 2000 CD.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #378]

You are the desktop administrator for your company. A junior administrator calls and asks for help configuring a computer to dual-boot between Windows 2000 Professional and Windows XP Professional.

The junior administrator installed Windows 2000 Professional on a separate partition of an existing Windows XP computer. Now, Windows XP is inaccessible.

You need to explain to the junior administrator how to solve this problem. What should you instruct the junior administrator to do? (Choose two. Each correct answer is part of the solution.)

gfedc Edit the boot.ini file and change the ARC path to the Windows XP installation.

gfedcb Copy the Windows XP version of the Ntdetect.com file to the system partition.

gfedcBoot to the Windows 2000 installation CD and use the repair features to fix the master boot record and system files.

gfedc Edit the boot.ini file and add /fastdetect to the Windows XP execution line.

gfedcb Copy the Windows XP version of the Ntldr file to the system partition.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system.

You just installed a new Windows XP Professional using the same distribution share on the network that you normally use to install new Windows XP Professional computers. You then boot to the new operating system and log on as Administrator so you can begin installing a specialized application for the target user. After you log on, the operating system appears unstable.

You want to verify that the operating system files were copied from the network share without becoming corrupted. What should you do?

nmlkj Run the Sfc.exe /revert command.

nmlkj Run the Sfc.exe /scanboot command.

Hacked by Piratez 70-270

Page 51: 70 270 q & a

Explanation:

You can use System File Checker (Sfc.exe) to verify the integrity of protected system files. Normally, Windows XP’s Windows File Protection feature detects changes to protected system files and replaces damaged or deleted system files with a cached copy. However, this scenario illustrates an example of how changes to protected files can occur when the operating system is not running. Therefore, Windows File Protection will not be triggered, and you will have to manually scan the system files using Sfc.exe. Use the /scannow switch to perform a scan immediately. The /scanboot switch configures the operating system to perform a scan every time the operating system boots. The /revert switch changes the scan behavior back to the default, and the /cachesize = size switch configures how much disk space can be used to store cached versions of protected system files.

Objective(s):

105. Troubleshoot failed installations.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[105 #387]

nmlkji Run the Sfc.exe /scannow command.

nmlkj Run the Sfc.exe /cachesize command.

Hacked by Piratez 70-270

Page 52: 70 270 q & a

200

Implementing

and Conducting Administration of Resources

Page 53: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

New files created or copied to a compressed folder are compressed. Therefore, files created in the Prestage folder will be compressed. When you move compressed files within a partition, they retain their compression attribute. When you copy files within a partition or move files to another partition, they inherit the compression attribute of the destination folder. Therefore, you do not need to do anything in this scenario to ensure that files are always compressed. If you copied rather than moved files from the compressed Prestage folder to the uncompressed Wwwroot folder, you would need to enable compression for the Wwwroot folder or compress each individual file after the copy. Both basic and dynamic disks support file compression. You simply need to make sure the partition or volume uses NTFS.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #260]

You are a help desk technician for your company. You maintain an internal web site on your Windows XP Professional computer for other help desk technicians. You pre-stage documents for your web site in a compressed folder named Prestage.

You create new documents in the Prestage folder. When the documents are complete, you publish them to your web site by moving them to the Inetpub/Wwwroot folder, which is an uncompressed folder on the same NTFS partition. Later, if you need to make corrections, you copy documents back to the Prestage folder, make the needed corrections, and move the documents to the Wwwroot folder again.

You want to make sure that files you create in the Prestage folder are always compressed while they are in the Prestage folder, after you move them to the Wwwroot folder, and after you copy them back to the Prestage folder to make corrections. What must you do?

nmlkjiYou do not need to do anything. Based on the current configuration and work flow, files will be compressed in both the Prestage folder and the Wwwroot folder.

nmlkjConfigure the Compress file attribute for all files that you move from the Prestage folder to the Wwwroot folder.

nmlkjConfigure the Compress file attribute for all files that you create in the Prestage folder before you move them to the Wwwroot folder.

nmlkjUpgrade the disk on which the Wwwroot folder exists to be a dynamic disk, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjChange the file system format of the partition on which the Wwwroot folder exists, then configure the Compress folder attribute for the Wwwroot folder.

nmlkj Configure the Compress folder attribute for the Wwwroot folder.

You are a help desk technician for your company. You maintain an internal web site on your Windows XP Professional computer for other help desk technicians. You pre-stage documents for your web site in a compressed folder named Prestage.

You create new documents in the Prestage folder. When the documents are complete, you publish them to your web site by moving them to the Inetpub/Wwwroot folder, which is an uncompressed folder on another NTFS partition. Later, if you need to make corrections, you copy documents back to the Prestage folder, make the needed corrections, and move the documents to the Wwwroot folder again.

You want to make sure that files you create in the Prestage folder are always compressed while they are in the Prestage folder, after you move them to the Wwwroot folder, and after you copy them back to the Prestage folder

?

Page 54: 70 270 q & a

Explanation:

New files created or copied to a compressed folder are compressed. Therefore, files created in the Prestage folder will be compressed. When you move compressed files within a partition, they retain their compression attribute. When you copy files within a partition or move files to another partition, they inherit the compression attribute of the destination folder. Because you are moving files from the compressed Prestage folder to the uncompressed Wwwroot folder on another partition, you need to enable compression for the Wwwroot folder. Both basic and dynamic disks support file compression. You simply need to make sure the partition or volume uses NTFS.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #270]

to make corrections. What must you do?

nmlkjYou do not need to do anything. Based on the current configuration and work flow, files will be compressed in both the Prestage folder and the Wwwroot folder.

nmlkjUpgrade the disk on which the Wwwroot folder exists to be a dynamic disk, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjChange the file system format of the partition on which the Wwwroot folder exists, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjConfigure the Compress file attribute for all files that you create in the Prestage folder before you move them to the Wwwroot folder.

nmlkji Configure the Compress folder attribute for the Wwwroot folder.

You are a help desk technician for your company. You maintain an internal web site on your Windows XP Professional computer for other help desk technicians. You pre-stage documents for your web site in a compressed folder named Prestage.

You create new documents in the Prestage folder. When the documents are complete, you publish them to your web site by moving them to the Inetpub/Wwwroot folder, which is an uncompressed folder on a FAT32 partition. Later, if you need to make corrections, you copy documents back to the Prestage folder, make the needed corrections, and move the documents to the Wwwroot folder again.

You want to make sure that files you create in the Prestage folder are always compressed while they are in the Prestage folder, after you move them to the Wwwroot folder, and after you copy them back to the Prestage folder to make corrections. What must you do?

nmlkjUpgrade the disk on which the Wwwroot folder exists to be a dynamic disk, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjiChange the file system format of the partition on which the Wwwroot folder exists, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjConfigure the Compress file attribute for all files that you create in the Prestage folder before you move them to the Wwwroot folder.

nmlkj Configure the Compress folder attribute for the Wwwroot folder.

nmlkjYou do not need to do anything. Based on the current configuration and work flow, files will be compressed in both the Prestage folder and the Wwwroot folder.

Hacked by Piratez 70-270

Page 55: 70 270 q & a

Explanation:

New files created or copied to a compressed folder are compressed. Therefore, files created in the Prestage folder will be compressed. When you move compressed files within a partition, they retain their compression attribute. When you copy files within a partition or move files to another partition, they inherit the compression attribute of the destination folder. Because you are moving files from the compressed Prestage folder to the uncompressed Wwwroot folder on another partition, you need to enable compression for the Wwwroot folder. But you will need to format the partition or volume using NTFS before you can compress the folder. Both basic and dynamic disks support file compression.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #279]

Explanation:

New files created or copied to a compressed folder are compressed. Therefore, files created in the Prestage folder will be compressed. When you move compressed files within a partition, they retain their compression attribute. When you copy files within a partition or move files to another partition, they inherit the compression attribute of the destination folder. Because you are copying files from the compressed Prestage folder to the uncompressed Wwwroot folder, you need to enable compression for the Wwwroot folder. Both basic and dynamic disks support file compression. You simply need to make sure the partition or volume uses NTFS.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

You are a help desk technician for your company. You maintain an internal web site on your Windows XP Professional computer for other help desk technicians. You pre-stage documents for your web site in a compressed folder named Prestage.

You create new documents in the Prestage folder. When the documents are complete, you publish them to your web site by copying them to the Inetpub/Wwwroot folder, which is an uncompressed folder on the same NTFS partition. Later, if you need to make corrections, you make the needed corrections to the document copies in the Prestage folder, and copy the documents to the Wwwroot folder again.

You want to make sure that files you create in the Prestage folder are always compressed while they are in the Prestage folder and after you copy them to the Wwwroot folder. What must you do?

nmlkjChange the file system format of the partition on which the Wwwroot folder exists, then configure the Compress folder attribute for the Wwwroot folder.

nmlkjYou do not need to do anything. Based on the current configuration and work flow, files will be compressed in both the Prestage folder and the Wwwroot folder.

nmlkjUpgrade the disk on which the Wwwroot folder exists to be a dynamic disk, then configure the Compress folder attribute for the Wwwroot folder.

nmlkji Configure the Compress folder attribute for the Wwwroot folder.

nmlkjConfigure the Compress file attribute for all files that you create in the Prestage folder before you move them to the Wwwroot folder.

Hacked by Piratez 70-270

Page 56: 70 270 q & a

TestOut for Windows XP Administration, Section 5.1

[201 #288]

Explanation:

Windows XP does not support NTFS compression on volumes with cluster sizes larger than 4 KB. Compression on large clusters causes performance problems. If you select a cluster size larger than 4 KB when you format an NTFS volume, you can't use compression on that volume. To change the cluster size, reformat the drive (be sure to back up all data on the drive before reformatting it).

Compression is supported on volumes formatted with NTFS, regardless of whether the volume is on a basic or dynamic disk. If the problem was related to insufficient disk space for the compression routine, the compression option would still be available, but the action would fail. There is no policy that prevents compression. If there were, it would apply to the entire computer, not to an individual drive.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #297]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. The computer has two hard drives. The operating system is installed on the first drive, which has a single 4 GB partition. Programs and data files are stored on the second drive, which has a single 10 GB partition with over half of it free. Both drives are formatted with NTFS.

Rodney tries to compress the Data folder on the second drive, but the compression option is disabled. Upon further investigation, he determines that the option isn't available for any files or folders on this drive. Rodney next copies a test folder onto the first drive along with a number of files. He is able to compress this folder without problems.

You need to make sure Rodney can compress files on the second drive. What should you do?

nmlkj Disable the "Prevent disk compression" local policy.

nmlkji Reformat the second drive using a cluster size of 4 KB or smaller.

nmlkj Free up disk space on the second drive.

nmlkj Upgrade the second disk to a dynamic disk.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney has a 1.9-MB bitmap file. It resides on the computer’s compressed C: drive. The file is compressed to 1.1 MB.

Rodney tries to copy the bitmap file to a 1.44 MB floppy disk but receives the message, "Insufficient disk space."

You need to help Rodney copy the bitmap file to the floppy disk. What should you do? (Choose two solutions.)

gfedc Uncompress the file before you copy it to the floppy drive.

gfedcb Put the file in a compressed (zipped) folder, and copy the folder to the floppy disk.

gfedc Format the floppy disk using the NTFS file system

Hacked by Piratez 70-270

Page 57: 70 270 q & a

Explanation:

Files that are compressed using the NTFS file compression attribute are uncompressed when they are moved to a floppy drive. The best way to overcome this problem is to use a third party compression utility like Pkzip or a compressed (zipped) folder, which provides similar functionality. Zipped folders are new to Windows XP, can be stored on any FAT or NTFS volume, and are compatible with other programs that create zipped files such as Winzip or PKzip. You cannot format a floppy disk using NTFS.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #305]

Explanation:

Always assign the most restrictive permission that will still allow the user to do the job. Read & Execute is the minimum permission required to traverse folders (move through a folder to a subfolder), and Modify is the minimum permission required to delete folders.

Granting Read & Execute to each would let Judith traverse folders but would not let Dalton delete them. Granting Modify to each would let Judith traverse folders and Dalton delete folders, but it would also allow Judith to delete folders.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.2

[201 #314]

gfedc Format the floppy disk using the NTFS file system.

gfedc Edit the properties of the file's folder and enable compression. Then copy the entire folder to the floppy disk.

gfedcb Compress the file with a third-party compression tool, then transfer it to the floppy disk.

You are the desktop administrator for your company. Taylor and his co-workers Judith and Dalton can all log on to the same Windows XP Professional computer. Taylor is the owner of all files and folders on the computer. Taylor wants Judith to be able to see the files and subfolders in each folder and to navigate through folders to other folders. Taylor wants Dalton to be able to do these same things, but also to be able to delete folders.

You need to help Taylor configure permissions. What permissions should Taylor grant?

nmlkji Read & Execute to Judith; Modify to Dalton

nmlkj Modify to each

nmlkj List Folder Contents to Judith; Full Control to Dalton

nmlkj Read & Execute to each

You are the network administrator for your company Jonathan's manager requests you to disable Jonathan's

Hacked by Piratez 70-270

Page 58: 70 270 q & a

Explanation:

To correct the problem, you need to recreate the group, assign permissions to the group, and make Jonathan a member of that group. When you delete a group, all information about the group is deleted. User accounts, however, are not deleted. They are simply no longer associated with the group. You must recreate the group as if it never had existed.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #322]

Explanation:

The Reports group's security identifier has not changed and the group still has permission to the folder. Therefore, to correct the problem, you simply need to add Jonathan’s user account back to the Reports group.

You are the network administrator for your company. Jonathan s manager requests you to disable Jonathan s access to a network share named Financial. Jonathan's user account is the only member in a group named Reports. The Reports group has the Full Control permission to the Financial share.

You delete the Reports group. You later find out that the manager was in error and that Jonathan should have his access to the Financial share restored.

You need to restore Jonathan’s access to the Financial share as quickly as possible. What should you do?

nmlkjRecreate the Reports group and add Jonathan's existing user account to Reports. Do not adjust NTFS permissions.

nmlkjRecreate the Reports group and grant Reports the NTFS Full Control permission to Financial. Jonathan's user account will still be a member of Reports.

nmlkj Recreate the Reports group and re-create Jonathan's user account. Use existing NTFS permissions.

nmlkjiRecreate the Reports group and grant Reports the Full Control permission to Financial. Add Jonathan's user account to Reports.

You are the network administrator for your company. Jonathan's manager requests you to disable Jonathan's access to a network share named Financial. Jonathan's user account is the only member in a group named Reports. The Reports group has the Full Control permission to the Financial share.

You remove Jonathan’s user account from the Reports group. You later find out that the manager was in error and that Jonathan should have his access to the Financial share restored.

You need to restore Jonathan’s access to the Financial share as quickly as possible. What should you do?

nmlkji Add Jonathan’s user account to the Reports group. Use existing NTFS permissions.

nmlkjDelete and recreate the Reports group. Grant Reports the NTFS Full Control permission to Financial. Add Jonathan's user account as a member of Reports.

nmlkjCreate a new user account for Jonathan. Add the new user account to the Reports group. Do not adjust NTFS permissions.

nmlkjCreate a Reports2 group and grant Reports the Full Control permission to Financial. Add Jonathan's user account to Reports2.

Hacked by Piratez 70-270

Page 59: 70 270 q & a

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #330]

Explanation:

If a user is a member of a group that has permission to access a folder but still cannot access the folder, the user could be explicitly denied access to the folder by virtue of membership in another group.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.2

[201 #338]

You are the network administrator for your company. Sally wants to access a file in the Reports folder. A group named Sales has been granted the Full Control permission to the Reports folder and all subfolders and files.

You add Sally as a member of the Sales group, but she still cannot access the file that she needs.

You want to let Sally access the Reports folder. What should you do?

nmlkj Delete and recreate Sally’s user account on the local computer.

nmlkj Remove Sally from the Sales group, then add her to the Sales group again.

nmlkj Create a new group, give it rights to the Reports folder, and then add Sally to the group.

nmlkji Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

You are the network administrator for your company. Sally is an employee in the Sales department. Important documents are stored in the SalesDocs folder on a Windows XP Professional computer. Sally is a member of the Domain Users and Sales groups. The SalesDocs folder has been shared and the following permissions are currently assigned to the SalesDocs folder:

Share Domain Users: Allow-Read Sales: Allow-Change NTFS Domain Users: Allow-Read Sales: Allow-Modify Sally needs to read and modify all files in the SalesDocs folder except StyleGuide.doc. Sally should be able to read StyleGuide.doc but not modify it. What should you do?

Hacked by Piratez 70-270

Page 60: 70 270 q & a

Explanation:

The best way to prevent Sally from modifying StyleGuide.doc without preventing authorized users from modifying it is to configure the NTFS permission for StyleGuide.doc to Deny-Write for Sally. Removing Sally from the Sales group would no longer let Sally edit other documents in the SalesDocs folder.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #346]

Explanation:

By default, the Everyone group has the Allow-Full Control share and NTFS permissions. Changing either permission to Read still lets Everyone read each others' files. Changing either permission to Deny-Full Control prevents all users from reading any file. By removing the Everyone group, access is limited to those who are expressly given permission. To simplify permissions, it is best to keep the default share permissions and configure only NTFS permissions.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

nmlkj Disable permissions inheritance on StyleGuide.doc.

nmlkji Set Sally’s NTFS permission for StyleGuide.doc to Deny-Write.

nmlkj Configure StyleGuide.doc to be a hidden file.

nmlkj Configure StyleGuide.doc to be a system file.

nmlkj Remove Sally from the Sales group.

You are the desktop administrator for your company. A Windows XP Professional computer named Wrk1 is a member of a Windows 2000 domain. A folder on Wrk1 named F:/Sales/Research is located on an NTFS drive and shared as SalesRsch. All share and NTFS permissions are currently set according to their default configuration.

You have the following objectives:

1. Allow all users with valid domain accounts to create files in SalesRsch 2. Prevent users from accessing other users' files 3. Allow all users with valid domain accounts to update files they create in SalesRsch 4. Allow the creator of a file to grant access for their file to other users

What should you do to achieve objective 2?

nmlkj Remove all permissions except the Assign-Read permission for the Everyone group on F:/Sales/Research.

nmlkj Assign the Deny-Full Control for the Everyone group on F:/Sales/Research.

nmlkji Remove the Everyone group from the access control list of F:/Sales/Research.

nmlkj Remove the Everyone group from the access control list of SalesRsch.

Hacked by Piratez 70-270

Page 61: 70 270 q & a

TestOut for Windows XP Administration, Section 5.3

[201 #355]

Explanation:

The best plan is to first secure the folder with appropriate NTFS permissions, and then share the folder using the default share permission (Full Control to the Everyone group). Using the recommended approach, NTFS permissions effectively control all access (because NTFS permissions are more restrictive than share permissions). If you try to set custom share and NTFS permissions, it can quickly become confusing as to which permissions will apply.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #363]

You are the desktop administrator for your company. Sally's Windows XP Professional computer is joined to a Windows 2000 domain. Sally has a folder with very sensitive files that she wants to make available over the network, but only to Michelle. What is the best way for Sally to do this?

nmlkjShare the folder with the Read share permission granted to the Everyone group. Use NTFS permissions to allow access only to Michelle.

nmlkjRemove the Everyone group from the share’s access control list. Add Michelle with the Read share permission.

nmlkjRemove the Everyone group from the share’s access control list. Add Michelle with the Full Control share permission.

nmlkji Share the folder with the default share permissions. Use NTFS permissions to allow access to only Michelle.

You are the desktop administrator for your company. A Windows XP Professional computer named Wrk1 is a member of a Windows 2000 domain. A folder on Wrk1 named F:/Sales/Research is shared as SalesRsch. The SalesRsch share has three subfolders: Projects, Analysis, and Reports. Permission inheritance is enabled on F:/Sales/Research and all subfolders and files. Only the Administrators group, Power Users group, and one designated employee have permission to each subfolder. Permissions are configured as follows:

Stan needs to read all the documents within SalesRsch and its subfolders Stan does not need to make changes

Resource Type of Permission Effective PermissionsSalesRsch Share Everyone: Allow-Full Control

F:/Sales/Research NTFS Administrators: Allow-Full Control Power Users: Allow-Modify

Projects NTFSBilly: Allow-Modify Administrators: Allow-Full Control Power Users: Allow-Modify

Analysis NTFSAnne: Allow-Modify Administrators: Allow-Full Control Power Users: Allow-Modify

Reports NTFSGavin: Allow-Modify Administrators: Allow-Full Control Power Users: Allow-Modify

Hacked by Piratez 70-270

Page 62: 70 270 q & a

Explanation:

Assigning Stan the Allow-Read NTFS permission for F:\Sales\Research will let him read, but not modify, documents within the SalesRsch share. Because permission inheritance is enabled, Stan will also have the Allow-Read NTFS permission for each subfolder. Assigning Stan the Allow-Read Share permission will not grant him the appropriate NTFS permissions. Making Stan a member of the Power Users group will give Stan too many permissions.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #371]

Stan needs to read all the documents within SalesRsch and its subfolders. Stan does not need to make changes to these documents. You need to give Stan appropriate permissions without giving him unnecessary permissions. What should you do?

nmlkji Assign Stan the Allow-Read NTFS permission to F:/Sales/Research.

nmlkj Make Stan a member of the Power Users group.

nmlkj Disable permission inheritance on F:/Sales/Research.

nmlkj Configure the Read-only file attribute for F:/Sales/Research and all subfolders and files.

nmlkj Assign Stan the Allow-Read Share permission to SalesRsch.

You are the desktop administrator for your company. A Windows XP Professional computer named Wrk1 is a member of a Windows 2000 domain. A folder on Wrk1 named D:/Data is shared as Data. Permissions are configured as follows:

You want to let users with a valid domain account create files in the Data share. You also want to let users read and modify files they have created. You want to prevent users from accessing files created by other users, by default. However, you want to let users adjust permissions to files they have created. What should you do?

Resource Type of Permission Effective PermissionsData Share Everyone: Allow-Read

D:/Data NTFS Everyone: Allow-Full ControlCreator Owner: Allow-Modify

nmlkji

Assign the Everyone group the Allow-Full Control share permission. Remove the current NTFS permissions assigned to the Everyone group and assign the Everyone group the Allow-Create Files/Write Data NTFS special permission to the D:/Data folder. Assign the Creator Owner group the Allow-Full Control NTFS permission.

nmlkj

Assign the Everyone group the Allow-Read share permission. Remove the current NTFS permissions assigned to the Everyone group and assign the Everyone group the Allow-Create Files/Write Data NTFS special permission to the D:/Data folder. Assign the Creator Owner group the Allow-Full Control NTFS permission.

nmlkjAssign the Everyone group the Allow-Full Control share permission. Remove the current NTFS permissions assigned to the Everyone group and assign the Everyone group the Deny-Modify NTFS permission to the D:/Data folder. Assign the Creator Owner group the Allow-Full Control NTFS permission.

nmlkj

Assign the Everyone group the Allow-Full Control share permission. Remove the current NTFS permissions assigned to the Everyone group and assign the Everyone group the Allow-Create Files/Write Data NTFS special permission to the D:/Data folder. Keep the current NTFS permissions assigned to the Creator Owner group.

Hacked by Piratez 70-270

Page 63: 70 270 q & a

Explanation:

Assigning the Everyone group Allow-Full Control share permission simplifies permission assignments by letting administrators focus on NTFS permissions. To prevent Everyone from having full control to the files, remove the current NTFS permissions assigned to the Everyone group. To let users create files in the D:\Data folder, assign the Create Files/Write Data special NTFS permission. To let a file’s creator/owner assign permissions, grant Full Control to the Creator Owner group.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #380]

Explanation:

Because no user should be able to access the D:\Confidential folder over the network, the folder will not be shared and no share permissions should be applied. Only NTFS permissions will be applied. The Everyone group should be removed from the folder’s access control list, and your user account should be granted the Full Control permission. The Trusted local group should be granted the Modify NTFS permission to let users in this group read, update, and delete its contents.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.2

You are the desktop administrator for your company. Your company’s Windows network has over 100 users that share over 50 Windows XP Professional computers. All computers are members of a Windows 2000 domain.

You want to teach users to secure their files and folders. As an example, you are demonstrating how to secure the D:/Confidential folder on a Windows XP Professional computer so that only members of the Trusted local group have access to the folder. The Trusted local group should be able to create, read, update, and delete contents of the D:/Confidential folder, but not change the folder’s permissions. Only your user account should have full control of the folder and its contents. No users should be able to access the folder over the network.

How should you configure the D:/Confidential folder? (Choose all that apply.)

gfedc Assign the Everyone group the Full Control share permission.

gfedcb Assign your user account the Full Control NTFS permission.

gfedcb Assign the Trusted local group the Modify NTFS permission.

gfedc Assign the Trusted local group the Full Control share permission.

gfedcb Remove the Everyone group from the D:/Confidential folder’s access control list.

gfedc Assign the Trusted local group the Full Control NTFS permission.

gfedc Assign the Trusted local group the Change share permission.

gfedc Assign the Everyone group the Full Control NTFS permission.

gfedc Assign your user account the Full Control share permission.

Hacked by Piratez 70-270

Page 64: 70 270 q & a

[201 #388]

Explanation:

The Insufficient disk space message means that either the server's hard disk is full or that a user has reached the limit of his or her disk quota. Because nobody else is having problems, Chad must have reached his quota limit. When you select the Deny disk space to users exceeding quota limit option, users who exceed their limit receive an insufficient disk space error and cannot write additional data to the volume without deleting or moving files. To an application, it appears that the volume is full. Therefore, you should increase Chad's quota limit.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #401]

You are the administrator for a Windows XP Professional computer that is used by three users, who each have a folder for storing personal data.

Chad copies a file from a CD-RW to his folder and receives the message Insufficient disk space. Chad finds that he cannot even add data to a file and save it. Other users for that computer do not have any problems.

You need to let Chad create and edit files. What should you do?

nmlkj Confirm that Backup is not running.

nmlkj Defragment the hard drive.

nmlkj Confirm that NTFS compression has been enabled.

nmlkj Add Chad to the Power Users group.

nmlkji Increase the quota limit for Chad.

You are the desktop administrator for your company. You manage a Windows XP Professional computer that has a single NTFS partition.

You configure the computer to enforce a default quota limit of 100 MB per user. You also create a Graphic Artists local group.

You want to let each graphic artist store up to 300 MB of data on the computer. How should you configure disk quotas? (Choose three. Each correct choice is part of the solution.)

gfedc Create a new quota entry for the Graphic Artists group.

gfedcb Create a new quota entry for each individual user account in the Graphic Artists group.

gfedc Select the Do not limit disk usage option.

gfedcb Select the Limit disk usage option.

gfedcb Set a quota limit of 300 MB.

gfedc Set a quota limit of 100 MB.

Hacked by Piratez 70-270

Page 65: 70 270 q & a

Explanation:

To make disk quota exceptions for certain users, you must create custom quota entries. You can only add user accounts (not groups) to the quota entry.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[201 #410]

Explanation:

The Allow-Create Files/Write Data special permission is adequate for this scenario, although this special permission will not let users append data to files, read data, read or write file attributes, view the contents of the folder, or execute files. Usually, you will grant at least the default Read & Execute permission to allow basic viewing of a folder and its data. To let users also update data, grant the Write permission in addition to Read & Execute. To let users also delete data, grant the Modify permission in addition to Read & Execute and Write. Users should not need to log off and back on to receive a new access token unless you have changed group membership.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #420]

You are the desktop administrator for your company. You manage a Windows XP Professional computer that is a member of a Windows 2000 domain.

You share a folder named Public, using the default share name and share permissions. Later, you receive a phone call from Sally, a member of the Sales group, claiming that she cannot save a file to the Public shared folder. You examine the permissions for the folder and verify that Everyone has the Full Control share permission to the folder and that the Administrators group has the Full Control NTFS permission. No other permissions are granted or denied.

You want to make sure Sally and other members of the Sales group can save new files to the Public shared folder. Sally and other members of the Sales group do not need to access or update the files after they are initially saved to the Public share. What should you do?

nmlkj Tell Sally to log off and back on.

nmlkj Grant the Sales group the Allow-Modify NTFS permission.

nmlkj Grant the Sales group the Allow-Change shared folder permission.

nmlkj Grant the Sales group the Allow-Full Control NTFS permission.

nmlkji Grant the Sales group the Allow-Create Files/Write Data special NTFS permission.

You are the desktop administrator for your company. You manage a Windows XP Professional computer that is a b f Wi d 2000 d i

Hacked by Piratez 70-270

Page 66: 70 270 q & a

Explanation:

Usually, you will grant at least the default Read & Execute permission to allow basic viewing of a folder and its data. To let users also update data, grant the Write permission in addition to Read & Execute. To let users also delete data, grant the Modify permission in addition to Read & Execute and Write. The Allow-Create Files/Write Data special permission is inadequate for this scenario because this special permission will not let users append data to files, read data, read or write file attributes, view the contents of the folder, or execute files. Users should not need to log off and back on to receive a new access token unless you have changed group membership.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #429]

member of a Windows 2000 domain.

You share a folder named Public, using the default share name and share permissions. Later you receive a phone call from Sally, a member of the Sales group, claiming that she cannot save a file to the Public shared folder. You examine the permissions for the folder and verify that Everyone has the Full Control share permission to the folder and that the Administrators group has the Full Control NTFS permission. No other permissions are granted or denied.

You want to make sure Sally and other members of the Sales group can save new files to the Public shared folder. Sally and other members of the Sales group also need to access, update, and delete files in the Public share. What should you do?

nmlkj Grant the Sales group the Allow-Change shared folder permission.

nmlkj Tell Sally to log off and back on.

nmlkj Grant the Sales group the Allow-Full Control NTFS permission.

nmlkji Grant the Sales group the Allow-Modify NTFS permission.

nmlkj Grant the Sales group the Allow-Create Files/Write Data special NTFS permission.

nmlkj Grant the Sales group the Allow-Write NTFS permission.

You are the desktop administrator for your company. You manage a Windows XP Professional computer that is a member of a Windows 2000 domain.

You share a folder named Public, using the default share name and share permissions. Later you receive a phone call from Sally claiming that she cannot save a file to the Public shared folder. You just added Sally to the Sales group. You examine the permissions for the folder and verify that Everyone has the Full Control share permission to the folder and that the Administrators group has the Full Control NTFS permission. You also verify that the Sales group has the Allow-Modify NTFS permission. No other permissions are granted or denied.

You want to make sure Sally and other members of the Sales group can save new files to the Public shared folder. Sally and other members of the Sales group also need to access, update, and delete files in the Public share. What should you do?

nmlkj Grant the Sales group the Allow-Change shared folder permission.

nmlkj Grant the Sales group the Allow-Full Control NTFS permission.

nmlkj Grant the Sales group the Allow-Write NTFS permission.

Hacked by Piratez 70-270

Page 67: 70 270 q & a

Explanation:

Users need to log off and back on to receive a new access token if you have changed group membership. In this scenario, Sally might not have logged off and back on since you added her to the Sales group.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #439]

Explanation:

Deny permissions override Apply permissions. Even though Sally is allowed to modify the contents of the folder through her membership in the Sales group, she cannot modify the contents of the folder because she is denied permissions through her membership in the Assistants group. One solution is to remove Sally from the Assistants group. Removing the Assistants group from the access control list would let all assistants who are also members of the Sales group modify the contents of the folder.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

nmlkj Grant the Sales group the Allow-Modify NTFS permission.

nmlkji Tell Sally to log off and back on.

nmlkj Grant the Sales group the Allow-Create Files/Write Data special NTFS permission.

You are the desktop administrator for your company. You manage a Windows XP Professional computer that is a member of a Windows 2000 domain.

You share a folder named Public, using the default share name and share permissions. Later you receive a phone call from Sally, a member of the Sales group and Assistants group, claiming that she cannot save a file to the Public shared folder. You examine the permissions for the folder and verify that Everyone has the Full Control share permission to the folder and that the Administrators group has the Full Control NTFS permission. You also see that the Sales group has the Allow-Modify NTFS permission and the Assistants group has the Deny-Modify permission. No other permissions are granted or denied.

You want to make sure that members of the Sales group (who are not members of the Assistants group) can save new files to the Public shared folder and access, update, and delete existing files in the Public share. You want to continue to ensure that members of the Assistants group cannot modify files in the Public shared folder, even if they are members of the Sales group. However, you also want to let Sally update files in the Public share. What should you do?

nmlkj Grant the Sales group the Allow-Full Control NTFS permission.

nmlkj Grant the Sales group the Allow-Write NTFS permission.

nmlkji Remove Sally from the Assistants group.

nmlkj Remove the Assistants group from the access control list.

nmlkj Grant the Sales group the Allow-Change shared folder permission.

nmlkj Tell Sally to log off and back on.

nmlkj Grant the Sales group the Allow-Modify NTFS permission.

Hacked by Piratez 70-270

Page 68: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[201 #449]

Explanation:

It appears that Sally’s supervisor has removed the default permissions that allow administrators Full Control to the C:\Reports folder. To change permissions for the folder, you first need to take ownership. You should then grant Sally the permissions she needs, but no more than she needs. In this case, she needs the Allow-Modify permission.

Objective(s):

201. Monitor, manage, and troubleshoot access to files and folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.2

[201 #460]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its operating system for all client workstations. All computers are members of a Windows 2000 domain.

Sally, a member of the sales department, is borrowing a laptop computer from her supervisor to do some work from home in the evenings. Sally contacts you and indicates that she cannot access the C:/Reports folder on the laptop. This folder contains documents that she needs to edit.

You log on to the laptop as a domain administrator to check the folder’s access control list. You are denied access to view the permissions. You contact Sally’s supervisor to verify that Sally should receive access to the folder. Sally’s supervisor indicates that Sally should be able to read, change, and delete documents in the folder, but that only the supervisor should be able to configure permissions.

You need to grant Sally appropriate permissions to the C:/Reports folder. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Grant your user account the Allow-Full Control permission to the C:/Reports folder.

gfedc Give Sally ownership to the C:/Reports folder.

gfedcb Take ownership of the C:/Reports folder.

gfedc Grant Sally the Allow-Full Control permission to the C:/Reports folder.

gfedcb Grant Sally the Allow-Modify permission to the C:/Reports folder.

gfedc Instruct Sally to take ownership of the C:/Reports folder.

You are the administrator of a Windows network. All accounting users access files in a shared folder named Reports. The Reports folder is stored on a FAT32 partition on an accounting employee's Windows XP Professional computer. The Reports folder is part of the company’s Distributed File System (Dfs).

Three new accounting employees were recently hired, which brings the total number of accounting employees to eight. Since the new accounting employees were hired, users in the accounting department occasionally report that they receive the following error message when accessing the Reports shared folder:

Reports is not accessible. No more connections can be made to this remote computer at this time.

Hacked by Piratez 70-270

Page 69: 70 270 q & a

Explanation:

This error is caused by all valid connections being in use. Increase the number of available connections to allow additional users to connect to the share. Although the default number is 10 users on an XP Professional computer, that value can be changed. In this example, the limit was likely set to below eight. With the increase in the number of accounting users, you will also need to increase the user limit.

The file system of the partition that stores Reports and whether the network uses Dfs are non-issues in this question.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #260]

Explanation:

Windows XP Professional limits the number of concurrent users of a shared folder to 10. Although you can type a larger number as the user limit, the value is changed back to 10 when you apply the change. To allow more concurrent

You want to ensure that accounting users can access the files in the Reports shared folder. What should you do?

nmlkji Increase the user limit on the Reports shared folder.

nmlkj Move Reports to an NTFS partition on the host computer, and share it again.

nmlkj Increase the Client Cache value on the Dfs leaf node that refers to the Reports folder.

nmlkj Move Reports to a FAT32 partition on the host computer, and share it again.

You are the administrator of a Windows network. All accounting users access files in a shared folder named Reports. The Reports folder is stored on a FAT32 partition on an accounting employee's Windows XP Professional computer. The Reports folder is part of the company’s Distributed File System (Dfs).

Three new accounting employees were recently hired, which brings the total number of accounting employees to 18. Since the new accounting employees were hired, users in the accounting department occasionally report that they receive the following error message when accessing the Reports shared folder:

Reports is not accessible. No more connections can be made to this remote computer at this time.

You edit the properties of the Reports shared folder and notice that the user limit is set to 10. You type 18 as the user limit and click OK to save the change. Accounting users still report the same error.

You want to ensure that accounting users can access the files in the Reports shared folder. What should you do?

nmlkji Move Reports to a computer that uses a Windows server operating system.

nmlkj Move Reports to an NTFS partition on the host computer, and share it again.

nmlkj Increase the Client Cache value on the Dfs leaf node that refers to the Reports folder.

nmlkj Increase the user limit on the Reports shared folder.

nmlkj Move Reports to a FAT32 partition on the host computer, and share it again.

Hacked by Piratez 70-270

Page 70: 70 270 q & a

connections, you need to use a server operating system.

The file system of the partition that stores Reports and whether the network uses Dfs are non-issues in this question.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #268]

Explanation:

When you move a shared folder, it is no longer shared. Although you are warned that the folder will no longer be shared, Sally must have forgotten or not read the warning. She must share the folder again to make it available on the network.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #277]

You are the help desk administrator for your company. Sally uses a Windows XP Professional computer. The C:/Research folder on Sally’s computer is shared using the default share name.

Sally moved the Research folder to a different NTFS volume on her computer. Now users in her workgroup complain that they cannot connect to the Research shared folder. In fact, they can't even see the share when they browse the network.

You want to help Sally make the Research folder available to users in her workgroup. What should you do?

nmlkj Modify the share permissions for the Research folder.

nmlkj Modify the NTFS permissions for the Research folder.

nmlkj Start the browser service on Sally’s workstation.

nmlkji Share the Research folder.

You are the help desk administrator for your network. Your Windows XP Professional computer has eight shared folders that are available to other network users.

A user reports that a shared folder named Help is inaccessible. You open Windows Explorer and look for the shared folder. However, you cannot remember which folder you shared using the name Help.

You want to respond to the user's problem as quickly as possible by checking permissions for the Help shared folder. What should you do?

nmlkj Use Storage in Computer Management to view local drive properties

Hacked by Piratez 70-270

Page 71: 70 270 q & a

Explanation:

The System Tools node in Computer Management contains the Shared Folders MMC snap-in, which allows you to easily locate and manage shared folders.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #285]

Explanation:

To simplify administration, keep the default share permission that assigns the Allow-Full Control permission to the Everyone group. Then configure NTFS permissions to control access to files and folders in the share. Currently, appropriate NTFS permissions have been applied to the D:\Data\Reports folder, but share permissions limit everyone to reading data in the share. Assigning the Managers group the Allow-Modify share permission would let Jim update files in the share, but it would still not allow full control to the Managers group.

Objective(s):

202. Manage and troubleshoot access to shared folders.

nmlkj Use Storage in Computer Management to view local drive properties.

nmlkji Use System Tools in Computer Management to display the file paths of your shared folders.

nmlkj Use Event Viewer in Computer Management to search for shared folder error messages.

nmlkj Use Windows Explorer to display the file paths of your shared folders.

You are the network administrator for your company. You recently replaced the previous network administrator. The sales manager, Jim, calls you and reports that he cannot update a file in the //ACCTWRK1/Reports share which the previous network administrator created for him last Wednesday. Jim is a member of the Managers group which should have full control of all files in the share.

You examine the Reports share and the D:/Data/Reports folder on ACCTWRK1 to which the share refers. Following is a summary of the current configuration:

You need to give Jim the permissions intended for the Managers group and let him update files in the Reports share. What should you do?

Folder NTFS Permissions Share Permissions

D:/Data/Reports Shared as Reports

Administrators (Allow-Full Control)Managers (Allow-Full Control) Everyone (Allow-Read)

Everyone (Allow-Read)

nmlkj Change the D:/Data/Reports NTFS permissions for the Everyone group to Allow-Full Control.

nmlkj Assign Jim's User object the Allow-Full Control permission to D:/Data/Reports.

nmlkji Change the Reports share permissions for the Everyone group to Allow-Full Control.

nmlkj Assign the Managers group the Allow-Modify share permission to the Reports share.

Hacked by Piratez 70-270

Page 72: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #293]

Explanation:

By appending a $ to a share's name, the share will be invisible. However, it will still be accessible to anyone who knows the share name.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.3

[202 #301]

You are the network administrator for your company. The network is a Windows network with a single Active Directory domain. Wrk1 is a Windows XP Professional workstation in the domain.

You have shared the D:/Marketing/Feedback folder on Wrk1 using a share name of Feedback. The contents of the Feedback share are not necessarily confidential, but to simplify users' view of the network, you do not want the Feedback share to be listed when users type //Wrk1 at the Run command or browse the network to the Wrk1 computer. What should you do?

nmlkjDistribute a Group Policy object that disables the Run command and My Network Places or Network Neighborhood.

nmlkjCreate a Shared Folder object in Active Directory and assign the Full Control permission to the Marketing Users group only.

nmlkjChange the share permissions of the Feedback share so only the Marketing Users group has the Full Control permission.

nmlkji Change the name of the Feedback share to Feedback$.

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using the URL:

HTTP://Wrk1/Help

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkjiOpen the properties of the folder containing the web site files. On the Web Sharing tab, select Share this folder.

nmlkj Open the IIS snap-in. Double-click the default web site and paste the files.

nmlkj Copy the web site's files to %systemdrive%/iis/www/.

Hacked by Piratez 70-270

Page 73: 70 270 q & a

Explanation:

You can publish a folder to a Windows XP Professional computer’s default web site by opening its properties and selecting Share this folder on the Web Sharing tab. A virtual directory will be created using the alias name you specify. The default web site is located at %systemdrive%\inetpub\wwwroot\ rather than %systemdrive%\iis\www\. You cannot copy and paste files directly to the web site in the IIS snap-in. You do not need to enable web sharing using Folder Options (in fact, that is not even an option).

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #309]

Explanation:

Although you can configure web sharing for the Help folder, you can also copy the folder to the root (home) directory of the default web site. By default, the home directory of the default web site is %systemdrive%\inetpub\wwwroot\.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #317]

nmlkj Select the Help folder. Select Folder Options from the Tools menu, and enable web sharing.

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using the URL:

HTTP://Wrk1/Help

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkj Share the Help folder on the web using Wrk1 as an alias.

nmlkj Select the Help folder. Select Folder Options from the Tools menu, and enable web sharing.

nmlkji Copy the Help folder to %systemdrive%/inetpub/wwwroot/.

nmlkj Open the IIS snap-in and drag the Help folder and its contents to Wrk1.

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

Hacked by Piratez 70-270

Page 74: 70 270 q & a

Explanation:

Configuring web sharing for the Help folder would share the folder using a virtual directory in the default web site. For the files to be accessible from the root (home) directory of the default web site, you must move or copy them to %systemdrive%\inetpub\wwwroot\.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #325]

Explanation:

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using the URL:

HTTP://Wrk1

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkj Open the IIS snap-in and drag the Help folder and its contents to Wrk1.

nmlkj Share the Help folder on the web using Wrk1 as an alias.

nmlkji Copy the contents of the Help folder to %systemdrive%/inetpub/wwwroot/.

nmlkj Share the Help folder on the web using the default alias.

nmlkj Select the Help folder. Select Folder Options from the Tools menu, and enable web sharing.

nmlkj Copy the Help folder and its contents to %systemdrive%/inetpub/wwwroot/.

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using either of the following URLs:

HTTP://Wrk1/Help HTTP://Wrk1/Tips

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkj Create two web sites named Help and Tips, each of which contains the Help folder and its contents.

nmlkjCreate a folder named Tips. Create shortcuts in the Tips folder to the contents of the Help folder. Share the Help and Tips folders using the Shared folders MMC snap-in and the default share names.

nmlkj Copy the contents of the Help folder to %systemdrive%/inetpub/wwwroot/.

nmlkji Share the Help folder on the web using Help and Tips as aliases.

nmlkjCreate a shortcut to the Help folder named Tips. Share the Help and Tips folders on the web using the default aliases.

Hacked by Piratez 70-270

Page 75: 70 270 q & a

You can configure the Help folder to be shared on the computer’s default web site. A virtual directory will be created in the default web site for each alias you create. The Shared Folders MMC snap-in does not share folders on the web. You can only have one web site on a Windows XP Professional computer. Copying the contents of the Help folder to %systemdrive%\inetpub\wwwroot\ will make it accessible from the default web site’s home directory, but it will not meet the URL requirements stated in the question.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #335]

Explanation:

Although you can configure web sharing for the Help folder, you can also copy the folder to the root (home) directory of the default web site. By default, the home directory of the default web site is %systemdrive%\inetpub\wwwroot\. To be accessed using the name Tips, you need to rename the folder.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #344]

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using the URL:

HTTP://Wrk1/Tips

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkj Open the IIS snap-in and drag the Help folder and its contents to the Tips virtual directory.

nmlkj Share the Help folder on the web using Wrk1/Tips as an alias.

nmlkjCopy the contents of the Help folder to %systemdrive%/inetpub/wwwroot/. Rename the default document to Tips.html.

nmlkji Copy the Help folder to %systemdrive%/inetpub/wwwroot/. Rename the folder as Tips.

You are a help desk technician for your company. You use a Windows XP Professional computer named Wrk1 and have installed IIS components using their default configuration. You host an internal web site for other help desk technicians.

You create some HTML documents in a folder named Help. You now need to publish the files on your company’s intranet. You want the default file in the Help folder to be accessed using the URL:

Hacked by Piratez 70-270

Page 76: 70 270 q & a

Explanation:

You can configure the Help folder to be shared on the computer’s default web site. A virtual directory will be created in the default web site for each alias you create. You should use an alias of Tips to meet the URL requirements in this scenario.

Objective(s):

202. Manage and troubleshoot access to shared folders.

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[202 #352]

Explanation:

To browse, select, and open documents, the Policies virtual directory will need to allow the Read and Directory Browsing permission. Do not allow the other Web access permissions because they are not needed. Execute permissions are also not

HTTP://Wrk1/Tips

You need to publish the contents of the Help folder to your default web site. What should you do?

nmlkjCopy the contents of the Help folder to %systemdrive%/inetpub/wwwroot/. Rename the default document to Tips.html.

nmlkj Open the IIS snap-in and drag the Help folder and its contents to the Tips virtual directory.

nmlkjCopy the Help folder and its contents to %systemdrive%/inetpub/wwwroot/. Rename the default document to Tips.html.

nmlkji Share the Help folder on the web using Tips as an alias.

You are a network administrator for your company. You manage a Windows XP Professional workstation named Wrk1. You have shared the E:/Company Policies folder on the computer using the share name MasterPolicies and the default share permissions. Certain members of the Human Resource department have appropriate NTFS permissions to create, change, and save company policy documents to the E:/Company Policies folder. These permissions are granted through the Policy Editors domain local group. Each company policy is saved as an individual Word document.

You want to let all other users in the company browse and read the company policies using the following URL:

HTTP://Wrk1/Policies

You create a virtual directory with an alias of Policies in the computer’s default web site. The virtual directory refers to the E:/Company Policies folder. What should you do next? (Choose all that apply.)

gfedcb Configure the Policies virtual directory to allow the Read Web access permission.

gfedc Configure the Policies virtual directory to allow the Write Web access permission.

gfedcb Configure the Policies virtual directory to allow the Directory Browsing Web access permission.

gfedc Configure the Policies virtual directory to allow the Script Source Access Web access permission.

gfedc Configure the Policies virtual directory to allow the Scripts Only execute permission.

gfedc Configure the Policies virtual directory to allow the Scripts and Executables execute permission.

Hacked by Piratez 70-270

Page 77: 70 270 q & a

needed because no scripts or executable files will need to be run in this virtual directory.

Objective(s):

202. Manage and troubleshoot access to shared folders.

[202 #360]

Explanation:

Administrators and Power Users can share folders on Windows XP Professional computers. There is no Server Operators group on a Windows XP Professional computer. On a server operating system, the Server Operators group has similar permissions as the Power Users group on a workstation operating system.

Objective(s):

202. Manage and troubleshoot access to shared folders.

[202 #370]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its workstation operating system. All computers are members of an Active Directory domain.

You install a new computer for Rodney, a user in the research department. You join Rodney’s computer to the domain and make his Active Directory user account a member of the Users and Backup Operators groups. Later, Rodney calls you and complains that he cannot share folders on his computer.

Rodney needs to share folders on the computer to exchange files with other users in the research department. What should you do?

nmlkji Make Rodney’s user account a member of the Power Users group.

nmlkjRemove Rodney’s user account from the Backup Operators group and add his user account to Server Operators group.

nmlkj Remove Rodney’s computer from the domain and make it a member of a workgroup.

nmlkjCreate a local administrative user account for Rodney. Instruct him to use the local user account to log on to the computer.

You are a desktop administrator for your company. You manage a Windows XP Professional computer for the sales department. The computer has a printer connected to it. The sales manager has asked you to restrict access to the printer as follows:

Sally needs to connect to a printer, print documents, and pause and resume her own print jobs. Jim needs to share and unshare the printer. Damien needs to pause and resume documents for all users, but does not need to change printer properties.

You want to assign the most restrictive permissions that meet the sales manager’s requirements. What should you do? (Choose three. Each choice is part of the correct solution.)

gfedcb Assign Sally the Print permission.

gfedc Assign Sally the Manage Printers permission.

gfedc Assign Sally the Manage Documents permission.

gfedc Assign Jim the Print permission.

gfedcb A i Ji th M P i t i i

Hacked by Piratez 70-270

Page 78: 70 270 q & a

Explanation:

Windows XP has three levels of permission for printers: Print, Manage Documents, and Manage Printer.

Users with Print permission can 1) print documents, 2) pause, resume, restart, and cancel their own documents, and 3) connect to a printer. Users with Manage Documents permission can perform all Print tasks, as well as 1) control job settings for all documents, and 2) pause, resume, restart, and cancel the printing of any document. Users with Manage Printers permission can perform all tasks related to printers and printing.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #260]

Explanation:

Windows XP has three levels of permission for printers: Print, Manage Documents, and Manage Printer.

Users with Print permission can 1) print documents, 2) pause, resume, restart, and cancel their own documents, and 3) connect to a printer.

gfedcb Assign Jim the Manage Printers permission.

gfedc Assign Jim the Manage Documents permission.

gfedc Assign Damien the Print permission.

gfedc Assign Damien the Manage Printers permission.

gfedcb Assign Damien the Manage Documents permission.

You are a desktop administrator for your company. You manage a Windows XP Professional computer for the sales department. The computer has a printer connected to it. The sales manager has asked you to restrict access to the printer as follows:

Sally needs to pause and resume documents for all users, but does not need to change printer properties. Jim needs to share and unshare the printer. Damien needs to connect to a printer, print documents, and pause and resume his own print jobs.

You want to assign the most restrictive permissions that meet the sales manager’s requirements. What should you do? (Choose three. Each choice is part of the correct solution.)

gfedc Assign Sally the Print permission.

gfedc Assign Sally the Manage Printers permission.

gfedcb Assign Sally the Manage Documents permission.

gfedc Assign Jim the Print permission.

gfedcb Assign Jim the Manage Printers permission.

gfedc Assign Jim the Manage Documents permission.

gfedcb Assign Damien the Print permission.

gfedc Assign Damien the Manage Printers permission.

gfedc Assign Damien the Manage Documents permission.

Hacked by Piratez 70-270

Page 79: 70 270 q & a

Users with Manage Documents permission can perform all Print tasks, as well as 1) control job settings for all documents, and 2) pause, resume, restart, and cancel the printing of any document. Users with Manage Printers permission can perform all tasks related to printers and printing.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #273]

Explanation:

If you know the name and path of a printer, you can enter it manually in the Add Printer wizard rather than browsing for it in the Directory. If the printer has been shared with default permissions, the Everyone group will have the Print permission, so additional permissions should not be needed. In any case, not having the Print permission for a shared printer would not prevent you from seeing a printer in the Directory. Checking the List in the Directory option on the printer's Sharing tab would cause the printer to appear in the Directory, but Shanda would have to be logged on to the print server as administrator to make that change. You can type the UNC path to the share name of a shared printer to connect to it. However, \\computer_name\share_name is the correct syntax rather than \\computer_name\wwwroot\printer_name.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.1

[203 #286]

You are a help desk technician for your company. Shanda normally uses a printer in her department. However, today she needs to print a document to a printer on another floor. The printer she wants to use is connected to a Windows XP Professional computer and is shared with the default permissions. Shanda is also using a Windows XP Professional computer.

When Shanda tries to connect to the printer, she cannot see the printer in the Directory. You need to help Shanda connect to the printer. What should you do?

nmlkjiLearn the name and path of the printer from a source other than the Directory and direct Shanda to enter it using the Add Printer wizard.

nmlkjLearn the name and path of the printer from a source other than the Directory and type //computer_name/wwwroot/printer_name at the command prompt.

nmlkj Direct Shanda to check the List in the Directory option on the printer's Sharing tab

nmlkj Request that the system administrator allow Shanda the Print permission for that printer.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

You print an important document. After waiting a few minutes for the document to print, you examine the print queue and notice two large documents ahead of it in the queue. You increase the priority of your document so it will print as soon as possible.

Hacked by Piratez 70-270

Page 80: 70 270 q & a

Explanation:

Two printers are necessary if you want to have different printing priorities for different groups. Set the priority for the printer that you use to 99 (the highest) and the priority for the printer the others use to a number less than 99.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.3

[203 #294]

Explanation:

You can change the priority of print jobs in the print queue if you have the Manage Documents or Manage Printers permission to the printer. Setting Terry's print job to 99 will ensure that it is the next print job printed.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

You want to continue to allow other users to print to your printer over the network, but you also want to prevent similar situations by ensuring that your print jobs take precedence over other users. What should you do?

nmlkjUse Active Directory Users and Groups to assign all users other than yourself a lower print priority to the printer.

nmlkjCreate two printers called Printer1 and Printer2. Share Printer1 and uncheck the Start printing immediately option. Use Printer2 for yourself and check the Start printing immediately option.

nmlkjCreate two printers called Printer1 and Printer2. Set the priority on Printer1 to 99 and give others permission to print. Set the priority on Printer2 to 1 and use this printer yourself.

nmlkjiCreate two printers called Printer1 and Printer2. Set the priority on Printer1 to 1 and give others permission to print. Set the priority on Printer2 to 99 and use this printer yourself.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

Terry, the company vice-president, informs you that he just submitted a print job to your printer and needs it in 5 minutes. Upon checking the printer, you find that there are numerous print jobs ahead of Terry's.

You need to print Terry's print job without causing other users to lose their print jobs. What should you do?

nmlkj Set the priority of Terry's document to 1 and all others to 99.

nmlkj Drag and drop Terry's print job to the top of the list.

nmlkj Set all other print jobs to pause.

nmlkji Set the priority of Terry's document to 99 and all others to 1.

Hacked by Piratez 70-270

Page 81: 70 270 q & a

TestOut for Windows XP Administration, Section 6.3

[203 #302]

Explanation:

You should clear the Notify when remote documents are printed option, to stop the dialog box from appearing. Spooling does not affect message settings. Disabling bi-directional support is a poor choice because it disables all messages from the printer, not just the completed message.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #310]

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

Shanda sends a lot of small print jobs to your shared printer. After each print job, she receives a message that the print job has completed successfully. Shanda calls you to ask what to do to avoid receiving the annoying messages.

You need to prevent the messages from appearing on Shanda’s computer. What should you do?

nmlkjTell Shanda to open the printer’s properties and clear the Notify computer, not user, when remote documents are printed option.

nmlkji Open the print server’s properties and clear the Notify when remote documents are printed option.

nmlkjTell Shanda to open the printer’s properties and clear the Notify when remote documents are printed option.

nmlkj Open the print server’s properties and disable bi-directional support.

nmlkjOpen the print server’s properties and clear the Notify computer, not user, when remote documents are printed option.

nmlkj Open the printer’s properties and disable print spooling.

nmlkj Tell Shanda to edit the printer’s properties and disable bi-directional support.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

A third-party technician is visiting your company today to clean the company’s printers. You check the print queue and find numerous jobs in the queue. An identical print device is attached to a Windows XP Professional computer named Wrk2 in the office next to yours. The printer on Wrk2 is shared as Printer2.

You want to let the technician clean your printer while allowing the print jobs in your printer’s print queue to print. What should you do?

nmlkj In Printer2's Properties, configure Printer2 to access the same spooler as Printer1. On the Ports tab of Printer1's properties enable print job sharing and enter //Wrk2/Printer2 in the Other

Hacked by Piratez 70-270

Page 82: 70 270 q & a

Explanation:

To automatically use another printer on another computer, you must enable printer pooling. On the Ports tab of your printer's Properties, click Add Port and add a new local port using the printer’s UNC path as the name. Then select the new port as the port to which Printer1 prints.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.3

[203 #321]

Explanation:

To configure the location of the spool folder:

1. Open the Printers and Faxes folder on the print server. 2. Click the File menu, then click Server Properties. 3. Click the Advanced tab, then type the location of the spool folder.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

nmlkjOn the Ports tab of Printer1 s properties, enable print job sharing and enter //Wrk2/Printer2 in the Other printers box.

nmlkjCreate a new printer on your computer that refers to the network printer //Wrk2/Printer2. Open the print queue for Printer1 and change the printer to the new printer.

nmlkj Configure Printer1 to send every second print job to //Wrk2/Printer2.

nmlkji Add a new local port and configure Printer1 to print to it.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

Your system drive is running out of space. This is partly due to the number of print jobs constantly being spooled. You examine the volumes on your computer and notice that drive E: has plenty of free space.

You want to change the spool folder to E:/Spool. What should you do?

nmlkjRemove the old spool file from the hard drive. Open Server Properties in the Printers folder and create a new spool file.

nmlkj Open the Properties of Printer1. On the Advanced tab, configure a new location for the spool folder.

nmlkj Mount the system drive as the E:/Spool folder.

nmlkj Mount the system root folder as the E:/Spool folder.

nmlkjiOpen Server Properties in the Printers and Faxes folder. On the Advanced tab, configure a new location for the spool folder.

Hacked by Piratez 70-270

Page 83: 70 270 q & a

TestOut for Windows XP Administration, Section 6.2

[203 #330]

Explanation:

Jobs with a higher priority number are printed first. By creating two printers and setting different priority levels, you can bring the other documents ahead of the art department’s documents in the print queue.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.3

[203 #339]

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it.

Users in the art department frequently send multiple page graphics to your printer. The jobs often take a long time to print. Other users, whose jobs are typically short, must wait for a long time for their documents to print.

You want to prevent large print jobs from delaying the print jobs of non-art users. You want to accomplish this with least amount of administrative effort. What should you do?

nmlkjiConfigure the priority of Printer1 to 1. Add a new printer and set the priority to 99. For the new printer, deny the Print permission for users in the art department. Instruct all users except those in the art department to use the new printer.

nmlkjConfigure the priority of Printer1 to 99. Add a new printer and set the priority to 1. For the new printer, deny the Print permission for the users in the art department. Instruct all users except those in the art department to use the new printer.

nmlkjDelete the old printer. Add a new printer and set the priority to a higher value. Pause the print queue only when the graphics-intensive jobs are printing.

nmlkjMonitor the print queue and raise the priority for all of the print jobs that are sent by the users who are not members of the art department.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it. Your computer’s network card has a reserved IP address of 192.168.1.27, and your computer is named Wrk1.

Chad is a user on your local network segment. Chad also uses a Windows XP Professional computer. Chad’s computer has a reserved IP address of 192.168.1.28, and his computer is named Wrk2.

Chad informs you that he wants to print to your printer. You need to help Chad connect to your printer. What should you do?

nmlkjOpen the Printers and Faxes folder on Wrk1 and create a new local printer. Select the appropriate printer driver according to the make and model of your printer. Open the Printers and Faxes folder on Wrk2 and create a new network printer Identify the printer

Hacked by Piratez 70-270

Page 84: 70 270 q & a

Explanation:

To let a client computer connect to a shared printer, create a new printer object on the client computer that refers to the destination computer and printer share name using the UNC naming convention: \\computer_name\share_name

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.1

[203 #347]

Explanation:

To let a client computer connect to a network printer that is directly connected to a TCP/IP network, create a new local printer that uses a standard TCP/IP port corresponding to the printer’s IP address. The printer’s network card should be auto detected. If it is not, you will need to identify the card’s attributes.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

nmlkjOpen the Printers and Faxes folder on Wrk2 and create a new network printer. Identify the printer as //Wrk2/Printer1.

nmlkjiOpen the Printers and Faxes folder on Wrk2 and create a new network printer. Identify the printer as //Wrk1/Printer1.

nmlkjOpen the Printers and Faxes folder on Wrk2 and create a new local printer. Create a standard TCP/IP port that uses the 192.168.1.27 IP address. Select the appropriate printer driver according to the make and model of your printer.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. You have also shared the printer as Printer1 and granted the Everyone group permission to print to it. Your computer’s network card has a reserved IP address of 192.168.1.27, and your computer is named Wrk1.

You want to print to a network printer on your local subnet. The printer is connected directly to the network and uses an IP address of 192.168.1.14. What should you do?

nmlkjOpen the Printers and Faxes folder on Wrk1 and create a new network printer. Create a standard TCP/IP port that uses the 192.168.1.14 IP address. Select the appropriate printer driver according to the make and model of the printer.

nmlkjOpen the Printers and Faxes folder on Wrk1 and create a new network printer. Identify the printer as //Wrk1/192.168.1.14.

nmlkjOpen the Printers and Faxes folder on Wrk1 and create a new network printer. Identify the printer as HTTP://192.168.1.14.

nmlkjiOpen the Printers and Faxes folder on Wrk1 and create a new local printer. Create a standard TCP/IP port that uses the 192.168.1.14 IP address. Select the appropriate printer driver according to the make and model of the printer.

Hacked by Piratez 70-270

Page 85: 70 270 q & a

TestOut for Windows XP Administration, Section 6.1

[203 #355]

Explanation:

Creating a printer pool allows several identical printers to share the printing workload by distributing the print jobs to the available printers. That is the only solution that would distribute the printing load evenly across the two print devices without using additional hardware, such as a print multiplexer. You would then configure all computers to print to Printer1 and delete Printer2. Configuring half of the computers to use one printer by default and the other half of the computers to use the other printer by default would not evenly distribute the printing load between the two print devices because some computers might submit more print jobs than others. Also, users could easily print to a different printer.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.3

[203 #363]

You are a network administrator for your company. You have connected two identical print devices to your Windows XP Professional computer and created two printers for them named Printer1 and Printer2. You have also shared both printers using their default names and granted the Everyone group permission to print to them.

Printer1 receives the vast majority of print jobs submitted from users on the network. You want to distribute the printing load evenly between the two print devices. You want to do this while minimizing hardware costs. What should you do?

nmlkjSet half the computers on the network to use Printer1 as the default printer. Set the other half of the computers to print to the Printer2 by default.

nmlkjiEnable printer pooling for Printer1 and configure it to print to both local printer ports in use by your print devices.

nmlkj Lower the priority on Printer1. Increase the priority on Printer2.

nmlkjRemove the two current print devices. Attach both print devices to a print multiplexer and attach this to one port on the Windows XP computer. Create a single printer named Printer1.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. Your computer is a member of an Active Directory domain. You have shared your printer as Printer1 and published it to Active Directory.

During the hours 11:00 a.m. to 2:00 p.m., you want to restrict access to your print device to members of the Help Desk Reports group. No other users should be able to print to your print device during those hours. During all other hours, all users in the company should have equal access to the print device. What should you do?

nmlkjCreate a second printer for your print device and name it Printer2. Keep the default configuration for Printer1, except configure Printer1’s availability to 11:00 a.m. to 2:00 p.m. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group.

nmlkjiCreate a second printer for your print device and name it Printer2. Keep the default configuration for Printer1, except configure Printer1’s availability to 2:00 p.m. to 11:00 a.m. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group.

nmlkj

Create a second printer for your print device and name it Printer2. Keep the default configuration for Printer1, except configure Printer1’s availability to 2:00 p.m. to 11:00 a.m. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group Also configure Printer2’s

Hacked by Piratez 70-270

Page 86: 70 270 q & a

Explanation:

To let multiple groups of users have different access to a print device, configure a separate printer for each group of users. In this example, Everyone should be able to use Printer1 except between 11:00 a.m. and 2:00 p.m. During those times, the print device will be used exclusively by the Help Desk Reports group. To provide this configuration, the Help Desk Reports group should be given exclusive permission to a second printer that refers to the same print device. The second printer should be configured to allow printing always. Otherwise, members of the Help Desk Reports group will always have to decide which printer to use depending on the time of day.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.3

[203 #371]

Explanation:

By default, the Everyone group has the Allow-Print permission to a printer. To prevent everyone from printing to a printer, you need to remove the Everyone group from the printer’s access control list. Add only the users and groups that should be able to print to the printer. Grant the users and groups the Allow-Print permission. Users can access the printer whether or not it is listed in Active Directory. Listing the printer in Active Directory simply makes it easier to find. In this scenario, you should not deny the Print permission to Everyone or nobody will be able to use the printer (including the users you want to let print).

Objective(s):

203. Connect to local and network print devices.

Reference(s):

Everyone group and grant the Print permission to the Help Desk Reports group. Also, configure Printer2 s availability to 11:00 a.m. to 2:00 p.m.

nmlkjCreate a second printer for your print device and name it Printer2. Keep the default configuration for Printer1. For Printer2, remove permissions for the Everyone group and grant the Print permission to the Help Desk Reports group. Also, configure Printer2’s availability to 11:00 a.m. to 2:00 p.m.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. Your computer is a member of an Active Directory domain. You have shared your printer as Printer1 and published it to Active Directory.

You assign the Allow-Print permission for the printer to the Help Desk Technicians domain local group. However, you discover that users who are not members of the Help Desk technicians group can print to the printer.

You want only members of the Help Desk Technicians group to print to Printer1. What should you do?

nmlkjCreate a second printer that refers to the same print device. Grant permission to print to the printer to the Help Desk Technicians domain local group only.

nmlkj Remove the printer from the Everyone group and add it to the Help Desk Technicians domain local group.

nmlkji Remove the Everyone group from the printer’s access control list.

nmlkj Assign the Everyone group the Deny-Print permission to the printer.

nmlkj Edit the properties of Printer1 and clear the List in the directory option.

Hacked by Piratez 70-270

Page 87: 70 270 q & a

TestOut for Windows XP Administration, Section 6.2

[203 #379]

Explanation:

The Manage Documents permission lets a user pause, restart, and delete print jobs without giving permission to edit the printer’s properties or delete the printer. You should grant Chad this permission. Giving this permission to a group will give this permission to unnecessary users.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #388]

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. Your computer is a member of an Active Directory domain. You have shared your printer as Printer1 and published it to Active Directory.

You are leaving on vacation and want to let Chad pause, restart, and delete print jobs on the printer while you are gone. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Help Desk Technicians domain local group. Currently, the Everyone group has the Allow-Print permission to the printer. What should you do?

nmlkj Assign the Help Desk Technicians group the Allow-Manage Printers permission to the printer.

nmlkj Assign the Everyone group the Allow-Manage Printers permission to the printer.

nmlkj Assign the Everyone group the Allow-Manage Documents permission to the printer.

nmlkj Assign the Help Desk Technicians group the Allow-Manage Documents permission to the printer.

nmlkj Assign Chad the Allow-Manage Printers permission to the printer.

nmlkji Assign Chad the Allow-Manage Documents permission to the printer.

You are the help desk manager for your company. You have connected a print device to your Windows XP Professional computer and created a printer for it. Your computer is named Wrk1 and is a member of an Active Directory domain named Widgets.local. You have shared your printer as Printer1 and published it to Active Directory.

You want to let desktop administrators throughout your company connect to and print to Printer1 over a web connection. The desktop administrators carry Windows XP Professional laptops. You perform all configurations on your computer. You contact a desktop administrator named Don and request he test connecting to and printing to your printer over the web.

You need to tell Don the correct URL to type in his web browser. What URL should Don use? (Choose two solutions.)

gfedcb http://wrk1.widgets.local/printer1

gfedc http://wrk1/iis/printer1

gfedc printer://wrk1.widgets.local/printer1

Hacked by Piratez 70-270

Page 88: 70 270 q & a

Explanation:

To use a Web browser to connect to a printer attached to a computer, type http://server_name/printers, where server_name is the name of the Windows 2000 print server that must also be running IIS. In this case, the URL is http://wrk1.widgets.local/printers. A list of printers on the server will be shown and you can connect to the printer of your choice. To connect directly to a printer, type http://server_name/printer_share_name, or in this case, http://wrk1.widgets.local/printer1.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[203 #398]

Explanation:

To let UNIX users connect to a printer on a Windows XP Professional computer, you need to install Print Services for UNIX using Add or Remove Programs. This installs a Line Printer Daemon (LPD) service. You should make sure the service (called the TCP/IP Print Server service) is started. UNIX users can then install the appropriate print driver on their computer

gfedc printer://wrk1.widgets.local/printers

gfedc printer://wrk1.widgets.local/printers/printer1

gfedc http://wrk1.widgets.local/printers/printer1

gfedc http://wrk1/iis/printers

gfedcb http://wrk1.widgets.local/printers

gfedc http://wrk1/iis/printers/printer1

You are a desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has an IP address of 192.168.2.27 and is named Wrk3. Other users in the research department use Windows XP Professional, Windows 2000, Windows NT 4.0, Windows 98, and UNIX computers.

Rodney attaches a print device to his computer and creates a printer for it. He wants to let users in the research department print to his printer. You share Rodney’s printer as Printer1, publish it to Active Directory, and perform all other configurations so Windows users can print to Printer1.

You need to let UNIX users print to Printer1. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Install IIS and the web service.

gfedc Instruct UNIX users to connect to the printer over the web.

gfedcAdd a standard TCP/IP port that uses the IP address 192.168.2.27. Configure Printer1 to use the standard TCP/IP port.

gfedc Add a local port named //Wrk3/Printer1. Configure Printer1 to use the local port.

gfedcb Make sure the TCP/IP Print Server service is started.

gfedc Add a local port named //Wrk3/Printer1. Instruct UNIX users to connect to the printer using a UNC path.

gfedc Install UNIX drivers on Rodney’s computer. Configure Printer1 to use the UNIX drivers.

gfedcb Use Add or Remove Programs to install Print Services for UNIX.

Hacked by Piratez 70-270

Page 89: 70 270 q & a

and connect to the LPD service using Line Printer Remote (LPR) software.

Reference(s):

TestOut for Windows XP Administration, Section 6.1

[203 #411]

Explanation:

To print to a printer connected to a UNIX computer running the Line Printer Daemon (LPD) service, you need to install Print Services for UNIX using Add or Remove Programs. This installs Line Printer Remote (LPR) software. You can then create an LPR port that refers to the print queue on the UNIX computer and create a local printer that uses the LPR port.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.1

[203 #423]

You are a desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has an IP address of 192.168.2.27 and is named Wrk3. Other users in the research department use Windows XP Professional, Windows 2000, Windows NT 4.0, Windows 98, and UNIX computers.

Another user in the research department uses a UNIX computer named Wrk4. Wrk4 uses a reserved IP address of 192.168.2.28. Wrk4 has a print queue named Printer3 that corresponds to a print device attached to Wrk4. Wrk4 is running LPD software. Rodney wants to print to the print device attached to Wrk4.

You need to configure Rodney’s computer to print to the print device attached to Wrk4. What should you do? (Choose three. Each correct choice is part of the solution.)

gfedc Add a network printer named Printer1 that uses the print driver of the print device on Wrk4.

gfedc Make sure the TCP/IP Print Server service is started.

gfedcAdd a standard TCP/IP port that uses the IP address 192.168.2.28. Configure Printer1 to use the standard TCP/IP port.

gfedc Add a local port named //Wrk4/Printer3. Configure Printer1 to use the local port.

gfedcb Add a local printer named Printer1 that uses the print driver of the print device on Wrk4.

gfedc Install IIS and the web service.

gfedcb Add an LPR port that refers to Wrk4 and the Printer3 print queue. Configure Printer1 to use the LPR port.

gfedcb Use Add or Remove Programs to install Print Services for UNIX.

You are a desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has an IP address of 192.168.2.27 and is named Wrk3. Other users in the research department use Windows XP Professional, Windows 2000, Windows NT 4.0, Windows 98, and UNIX computers.

Rodney attaches a print device to his computer and creates a printer for it. He wants to let users in the research department print to his printer. You share Rodney’s printer as Printer1 and publish it to Active Directory. You also

f ll fi ti UNIX i t t P i t 1

Hacked by Piratez 70-270

Page 90: 70 270 q & a

Explanation:

By default, Windows 2000 and XP drivers are installed when you add a printer. To let other Windows clients automatically download and install the appropriate driver when connecting to your printer, you should install additional drivers. In this case, you need to install drivers for Windows NT 4.0 and Windows 95, 98, and ME.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #435]

Explanation:

perform all necessary configurations so UNIX users can print to Printer1.

Windows NT 4.0 and 98 users try to print to Printer1 but fail. Windows XP, Windows 2000, and UNIX users have no problems. You need to let Windows NT 4.0 and 98 users print to Printer1. What should you do?

nmlkji Edit the properties of Printer1 and select additional drivers to be installed and enabled for Printer1.

nmlkjAdd a standard TCP/IP port that uses the IP address 192.168.2.27 on all Windows NT 4.0 and 98 computers. Create a network printer on each Windows NT 4.0 and 98 computer that uses the standard TCP/IP port.

nmlkj Use Add or Remove Programs to install legacy print services.

nmlkjAdd a local port on each Windows NT 4.0 and 98 computer that refers to Wrk3 and the Printer1 print queue. Create a local printer on each Windows NT 4.0 and 98 computer that uses the local port.

nmlkj Install IIS and the web service.

nmlkjAdd a standard TCP/IP port that uses the IP address 192.168.2.27 on all Windows NT 4.0 and 98 computers. Create a local printer on each Windows NT 4.0 and 98 computer that uses the standard TCP/IP port.

You are a desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has an IP address of 192.168.2.27 and is named Wrk3. Other users in the research department use Windows XP Professional, Windows 2000, Windows NT 4.0, Windows 98, and UNIX computers.

Rodney attaches a print device to his computer and creates a printer for it. He wants to let users in the research department print to his printer. You share Rodney’s printer as Printer1 and publish it to Active Directory. You perform all necessary configurations so users in the research department can print to Printer1. You connect to Printer1 from each client operating system and successfully print a test page.

Later, a Windows NT 4.0 user complains that certain types of print jobs turn out garbled. You research the issue and discover that an updated Windows NT 4.0 print driver is verified to solve the problem. You update the print driver on Rodney’s computer, but the Windows NT 4.0 user still experiences the same problem.

You need to let the Windows NT 4.0 user print successfully to Printer1. What should you do? (Choose two solutions.)

gfedc Delete and recreate Printer1.

gfedcEdit the properties of Printer1, uncheck the Windows NT 4.0 additional print driver option, and apply the change. Return and check the Windows NT 4.0 additional print driver option to reinstall the print driver.

gfedcb Tell the user to disconnect from Printer1 and connect again.

gfedcb Install the updated print driver on the Windows NT 4.0 computer.

Hacked by Piratez 70-270

Page 91: 70 270 q & a

Windows NT 4.0, Windows 2000, and Windows XP clients download updated drivers when connecting to a shared printer on a Windows XP Professional print server. To receive an updated driver, you can disconnect and reconnect the client from the printer. You can also install the updated driver directly to the client computer. However, this solution would need to be performed on each individual client computer.

Objective(s):

203. Connect to local and network print devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #445]

Explanation:

Windows NT 4.0, Windows 2000, and Windows XP clients download updated drivers when connecting to a shared printer on a Windows XP Professional print server. However, Windows 95, 98, and ME clients only download the print driver initially. To receive an updated driver, you need to install the updated print driver on each Windows 95, 98, or ME computer or remove the current print driver from the clients so the updated driver will be downloaded upon initially connecting again.

Reference(s):

TestOut for Windows XP Administration, Section 6.2

[203 #453]

You are a desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has an IP address of 192.168.2.27 and is named Wrk3. Other users in the research department use Windows XP Professional, Windows 2000, Windows NT 4.0, Windows 98, and UNIX computers.

Rodney attaches a print device to his computer and creates a printer for it. He wants to let users in the research department print to his printer. You share Rodney’s printer as Printer1 and publish it to Active Directory. You perform all necessary configurations so users in the research department can print to Printer1. You connect to Printer1 from each client operating system and successfully print a test page.

Later, a Windows 98 user complains that certain types of print jobs turn out garbled. You research the issue and discover that an updated Windows 98 print driver is verified to solve the problem. You update the print driver on Rodney’s computer, but the Windows 98 user still experiences the same problem.

You need to let the Windows 98 user print successfully to Printer1. What should you do?

nmlkj Delete and recreate Printer1.

nmlkjEdit the properties of Printer1, uncheck the Windows 95, 98, and ME additional print driver option, and apply the change. Return and check the Windows 95, 98, and ME additional print driver option to reinstall the print driver.

nmlkji Install the updated print driver on the Windows 98 computer.

nmlkj Tell the user to disconnect from Printer1 and connect again.

You are the desktop administrator for your company. Currently all developers are running Windows 98. The company wants to migrate to Windows XP Professional. Programmers are going to code in both a Windows 98 environment and a Windows XP environment.

Each programmer’s computer currently has a single 20 GB local hard disk. Each hard disk has two FAT32 partitions, drives C: and D:. Each partition is 5 GB. Drive C: stores the Windows 98 operating system, and drive D:

Hacked by Piratez 70-270

Page 92: 70 270 q & a

Explanation:

FAT32 is the best file system that can be used by both Windows XP and Windows 98. NTFS cannot be read under Windows 98. FAT32 is a better choice than FAT 16 because of its large disk support. Therefore, keep the existing FAT32 format for drive D:. Because drive E: will not need to be accessed from Windows 98, you can format drive E: using NTFS to provide advanced capabilities such as file permissions, compression, encryption, and disk quotas. CDFS is a CD-ROM file system.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[204 #260]

Explanation:

FAT16 and NTFS are supported by both Windows XP and Windows NT. However, NTFS is not recommended for disks

partitions, drives C: and D:. Each partition is 5 GB. Drive C: stores the Windows 98 operating system, and drive D: stores user data. The remaining space on the hard disk is unallocated.

You plan to create a third partition on each computer (drive E:) and install Windows XP Professional to it. You need to make sure programmers can access drive D: from both Windows 98 and Windows XP Professional. Programmers will not need to access drive E: from Windows 98, and you want to secure that drive using file permissions. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Keep the current file system on drive D:.

gfedc Back up drive D and reformat it using CDFS. Then restore the data to drive D:.

gfedc Back up drive D and reformat it using FAT16. Then restore the data to drive D:.

gfedcb Format drive E: using NTFS during the Windows XP Professional installation.

gfedc Format drive E: using FAT16 during the Windows XP Professional installation.

gfedc Convert drive D: to NTFS after you install Windows XP Professional.

gfedc Format drive E: using FAT32 during the Windows XP Professional installation.

You are the desktop administrator for your company. Your company uses Windows XP Professional for client workstations. Greg, a graphic artist, has a removable disk device installed on his computer. The device can use storage modules of varying size. Greg uses these storage modules to transfer graphic files to a printing company. The printing company uses Windows NT 4.0 SP3.

Greg inserts a new 8-MB disk device into his computer and formats it using the default file system. He takes the disk to the printing company, but the disk is unreadable in their computers.

You need to help Greg format the disk so he can use it transfer large graphic files to the printing company. What should you do?

nmlkj Format the disk as FAT32 with a 1-KB cluster size

nmlkj Format the disk as FAT32 with a 4-KB cluster size

nmlkj Format the disk as NTFS with a 4-KB cluster size

nmlkji Format the disk as FAT16 with a 4-KB cluster size

Hacked by Piratez 70-270

Page 93: 70 270 q & a

smaller than 10 MB and Windows NT Service Pack 4 or later is required to access an NTFS partition created by Windows XP. In this scenario, FAT16 would be the most appropriate file system choice. Windows NT does not support FAT32. Also, FAT32 does not support drives smaller than 512 MB in Windows XP.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.1

[204 #271]

Explanation:

Windows 98 supports FAT (FAT16) and FAT32, but not NTFS. Therefore, you can format the C: partition (the system partition) with FAT or FAT32, but not with NTFS. The system partition, which the BIOS refers to when booting both Windows 98 and Windows XP, must remain compatible with both operating systems. In this scenario, FAT32 is the only choice because of the partition size. FAT partitions that are accessed by Windows 98 can be up to 2 GB in size. FAT32 supports larger partition sizes.

Note: Normally, you should install Windows XP on an NTFS partition. In a dual-boot configuration, you will normally install the Windows XP operating files on a different partition than the system partition. This partition can be formatted as NTFS (unless you want other operating systems such as Windows 98 or NT 4.0 to have access to it also), and is known as the Windows XP boot partition.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[204 #279]

You are the desktop administrator for your company. The company wants to migrate to Windows XP Professional and has purchased new computers for every developer. Programmers in the company will need to code and test in both a Windows 98 environment and a Windows XP environment.

You plan to install both Windows 98 and Windows XP Professional on each programmer’s new computer to let programmers dual-boot to either operating system. Each computer will have a single 20 GB local hard disk with three 6 GB partitions. Drive C: will contain Windows 98, drive D: will contain user data, and drive E: will contain Windows XP Professional.

You need to decide a format for the C: drive. What should you do?

nmlkj Format the C: drive using HPFS.

nmlkj Format the C: drive using CDFS.

nmlkj Format the C: drive using NTFS.

nmlkj Format the C: drive using FAT16.

nmlkji Format the C: drive using FAT32.

You are a network administrator responsible for a branch office of your company One user needs to dual-boot

Hacked by Piratez 70-270

Page 94: 70 270 q & a

Explanation:

Windows 98 cannot read NTFS formatted partitions, so for the files to be available for both operating systems, the data partition must be formatted using FAT32. The only way to convert a drive from NTFS to FAT32 is to reformat the drive (which will destroy all files on the drive). Therefore, you need to back up the files before formatting the drive. Also, you need to boot to Windows XP to work with the E: drive because Windows 98 cannot read NTFS drives.

Third-party utilities are also available to convert an NTFS drive to FAT32.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.1

[204 #288]

You are a network administrator responsible for a branch office of your company. One user needs to dual boot between Windows 98 and Windows XP to perform a demonstration for a client. The user’s laptop was previously configured for dual-booting Windows 98 and Windows NT, but you upgraded Windows NT to Windows XP some time back and the Windows 98 operating system has not been used since that time.

You examine your records for the system, which indicate that the laptop has one physical drive with three partitions. The partitions are allocated in the following manner:

Partition 1, Drive C:--Windows 98, 10GB, FAT32 Partition 2, Drive D:--Windows XP, 20GB, NTFS Partition 3, Drive E:--10 GB, NTFS (holds data files only, no OS installed)

The user reports that a Windows 98 application can no longer open the files necessary for the demonstration. The files are located on the E: drive. The user can use the Windows XP installation of the same application to access the same files. The Windows 98 installation of the application can also open some sample files installed with the application without experiencing problems.

You need to help the user open the demonstration files on the E: drive using the Windows 98 installation of the application. What should you do?

nmlkj Boot to Windows XP and run Convert.exe to convert drive E: to FAT32.

nmlkjBoot the system into Windows 98, back up the files from drive E:, reformat drive E: using FAT32, and then restore the files back to drive E:.

nmlkjBoot the system into Windows XP, back up the files from drive E:, reformat drive E: using NTFS version 4, and then restore the files back to drive E:.

nmlkjReload the Windows XP partition with NT4, back up the files from drive E:, reformat drive E: using NTFS version 4, and then restore the files back to drive E:.

nmlkjiBoot the system into Windows XP, back up the files from drive E:, reformat drive E: using FAT32, and then restore the files back to drive E:.

nmlkj Reload the Windows 98 partition and apply all service packs and hot fixes.

You are the desktop administrator for your company. The company CEO has asked you to prepare a laptop computer to dual-boot between Windows 98 and Windows XP Professional. The laptop has three drives, all of which are currently formatted using FAT32. Windows 98 is currently installed on the C: drive. The CEO currently stores all applications on the D: drive and stores user data on both the D: and the E: drive.

You move the CEO’s user data from the E: drive to the D: drive and install Windows XP Professional on the E: drive. After the installation, you decide to convert the E: drive to NTFS. However, while typing the Convert command you accidentally type Convert C: /fs:ntfs. After executing the command, you realize that this will prevent the CEO from booting to Windows 98.

Hacked by Piratez 70-270

Page 95: 70 270 q & a

Explanation:

If the Convert utitlity can gain exclusive access to a volume, it will convert it immediately. Open files on the volume to be converted will prevent Convert from gaining exclusive access. If the operating system is installed on the volume to be converted files will always be open. If files are open, you will be prompted to dismount the volume to force the files to be closed. If you decide not to force a dismount or if you are converting the volume that stores the operating system files (boot volume), you will be asked whether to schedule the conversion to occur during the next reboot. In this scenario, you must have decided to schedule the conversion for the next reboot.

In this case, the Convert utility works by writing a registry entry that defines the action to be taken next time the computer boots. By changing the statement before rebooting, you can cancel or change the NTFS conversion. In this scenario, the registry entry will be set to Autocheck autoconv\??\C: /fs:ntfs. You can change the "C:" to "E:" in the statement to convert the correct partition.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.1

[204 #298]

Explanation:

The Convert command-line utility lets you convert a drive to NTFS. The syntax of the Convert statement should be as follows (where volume is a drive letter followed by a colon):

p g

You need to make sure the system partition remains formatted with FAT32 so the CEO can boot to Windows 98. What should you do?

nmlkjRestart the computer in Safe Mode with Command Prompt and use Diskpart to convert the C: drive to FAT32.

nmlkjiModify HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Control/SessionManager and change the BootExecute string value.

nmlkj Reboot the system and choose Recovery Console from the Advanced Options.

nmlkj Modify the boot.ini file and add /ignore to the Windows XP operating system option.

You are the desktop administrator for your company. The company CEO has asked you to prepare a laptop computer to dual-boot between Windows 98 and Windows XP Professional. The laptop has three drives, all of which are currently formatted using FAT32. Windows 98 is currently installed on the C: drive. The CEO currently stores all applications on the D: drive and user data on both the D: and the E: drive.

You move the CEO’s user data from the E: drive to the D: drive and install Windows XP Professional on the E: drive. After the installation, you decide to convert the E: drive to NTFS. What should you do?

nmlkji Type Convert E: /fs:ntfs at the command line.

nmlkj Type Convert /E:ntfs at the command line.

nmlkj Open Disk Management, right-click the E: drive and select Convert. Choose NTFS as the file system.

nmlkj Open Disk Management, right-click the E: drive and select Upgrade to NTFS.

nmlkj Back up your files on the E: drive and reformat the drive using NTFS.

Hacked by Piratez 70-270

Page 96: 70 270 q & a

CONVERT volume /FS:NTFS

Objective(s):

204. Configure and manage file systems.

[204 #306]

Explanation:

You can mount an NTFS volume to an empty folder on another NTFS drive. The mounted volume can then be accessed from the folder. Because the Downloads folder is not empty, you need to move the files out of the Downloads folder before you can mount the volume as the Downloads folder in this scenario.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[204 #315]

You are the desktop administrator for your company. A user of a Windows XP Professional computer often downloads large files from the Internet and saves them in a Downloads folder on the computer’s C: drive. Currently, 2.4 GB of data is in the Downloads folder, and the C: drive is becoming full. The computer has a single 20 GB hard drive, but only 15 GB is currently allocated to the C: drive. The other 5 GB has not yet been allocated.

You examine the C: drive and discover that it is currently formatted with FAT32 because the computer was upgraded from Windows 98. You convert the C: drive to NTFS. You also create a 5 GB NTFS volume from the unallocated space.

You want to let the user continue to download files to the Downloads folder. What should you do?

nmlkjiMove the existing files from the Downloads folder. Mount the new partition as the Downloads folder. Move the files back to the Downloads folder.

nmlkj Mount the new volume as the Downloads folder.

nmlkjMove the existing files from the Downloads folder to a subfolder of the Downloads folder. Mount the new volume as the Downloads folder. Move the files back to the Downloads folder.

nmlkjMove the existing files from the Downloads folder to a subfolder of the Downloads folder. Mount the new volume as the Downloads folder.

You are the desktop administrator for your company. A user of a Windows XP Professional computer often downloads large files from the Internet and saves them in a Downloads folder on the computer’s C: drive. Currently, 2.4 GB of data is in the Downloads folder, and the C: drive is becoming full. The computer has a single 20 GB hard drive, but only 15 GB is currently allocated to the C: drive. The other 5 GB has not yet been allocated.

You examine the C: drive and discover that it is currently formatted with FAT32 because the computer was upgraded from Windows 98. You convert the C: drive to NTFS.

You want to let the user continue to download files to the Downloads folder. What should you do?

C G S f f f

Hacked by Piratez 70-270

Page 97: 70 270 q & a

Explanation:

You can mount an NTFS volume to an empty folder on another NTFS drive. The mounted volume can then be accessed from the folder. Because the Downloads folder is not empty, you need to mount the volume as a new subfolder in the Downloads folder in this scenario.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[204 #323]

Explanation:

You can mount an NTFS volume to an empty folder on another NTFS drive. The mounted volume can then be accessed from the folder. Because the computer was upgraded from Windows 98, it appears that the C: drive is still using FAT32. You need to run the Convert utility to convert the C: drive to NTFS. A dynamic disk is not required to mount an NTFS partition or volume (basic disks also work). In any case, the disk was already converted to a dynamic disk because you were able to create a new NTFS volume.

Objective(s):

204. Configure and manage file systems.

Reference(s):

TestOut for Windows XP Administration, Section 4.1

nmlkjiCreate a 5 GB NTFS volume from the unallocated space. Mount the new volume as a new subfolder of the Downloads folder.

nmlkj Create a 5 GB FAT32 volume from the unallocated space. Mount the new volume as the Downloads folder.

nmlkjCreate a 5 GB FAT32 volume from the unallocated space. Mount the new volume as a new subfolder of the Downloads folder.

nmlkj Create a 5 GB NTFS volume from the unallocated space. Mount the new volume as the Downloads folder.

You are the desktop administrator for your company. You recently upgraded all Windows 98 computers to Windows XP Professional. A user of an upgraded Windows XP Professional computer often downloads large files from the Internet and saves them in a Downloads folder on the computer’s C: drive. However, the C: drive is becoming full.

You examine the computer’s hard disk and discover that it has a single 20 GB hard drive, but only 15 GB is currently allocated to the C: drive. The other 5 GB has not yet been allocated. You create a 5 GB NTFS volume from the unallocated space and attempt to mount the new volume as a subfolder of the Downloads folder. However, you cannot mount the new volume.

You want to let the user continue to download files to the Downloads folder. What should you do?

nmlkj Run the Diskpart /s command and specify a script file that extends the C: drive.

nmlkj Move the existing files out of the Downloads folder.

nmlkj Open Disk Management and convert the hard disk to a dynamic disk.

nmlkji Run the Convert c: /fs:ntfs command.

Hacked by Piratez 70-270

Page 98: 70 270 q & a

[204 #331]

Explanation:

Files are stored in one cache, even if multiple users use offline folders on the same computer. However, NTFS permissions on files stored on the server also apply to cached copies of the files stored on the local hard drive. If a user does not have access to a file when it's on the server, the user does not have access to the file when it's cached on the local hard drive.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #260]

Explanation:

If you don't want the contents of a shared folder to be cached offline, open the folder's Properties dialog box and clear Allow

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Users store most data on Windows 2000 file servers.

Christa manages a group of sales people, and Anthony manages a group of developers. Because they don't travel very often, Christa and Anthony share a laptop computer. Both need to use offline files, but are concerned about confidentiality. Christa has access to confidential files for her department, and Anthony has access to confidential files for his department. Neither wants the other to be able to read his or her files.

You want to make sure that Christa and Anthony cannot access each other’s offline files when either user is logged on to the laptop. What should you do?

nmlkj Create profiles for each user that protect their offline files.

nmlkj Use two caches for offline files. Assign permissions so each user can access only their own cache.

nmlkj Create a policy that protects the offline files from use by unauthorized individuals.

nmlkji Assign appropriate NTFS permissions to the files on the server.

You are a help desk technician for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Jim’s Windows XP Professional computer has a shared folder named Public. Jim does not want this folder used for offline files because of potential version-control conflicts.

You need to help Jim prevent files from the Public folder from being cached to client computers. What should you do?

nmlkj Create a group policy that prevents offline file use of the Public folder.

nmlkj Open the Public folder's Properties dialog box and select Not for use offline.

nmlkji Clear Allow caching of files in this shared folder in the Public folder's Properties dialog box.

nmlkj Create a profile that prevents offline file use of the Public folder.

Hacked by Piratez 70-270

Page 99: 70 270 q & a

caching of files in this shared folder.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #268]

Explanation:

When you set offline file caching options for a shared folder, you can enable or disable caching altogether, or you can allow caching using one of the following options:

Manual caching of documents lets users manually specify the documents that they want cached. This is the default. The client's setting for how much disk space is available for temporary offline files does not apply (although the drive on which the offline files cache resides must still have sufficient space to cache the file). Automatic caching of documents caches data files to client computers without requiring user intervention. Only files accessed by users are cached. The client's setting for how much disk space is available for temporary offline files applies. Automatic caching of programs and documents caches data files and program files to client computers. Only files accessed by users are cached. The client's setting for how much disk space is available for temporary offline files applies.

Automatic caching is a good option for transparently increasing performance and decreasing network utilization when users access files from shared folders.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #276]

You are a help desk technician for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Jim’s Windows XP Professional computer has a shared folder named Public that contains read-only data and executable files. Jim wants all files in the Public shared folder to be cached on client computers to provide a performance benefit and to decrease network utilization.

You need to help Jim configure caching for the Public shared folder. What should you do?

nmlkj Configure the shared folder to use Manual caching of documents.

nmlkj Configure the shared folder to use Automatic caching of documents.

nmlkj Configure the shared folder to disable caching.

nmlkji Configure the shared folder to use Automatic caching of programs and documents.

You are a help desk technician for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Users store most data on Windows 2000 file servers.

Hacked by Piratez 70-270

Page 100: 70 270 q & a

Explanation:

Offline files are stored on a file server, but are also copied to the user's local hard drive. When the user logs off and on the network, the files on the local hard drive are synchronized with the files on the network server. This feature is designed to give mobile users access to their files even when they are not connected to the network. Offline files is best when working over a network connection that might not always be present. Briefcase folders have similar synchronization functionality but are best for a small number of files transferred to another computer by disk or through a docking station.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #284]

Explanation:

The fact that Rodney does not see an option to make the file available offline (rather than the option simply being disabled) means that offline files are not yet enabled on his computer. For files in a shared folder to be cached to client computers:

Sally travels a lot and always takes a personal Windows XP Professional laptop computer with her. She is responsible for regularly updating sales reports that are stored on a company file server. Sally wants to work on these reports when she is not connected to the network, and then have the files automatically synchronized when she is connected.

You need to help Sally configure her laptop. What should you instruct Sally to do?

nmlkj Use e-mail to download the files from the server and upload them back to the server.

nmlkji Use offline files.

nmlkj Use ftp to copy the files to and from the server.

nmlkj Use a briefcase folder.

You are a help desk technician for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Users store most data on Windows 2000 file servers.

Rodney, a user in the research department, creates a shortcut to a file named Report.doc, which is located in a shared folder on a Windows 2000 server. Rodney wants to use the shortcut when the network goes down. However, when he right-clicks the shortcut, he does not see an option to make it available offline.

You need to help Rodney make the Report.doc file available offline. What should you do?

nmlkji Use Windows Explorer to enable offline files.

nmlkjSelect Synchronize from the Tools menu in Windows Explorer. Then click the Setup button and make the necessary configuration.

nmlkjOpen Windows Explorer on Rodney's computer. Browse My Network Places, right-click the shared folder, select Sharing and Security, and ensure that caching is enabled.

nmlkj Right-click the actual file rather than the shortcut to the file.

Hacked by Piratez 70-270

Page 101: 70 270 q & a

1. Caching must be enabled on the shared folder, and 2. Offline files must be enabled on the client computer that will be caching the files.

Although caching might not be enabled for the shared folder, none of the options provided in this question will successfully verify or enable caching for the shared folder (you cannot browse the network and view the properties of the folder like you can when accessing the computer directly or through Remote Desktop). The only option that correctly addresses the stated problem is to enable offline files on Rodney's computer.

To enable offline files on a client computer:

1. Open Windows Explorer and select Tools>Folder Options. 2. Click the Offline Files tab and select Enable Offline Files.

After enabling offline files, you might need to manually indicate which files you want to cache by right-clicking the file in the shared folder and selecting Make Available Offline. You can perform this action on shortcuts to the file you want to cache as well as the actual file itself. Shared folders might be configured to allow automatic caching, in which case you will not need to manually indicate which files to cache. Cached files are stored in an Offline Files folder. Synchronization settings configure when the cached files and the original files will be synchronized.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #292]

Explanation:

Some types of files should not be made available offline to prevent file conflicts and data loss. For example, by default you are not allowed to make Microsoft Access Application (.mdb) files available offline.

The application was working when the users were using NT 4.0, so it is most likely that something new in Windows XP is causing the problem. Under NT 4.0, users would not have been caching files offline; under Windows XP they can.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

You are a network administrator for your company. Twenty users in the office run an accounting application on their Windows NT Workstation 4.0 computers. The application stores its data in a shared network folder named Reports on a Windows 2000 Server computer named Server1.

You upgrade all NT 4.0 computers to Windows XP Professional and verify that all applications are compatible with Windows XP. After the upgrade, some users report that they are receiving intermittent data-corruption error messages. They are also receiving data file-version mismatch error messages. When these errors occur, your only method of recovery is to restore the entire contents of the Reports folder from a known good backup copy.

You need to prevent these errors from occurring in the future. What should you do?

nmlkji Configure the Reports folder to disable client caching.

nmlkjCreate a group policy that increases the amount of idle time required before a session disconnects on Server1.

nmlkj Uninstall Windows XP Professional on the upgraded computers.

nmlkj Create a group policy that removes the Bypass traverse checking user right on Server1.

nmlkj Configure the Reports folder to allow a maximum of one user.

Hacked by Piratez 70-270

Page 102: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #300]

Explanation:

To set up offline files, you must first enable offline files by setting options on the Offline Files tab of Folder Options. Afterwards, you must right-click the file or folder you want to use and select Make Available Offline. For files to be made available offline, the portable computer must be connected to the network. When network files are made available offline, the network versions of files and folders are copied to the local hard disk. When users are not connected to the network, they have access to the offline versions of the files and folders as though they were connected to the network. When they reconnect to the network, the stored files and folders are synchronized with the network versions of the files.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #309]

You are a help desk technician for your company. A user named Chad runs Windows XP Professional on his portable computer. While at home, Chad wants to work on files that he has created on the company network.

Before he logs off of the network and leaves the office, Chad enables offline files. When he arrives at home, he finds that copies of his folders and files on the network are not available on his portable computer. Chad calls you from home and asks for help.

You need to help Chad use his files offline. What should you tell Chad to do?

nmlkjAt the office, create a shortcut to the Offline Files folder. Chad will be able to access his files the next time he logs off the network.

nmlkj Enable file and print sharing. Chad will be able to access his files at home immediately.

nmlkj Synchronize all offline files before leaving the office.

nmlkj Synchronize all offline files. Chad will be able to access his files at home immediately.

nmlkjiAt the office, make the desired files available offline. By default, Chad will be able to access his files the next time he logs off the network.

You are a help desk technician for your company. A user named Chad runs Windows XP Professional on his portable computer. The computer is configured to use offline files. Chad’s offline files include one large project file and seven smaller planning and time-tracking files.

While telecommuting, Chad dials into the main office to check his e-mail and chat with some of his co-workers. However, when he does this, the laptop synchronizes all of his files. Chad calls you and asks for help configuring synchronization. Chad wants only the small files to be synchronized while he is away from the office.

You need to help Chad configure offline files synchronization. What should you direct Chad to do? (Choose two. Each correct choice is part of the solution.)

Hacked by Piratez 70-270

Page 103: 70 270 q & a

Explanation:

The best way to handle this situation is to manually set the files so the large file only synchronizes while at the office and the small files synchronize from anywhere. You can perform these actions through the Synchronize program. You can open the Synchronize program from Windows Explorer by selecting Tools then Synchronize.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #318]

Explanation:

If you do not want users to be able to access files offline, disable caching.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #328]

gfedc On the Offline files tab of Folder Options, clear the Synchronize all files before logging off check box.

gfedc On the Offline files tab of Folder Options, clear the Enable Offline Files check box.

gfedc Use SLIP instead of PPP when dialing up to the RAS server.

gfedc Rename the directory in which he keeps his offline files when he does not want to synchronize files.

gfedcb Configure synchronization settings to synchronize the large project file only when using the LAN connection.

gfedcbConfigure synchronization settings to synchronize the personal files for both the LAN connection and the dial-up connection.

You are a help desk technician for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of an Active Directory domain. Jim’s Windows XP Professional computer has a shared folder named Reports that contains financial reports. Only authorized users can access the Reports folder.

Jim wants to prevent files in the Reports folder from being cached locally to computers that access the Reports folder. Jim calls you for help.

You need to help Jim configure his computer. What should you direct Jim to do?

nmlkji Use Windows Explorer to disable caching for the shared folder.

nmlkj Use Windows Explorer to disable Offline Files.

nmlkjUse Synchronization Manager to configure synchronization not to occur when users are connected to the LAN connection.

nmlkj Use Windows Explorer to grant users Special Access to the financial report in the network share.

Hacked by Piratez 70-270

Page 104: 70 270 q & a

Explanation:

To enable offline files, you must disable the Fast User Switching option. To do so, open the User Accounts applet in the Control Panel and select the Change the way users log on or off task. On the Select Logon and Logoff Options screen, uncheck the Fast User Switching option. This task is applicable only on standalone or workgroup computers. Fast User Switching is always disabled on a domain member computer.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #336]

You are a help desk technician for your company. Pam is a traveling salesperson and wants to configure her laptop to allow her to work on documents stored on a server, even when disconnected from her branch office network. Pam calls you for help.

You instruct Pam to configure her machine to use offline files, but when she accesses the Offline Files tab, the option to Enable Offline Files is not available. Instead, she receives a message about Fast User Switching being enabled.

You need to help Pam enable offline files on her computer. What should you instruct Pam to do?

nmlkjOpen the Synchronize option from the Accessories. Click the Setup button, then click the Override Fast User Switching check box.

nmlkjiOpen User Accounts from within Control Panel. Clear the Fast User Switching check box on the Select Logon and Logoff Options screen.

nmlkjRun Add or Remove Programs from within Control Panel. Select and remove the Fast User Switching program from Add/Remove Windows Components.

nmlkj Open Computer Management and disable Fast User Switching in Local Users and Groups.

You are the desktop administrator for your company. You administer a Windows XP Professional laptop computer with dual-boot capability to Windows 98. The laptop is used by Michelle, a user in Marketing. To accommodate Windows 98, all hard drive partitions are formatted with FAT32.

Michelle wants to work on some documents stored in the Reports shared folder while at home. You log on to Michelle's laptop using your administrative account and make the necessary documents available offline. While doing so, Windows XP informs you that permissions will not be applied to the offline files cache.

Michelle takes her laptop home, but when she attempts to open any document you made available offline, she is denied permission. You want to make sure Michelle is not denied permission when accessing offline files from the Reports share. What should you do?

nmlkj Apply NTFS permissions to the offline file cache.

nmlkj Apply share permissions to the offline file cache.

nmlkj Decrypt the offline file cache.

nmlkji Ask the administrator of the Reports shared folder to apply NTFS permissions. Resynchronize.

Hacked by Piratez 70-270

Page 105: 70 270 q & a

Explanation:

In this scenario, you have NTFS permission to the documents in the Reports share, but Michelle does not. Even though the laptop’s hard drive is formatted with FAT32 and the offline files cache folder is not protected with NTFS permissions, Windows XP will respect the NTFS permissions of the documents when accessing them using the offline files feature. You should ask the administrator of the Reports share to grant appropriate permission to Michelle. You can only encrypt the local offline file cache if the cache resides on an NTFS drive, so the cache will already be decrypted. NTFS permissions are not applicable to the offline file cache if the cache resides on a FAT32 drive. Share permissions are not applicable to the offline file cache.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #344]

Explanation:

The best solution in this scenario is to encrypt the offline file cache. NTFS permissions only protect the data from being accessed by users who log on to the computer. Encryption protects the data even if it is accessed from outside the operating system. Share permissions are inapplicable to the offline file cache. Applying share permissions to the shared folder only affects access to the data on the network. It does not protect the offline file cache. You can only encrypt the local offline file cache if the cache resides on an NTFS drive (which it does in this scenario). The encryption is done on a per system basis to all files in the cache. This solution is intended to protect unauthorized access of the files from a different operating system. Encrypting the source files on the network does not affect the encryption of the files in the local offline file cache.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

You are the desktop administrator for your company. You administer a Windows XP Professional laptop computer with a single NTFS drive. The company CEO is the only user of the laptop. No other user has a user account for the laptop. You have secured the Administrator account and ensured that the Guest account is disabled.

The company CEO wants to make some confidential documents stored in the Reports shared folder available offline on the laptop. The CEO asks you to protect the confidential documents while they are stored offline. The CEO is especially worried about the data being accessed if the laptop is stolen.

You want to accommodate the CEO’s request. What should you do?

nmlkj Apply NTFS permissions to the offline file cache.

nmlkj Apply share permissions to the offline file cache.

nmlkji Encrypt the offline file cache.

nmlkj Ask the administrator of the Reports shared folder to apply NTFS permissions.

nmlkj Ask the administrator of the Reports shared folder to apply share permissions.

nmlkj Ask the administrator of the Reports shared folder to encrypt the confidential documents.

nmlkj You cannot protect the confidential documents in this scenario.

Hacked by Piratez 70-270

Page 106: 70 270 q & a

[205 #355]

Explanation:

You must be a computer administrator to enable offline files and make other system-wide changes including encrypting the offline file cache. Encrypting the offline file cache is a system-wide change because the encryption will apply to the offline files of all users (not just your own). In this scenario, you are not logged on as an administrator (another user who is an administrator must have enabled offline files).

Encrypting the source files on the network will have no effect on the encryption state of the files when cached locally. Because offline files are already enabled, the Fast User Switching option must already be disabled and the Enable offline files option will already be enabled and checked. Also, Fast User Switching is always disabled on members of a domain.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #366]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. All computers are members of an Active Directory domain. Sally, a user in the sales department, calls and asks for help protecting offline files on her laptop. Sally has made some confidential files available offline from the Reports shared folder.

You direct Sally to encrypt the offline file cache. However, Sally says that the Encrypt offline files to secure dataoption is disabled and cannot be selected. You go to her computer and verify that the computer’s offline files feature is currently enabled but that the offline file cache cannot be encrypted.

You need to encrypt the offline file cache for Sally. What should you do?

nmlkj Ask the administrator of the Reports shared folder to encrypt the folder.

nmlkj Disable the Fast User Switching option.

nmlkj Make sure the Enable offline files option is enabled and checked.

nmlkji Log on using an administrative account.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. All computers are members of an Active Directory domain. Rodney, a user in the research department, frequently accesses a static document on an Internet web site to consult a table of information. Rodney wants to maintain access to the document even if your company’s Internet connection goes down.

You enable offline files on Rodney’s computer. Rodney then opens Internet Explorer, and navigates to the page that he wants to make available offline.

You need to help Rodney make the page available offline. What should you direct Rodney to do?

nmlkji Add the document to the Favorites folder from Internet Explorer. Check the Make available offline option.

nmlkj Right-click the document when viewing it in Internet Explorer and select Make available offline.

nmlkjOpen the Folders explorer bar when viewing the document. Right-click the document’s folder and select Make available offline.

Hacked by Piratez 70-270

Page 107: 70 270 q & a

Explanation:

You can make a web page available offline by selecting the Make available offline option when adding the web page to your Favorites. The Add Network Place Wizard is used to add a web folder (WebDAV). The Folders explorer bar shows the local file structure rather than the file structure of the web site. You don’t get the option to make a web page available offline when right-clicking a web page that you are browsing.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #374]

Explanation:

Some types of files should not be made available offline to prevent file conflicts and data loss. For example, by default you are not allowed to make Microsoft Access Application (.mdb) files available offline. You can prevent other types of files from being cached by configuring a group policy with a Files not cached setting. In this case, add .dat files as the type of files that should not be cached.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

nmlkjAdd the document as a network place using the Add Network Place Wizard. Check the Make available offline option.

You are a network administrator for your company. Twenty users in the office run an accounting application on their Windows XP Professional computers. The application stores its data to .dat files in a shared network folder named Reports on a Windows 2000 Server computer named Server1. The Reports folder also contains some Excel spreadsheets that accounting users access. Caching is currently disabled on the Reports shared folder.

Some users of the Reports folder request you to enable caching for the folder so they can have offline access to the Excel spreadsheets while traveling with their Windows XP Professional laptops. You enable caching. After you enable caching, some users report that they are receiving intermittent data-corruption error messages when using the accounting application. When these errors occur, your only method of recovery is to restore the entire contents of the Reports folder from a known good backup copy.

You need to prevent these errors from occurring in the future. You also want to ensure that users can access the Excel spreadsheets offline. What should you do?

nmlkj Configure the Reports folder to disable client caching.

nmlkj Create a group policy that removes the Bypass traverse checking user right on Server1.

nmlkj Configure the Reports folder to allow a maximum of one user.

nmlkji Create a group policy that distributes a Files not cached setting.

nmlkjCreate a group policy that increases the amount of idle time required before a session disconnects on Server1.

Hacked by Piratez 70-270

Page 108: 70 270 q & a

[205 #382]

Explanation:

When locking down computers so no user data was stored locally, desktop administrators probably configured the Never allow my computer to go offline advanced offline files setting. To allow the laptop to use files from a specific server, you can add the server to an exception list.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #391]

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system and stores all data on Windows 2000 or greater file servers. You have instructed desktop administrators to lock down computers so no user data except user profiles are stored on local computers.

The company president travels frequently and wants to access all files in the Reports shared folder from a laptop without being connected to the network. Server1 hosts the Reports shared folder. You access Server1 and enable caching for the Reports shared folder. A desktop administrator also enables offline files on the laptop and makes all files in the Reports shared folder available offline. After returning from the next business trip, the company president tells you that the needed files from the Reports folder were not available on the laptop.

You need to ensure that the company president can access the needed files offline. What should you do?

nmlkjInstruct a desktop administrator to decrease the amount of disk space allocated to the paging file on the laptop.

nmlkjInstruct a desktop administrator to verify that the Synchronize all offline files when logging on option is enabled on the laptop.

nmlkjiInstruct a desktop administrator to add Server1 to the list exception list in the offline files Advanced Settings dialog on the laptop.

nmlkj Configure the Reports shared folder to use automatic rather than manual caching.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system and stores all data on Windows 2000 or greater file servers. You have instructed desktop administrators to lock down computers so no user data except user profiles are stored on local computers.

The company president travels frequently and wants to access all files in the Reports shared folder from a laptop without being connected to the network. You enable caching for the Reports folder. A desktop administrator also enables offline files on the laptop and makes all files in the Reports shared folder available offline. After returning from the next business trip, the company president tells you that the needed files from the Reports folder were not available on the laptop.

You need to ensure that the company president can access the needed files offline. What should you do?

nmlkj Configure the Reports shared folder to use automatic rather than manual caching.

nmlkjiInstruct a desktop administrator to select the Notify me and begin working offline option in the offline files Advanced Settings dialog on the laptop.

nmlkjInstruct a desktop administrator to verify that the Synchronize all offline files when logging on option is

Hacked by Piratez 70-270

Page 109: 70 270 q & a

Explanation:

When locking down computers so no user data was stored locally, desktop administrators probably configured the Never allow my computer to go offline advanced offline files setting. To allow the laptop to use offline files, you can select the Notify me and begin working offline option instead.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #399]

Explanation:

When files are automatically cached, they are marked as temporarily available offline. They may or may not be available offline (depending on the amount of disk space available for the temporary offline file cache). If you want to guarantee that a document will be available offline, you should instruct users to manually select the documents to cache. As long as the disk containing the offline files cache is not full, users will be able to manually cache the documents. The disk space limit for temporary offline files does not apply to manually cached documents.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #407]

nmlkj enabled on the laptop.

nmlkjInstruct a desktop administrator to decrease the amount of disk space allocated to the paging file on the laptop.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system and stores all data on Windows 2000 or greater file servers. You have instructed desktop administrators to lock down computers so no user data except user profiles is stored on local computers.

The company president travels frequently and wants to access all files in the Reports shared folder from a laptop without being connected to the network. You enable automatic caching of documents for the Reports folder. A desktop administrator also enables offline files on the laptop. After returning from the next business trip, the company president tells you that some, but not all, needed files from the Reports folder were available on the laptop.

You need to ensure that the company president can access all the needed files offline. What should you do?

nmlkj Instruct a desktop administrator to run the Gpupdate /Target:Computer /Force command on the laptop.

nmlkj Instruct a desktop administrator to manually synchronize the offline files on the laptop.

nmlkji Instruct the company president to make the needed files available offline manually.

nmlkjInstruct a desktop administrator to verify that the Synchronize all offline files when logging on option is enabled on the laptop.

Hacked by Piratez 70-270

Page 110: 70 270 q & a

Explanation:

When files are automatically cached, they are marked as temporarily available offline. They may or may not be available offline (depending on the amount of disk space available for the temporary offline file cache). If enough disk space is not allocated to temporary offline files, some files might not be cached to the local computer and will not be available offline. To configure the amount of disk space used for offline files, go to the Offline Files tab in Folder Options.

If you want to guarantee that a document will be available offline, a better solution may be to enable manual caching of documents and instruct users to manually select the documents to cache. As long as the disk containing the offline files cache is not full, users will be able to manually cache the documents. The disk space limit for temporary offline files does not apply to manually cached documents.

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #415]

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system and stores all data on Windows 2000 or greater file servers. You have instructed desktop administrators to lock down computers so no user data except user profiles is stored on local computers.

The company president travels frequently and wants to access all files in the Reports shared folder from a laptop without being connected to the network. You enable automatic caching of documents for the Reports folder. A desktop administrator also enables offline files on the laptop. After returning from the next business trip, the company president tells you that some, but not all, needed files from the Reports folder were available on the laptop.

You need to ensure that the company president can access all the needed files offline. What should you do?

nmlkj Configure the Reports shared folder to use automatic caching of programs and documents.

nmlkj Instruct a desktop administrator to manually synchronize the offline files on the laptop.

nmlkj Instruct a desktop administrator to run Disk Cleanup on the laptop computer.

nmlkjInstruct a desktop administrator to verify that the Synchronize all offline files when logging on option is enabled on the laptop.

nmlkj Instruct a desktop administrator to run the Gpupdate /Target:Computer /Force command on the laptop.

nmlkji Instruct a desktop administrator to increase the amount of disk space used for temporary offline files.

You are the network administrator for your company. Your company uses Windows XP Professional and Windows 2000 as desktop operating systems and stores all data on Windows 2000 or greater file servers. All computers are members of an Active Directory domain. Offline files are enabled on all desktop computers and all shared folders on file servers allow automatic caching of documents or of programs, depending on the type of files stored in the shared folder. You hope that this decreases the negative impact of network down time.

To further protect users from network down time, you implement roaming user profiles. You also redirect the My Documents folder of each user to a shared folder named Users. Some users soon start complaining that their desktop computers are running out of disk space even though they have not installed any programs and have only stored a few new files in their My Documents folder. You instruct the users to run Disk Cleanup, but the complaints continue. You notice that only Windows XP Professional users complain of low disk space.

You need to free up disk space on the Windows XP Professional computers. What should you do? (Choose two. Each correct choice is part of the solution.)

Hacked by Piratez 70-270

Page 111: 70 270 q & a

Explanation:

Files in redirected folders are automatically made available offline on Windows XP Professional computers unless you enable the Do not automatically make redirected folders available offline administrative template setting. Even if you enable this setting, files in redirected folders will be made available offline if automatic caching is enabled on the network share. Therefore, you also need to use manual rather than automatic caching (or disable caching altogether.)

Objective(s):

205. Manage and troubleshoot access to and synchronization of offline files.

Reference(s):

TestOut for Windows XP Administration, Section 5.4

[205 #425]

gfedcEdit the local group policy object and enable the Remove Make Available Offline administrative template setting.

gfedc Disable folder redirection for the My Pictures folder.

gfedcb Configure the Users shared folder to use manual caching.

gfedcbEdit the local group policy object and enable the Do not automatically make redirected folders available offline administrative template setting.

gfedcConfigure the Users shared folder to use automatic caching for documents rather than automatic caching for programs.

Hacked by Piratez 70-270

Page 112: 70 270 q & a

300

Implementing, Managing,

Monitoring, and Troubleshooting

Hardware Devices

and Drivers

Page 113: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

You can convert basic hard disks to dynamic hard disks using the Disk Management MMC snap-in or the diskpart command from the command line. The diskpart command is useful when running scripts, perhaps in conjunction with installing the operating system.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.2

[301 #260]

Explanation:

A hard disk must either be basic or dynamic. You cannot combine both types of storage on a single disk. In this example, the disk contains partitions, so it is a basic disk. To create a simple volume, upgrade the disk to be dynamic. Then create a

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You are preparing a new Windows XP computer for Jim, the sales manager. The computer has three 10 GB hard disks.

You create a single partition using the entire first hard disk (Disk 0) and install Windows XP to that partition. You now want to upgrade all disks to be dynamic. What should you do? (Choose two possible solutions.)

gfedc Use the volume properties dialog in Windows Explorer.

gfedc Use the Removable Storage snap-in in the pre-configured Computer Management console.

gfedc Use the fsutil command from the command line.

gfedcb Use the diskpart command from the command line.

gfedcb Use the Disk Management snap-in in the pre-configured Computer Management console.

gfedc Use the format command from the command line.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Jim, the sales manager, uses a Windows XP Professional computer that has a single hard disk. The disk currently contains two primary partitions, one extended partition, and some free space.

You want to use the free space on the computer’s hard drive to create a new simple volume for storing applications. What should you do?

nmlkjIn Disk Management, upgrade the free space to a dynamic volume. Right-click the free space, then click Create volume.

nmlkj In Disk Management, format all partitions with the NTFS file system.

nmlkj In Disk Management, select the free space, then click Create volume on the Disk menu.

nmlkjiIn Disk Management, upgrade the disk to be a dynamic disk. Right-click the free space, then click Create volume.

nmlkj In Disk Management, right-click the free space, then click Simple volume.

Page 114: 70 270 q & a

simple volume from the free space.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.2

[301 #270]

Explanation:

Dynamic disks are not supported by Windows NT 4.0. However, they are supported by both Windows 2000 and Windows XP, so you should put the disk in a Windows 2000 or Windows XP computer to retrieve the data.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.2

[301 #279]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Jim, the sales manager, uses a Windows XP Professional computer with two hard disks. Both disks have a single simple volume. The first disk contains the operating system files and the second disk contains applications and data.

Today, the first disk in Jim’s computer failed. You take the second drive out of the computer and install it in a Windows NT 4.0 Workstation computer to retrieve the data. Unfortunately, the NT 4.0 computer will not let you read the data.

You want to recover the data on Jim’s second disk. What should you do?

nmlkj Reformat the volume on Jim’s second disk.

nmlkj Convert the volume on Jim’s second disk to use NTFS.

nmlkj Install the latest service pack on the NT 4.0 Workstation computer.

nmlkji Install Jim’s second disk in a different computer.

nmlkj Import the foreign disk.

You are the desktop administrator for your company. Two weeks ago, you helped Jim upgrade his Windows NT 4.0 Workstation computer to Windows XP Professional. Jim’s workstation has a single hard disk with a 2 GB partition (drive C:) and 2 GB unpartitioned space. Today, Jim saved a multimedia file to his hard drive and received an error message stating that the disk was full.

You need to increase the size of Jim’s C: drive. What should you do?

nmlkj Convert the disk drive to a dynamic disk. Then extend drive C: to use additional unallocated space. Create a new volume from the unallocated space Create a stripe set that includes drive C: and the new

Hacked by Piratez 70-270

Page 115: 70 270 q & a

Explanation:

You cannot extend the system or boot volume. A stripe set would not increase the amount of space. Even if it could, the system or boot volume cannot participate in a stripe set. The only solution is to create a mount point from unallocated space.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[301 #288]

Explanation:

You cannot extend the system or boot volume. A stripe set would not increase the amount of space. Even if it could, the system or boot volume cannot participate in a stripe set. The Convert utility will not merge unallocated space. The only solution is to create a mount point from unallocated space.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.3

[301 #296]

nmlkjCreate a new volume from the unallocated space. Create a stripe set that includes drive C: and the new volume.

nmlkj Extend drive C: to use additional unallocated space.

nmlkji Create a new volume from the unallocated space. Configure the new volume as a mount point on drive C:.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Jim, the sales manager, uses a Windows XP Professional computer that has two hard disks. Each disk contains an NTFS volume and 2 GB of unallocated space. Windows XP is installed on drive C:.

Jim notifies you that his computer is running out of space on drive C:. Jim explains that he runs an application that stores large data files on drive C:.

You want to increase available disk space on drive C: to accommodate the data produced by Jim’s application. What should you do?

nmlkj Uninstall the application and reinstall it on drive D:.

nmlkji Create a new volume from the unallocated space. Configure the new volume as a mount point on drive C:.

nmlkj Create a stripe set that includes unallocated space from both drives.

nmlkj Extend drive C: to use unallocated space.

nmlkj Merge unallocated space from both drives using the Convert.exe utility

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You have just installed a new Windows XP computer for Jim, the sales manager. The computer

Hacked by Piratez 70-270

Page 116: 70 270 q & a

Explanation:

Windows XP Professional does not support fault-tolerant volumes (mirrored volumes or RAID-5 volumes). Although you can upgrade Jim’s computer to a server-based operating system, which does support fault-tolerant volumes, that solution is expensive. You cannot span or stripe a volume that contains operating system files. Even if you could do so, the resulting volume would not be fault tolerant. Your best solution in this scenario is simply to perform regular backups.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #305]

Explanation:

Windows XP Professional does not support fault-tolerant volumes (mirrored volumes or RAID-5 volumes). A spanned volume uses multiple units of storage on the different drives. In this case, you can use the 2 GB remaining space Disk 1 and the 10 GB on Disk 2 to create a single 12 GB spanned volume. You can only create spanned volumes on dynamic disks.

Objective(s):

p g y j p , g phas three equal-sized hard disks. Disk 0 has a single simple volume that uses the entire disk space. This volume contains the operating system files, application files, and Jim’s data. The other disks are currently unused.

You want to protect Jim’s data and minimize downtime if Jim’s computer fails. What should you do?

nmlkj Convert the volume on Disk 0 to a RAID-5 volume that spans all three disks.

nmlkj Stripe the volume on Disk 0 to another disk.

nmlkji Perform regular backups.

nmlkj Span the volume on Disk 0 to another disk.

nmlkj Mirror the volume on Disk 0 to another disk.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You are preparing a new Windows XP computer for Jim, the sales manager. The computer has three 10 GB hard disks.

You create a single partition using the entire first hard disk (Disk 0) and install Windows XP to that partition. You upgrade all disks to be dynamic and create a second volume using 8 GB of space on Disk 1. This volume will be used to store application files.

You want to prepare a third volume that uses the remaining space on Disk 1 and all unallocated space on Disk 2. What should you do?

nmlkji Create a spanned volume.

nmlkj Create a RAID-5 volume.

nmlkj Create a mirrored volume.

nmlkj Create a simple volume.

nmlkj Create a striped volume.

Hacked by Piratez 70-270

Page 117: 70 270 q & a

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.2

[301 #314]

Explanation:

Windows XP Professional does not support fault-tolerant volumes (mirrored volumes or RAID-5 volumes). A striped volume stripes data across multiple drives. Because each drive can read or write data simultaneously, performance is greater than with a simple volume. In this case, you can use the 10 GB on the second and third disks to create a single 20 GB striped volume. You can only create striped volumes on dynamic disks.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 4.2

[301 #323]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You are preparing a new Windows XP computer for Jim, the sales manager. The computer has three 10 GB hard disks.

You create a single partition using the entire first hard disk (Disk 0) and install Windows XP to that partition. You upgrade all disks to be dynamic.

You want to prepare a second volume, which Jim will use for storing data and application files. The second volume should use all unallocated space on Disk 1 and Disk 2 and operate more quickly than a normal volume. What should you do?

nmlkji Create a striped volume.

nmlkj Create a RAID-5 volume.

nmlkj Create a simple volume.

nmlkj Create a spanned volume.

nmlkj Create a mirrored volume.

You are the network administrator for your company. You are responsible for making weekly backups of the company CEO’s Windows XP Professional computer using a tape drive connected to the CEO’s computer.

Last week, you performed a successful backup, but you noticed that the drive needed to be cleaned. You asked an assistant administrator to clean the drive as part of routine maintenance. The assistant reported this morning that the drive is clean, plugged back in, and ready to go with a new tape in the drive. However, when you try to start the backup, you cannot access the new tape.

You want to use the new tape in the tape drive to perform a backup. What should you do?

nmlkj Replace the tape drive with one compatible with Windows XP

Hacked by Piratez 70-270

Page 118: 70 270 q & a

Explanation:

Before a tape can be used for backup, it must be enabled. Open Computer Management and browse to Removable Storage. Under the Media node, select the tape and open its properties. On the Media tab, select the Enable Media check box. This check box is cleared when the drive is repaired or replaced. In this case, the assistant administrator forgot to enable it again. An Enable Drive setting also exists in the tape drive’s properties and must be enabled before the drive is usable. When a drive fails, this check box is cleared and must be re-enabled after the drive is repaired.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #332]

Explanation:

Backup Operators have permission to perform backup and restore operations on files. Backup Operators also have appropriate permission to use and control libraries (removable drives) and media pools to perform backups. However, by default, only members of the Administrators local group can format or eject removable media. To change this setting, edit the local group policy object or distribute a domain group policy object that provides a different value for the Devices: Allowed to format and eject removable media setting. This setting is located under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options. It has three possible values:

Administrators (default setting) Administrators and Power Users Administrators and Interactive Users

Even if you added Sally to the Power Users group, you would still need to change the value for the Devices: Allowed to format and eject removable media setting.

Objective(s):

nmlkj Replace the tape drive with one compatible with Windows XP.

nmlkj Replace the tape with a new blank one.

nmlkji Enable the backup media.

nmlkj Override the scheduled backup to enable manual backups.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

You install and configure a tape drive on Sally’s computer and add Sally’s user account to her computer’s Backup Operators local group. You successfully perform a test backup to a sample tape. A week later, Sally informs you that she cannot perform a backup to a new tape. When Sally attempts to format the new tape, she receives a message stating “You do not have sufficient rights to perform this operation.”

You want to let Sally prepare her own backup tapes and perform her own backups. What should you do?

nmlkj Remove Sally’s user account from the Users local group.

nmlkj Grant Sally the Control permission for the appropriate media pool.

nmlkji Edit the local security policy of Sally’s computer to allow interactive users to format removable media.

nmlkj Add Sally’s user account to the Power Users local group.

Hacked by Piratez 70-270

Page 119: 70 270 q & a

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #340]

Explanation:

Backup Operators have permission to perform backup and restore operations on files. Backup Operators also have appropriate permission to use and control libraries (removable drives) and media pools to perform backups. However, by default, only members of the Administrators local group can format or eject removable media. To change this setting, edit the local group policy object or distribute a domain group policy object that provides a different value for the Devices: Allowed to format and eject removable media setting. This setting is located under Computer Configuration\Windows Settings\Security Settings\Local Policies\Security Options. It has three possible values:

Administrators (default setting) Administrators and Power Users Administrators and Interactive Users

Even if you added Sally to the Power Users group, you would still need to change the value for the Devices: Allowed to format and eject removable media setting.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #348]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

You install and configure a tape drive on Sally’s computer and add Sally’s user account to her computer’s Backup Operators local group. You format a new tape for Sally and successfully perform a back up to the tape. Later, Sally informs you that she cannot eject the tape. She receives a message stating, “An error was encountered when trying to unmount “Removable Disk (X:). Check to make sure there are no open files or windows from that volume.”

You want to let Sally manage her own backup tapes and perform her own backups. What should you do?

nmlkj Add Sally’s user account to the Power Users local group.

nmlkj Instruct Sally to close Computer Management.

nmlkj Remove Sally’s user account from the Users local group.

nmlkj Grant Sally the Control permission for the appropriate media pool.

nmlkji Edit the local security policy of Sally’s computer to allow interactive users to eject removable media.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

Hacked by Piratez 70-270

Page 120: 70 270 q & a

Explanation:

A library is a device that contains removable media. If a tape drive is not listed as a library, in the Removable Storage MMC snap-in, the drivers are probably not installed correctly. If you installed the manufacturer’s drivers, it is possible that the drivers are not signed and were not installed correctly. To fix this, open the System applet in the Control Panel and change the driver signing options to not block unsigned drivers. Then reinstall the manufacturer’s drivers.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #357]

Explanation:

A tape drive connected to a parallel port will likely require bi-directional communication through the parallel port. Therefore, a bi-directional parallel port communication standard such as Enhanced Parallel Port (EPP) will be required. If EPP is supported, it can be enabled in the BIOS. On modern computers, the BIOS is usually already configured to use a bi-directional parallel communication standard. However, it is possible that someone has changed the BIOS setting.

You acquire a tape drive that is listed on the Windows XP hardware compatibility list and connect it to a parallel port on Sally’s computer. You then run the manufacturer’s setup program to install drivers for the tape drive. You also grant Sally all necessary rights to manage backup tapes and perform backups. Later, Sally informs you that she cannot see the tape drive listed as a media library and cannot perform backups.

You want to ensure that the tape drive is listed as a media library on Sally’s computer and that Sally can perform backups. What should you do?

nmlkj Disable Enhanced Parallel Port (EPP) functionality in the BIOS of Sally’s computer.

nmlkj Create a media pool and configure it to use the media format supported by the tape drive.

nmlkji Change the driver signing options on Sally’s computer and reinstall the drivers for the tape drive.

nmlkj Add Sally as a member of the Administrators local group on her computer.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

You acquire a tape drive that is listed on the Windows XP hardware compatibility list and connect it to a parallel port on Sally’s computer. You then run the manufacturer’s setup program to install drivers for the tape drive. You also grant Sally all necessary rights to manage backup tapes and perform backups. Later, Sally informs you that the Removable Storage MMC snap-in is not reporting the correct state of the media in the tape drive.

You want to ensure that the tape drive can communicate its current state to Windows. What should you do?

nmlkj Change the driver signing options on Sally’s computer to block unsigned drivers.

nmlkji Enable Enhanced Parallel Port (EPP) functionality in the BIOS of Sally’s computer.

nmlkj Add Sally as a member of the Administrators local group on her computer.

nmlkj Create a media pool and configure it to use the media format supported by the tape drive.

Hacked by Piratez 70-270

Page 121: 70 270 q & a

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #365]

Explanation:

A media pool is a set of removable media (such as removable tapes) that are in a certain state. For example, tapes that are free to be used by a backup program are located in a built-in media pool called Free. Tapes that are in use by a particular backup program will be located in that program’s media pool. Windows Backup automatically creates a media pool called Backup, which is configured to get tapes from the Free media pool. It’s possible that other programs might require you to manually create media pools for their use and perhaps configure them to draw from the Free media pool.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #373]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

You acquire a tape drive that is listed on the Windows XP hardware compatibility list and connect it to a parallel port on Sally’s computer. You then run the manufacturer’s setup program to install drivers for the tape drive. You also grant Sally all necessary rights to manage backup tapes and perform backups. Later, Sally informs you that she cannot see a media pool for the Windows Backup program when she browses the Removable Storage MMC snap-in. What should you do?

nmlkj Add Sally as a member of the Administrators local group on her computer.

nmlkj Instruct Sally to create a new media pool called Windows Backup.

nmlkj Change the driver signing options on Sally’s computer to block unsigned drivers.

nmlkj Disable Enhanced Parallel Port (EPP) functionality in the BIOS of Sally’s computer.

nmlkji Inform Sally that Windows Backup will automatically create the appropriate media pool.

nmlkjInstruct Sally to manually create a media pool and configure it to use the media format supported by the tape drive.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, needs to back up her computer each week to protect important data on it. Sally is currently a member of her computer’s Users local group.

You acquire a tape drive that is listed on the Windows XP hardware compatibility list and connect it to a parallel port on Sally’s computer. You then run the manufacturer’s setup program to install drivers for the tape drive. You also grant Sally all necessary rights to manage backup tapes and perform backups. Later, Sally informs you that she cannot see the Media Pools node or any media pools when she browses the Removable Storage MMC snap-

Hacked by Piratez 70-270

Page 122: 70 270 q & a

Explanation:

The Removable Storage MMC snap-in has a Simple view as well as a Full view. The Simple view does not show the Media Pools, Work Queue, or Operator Requests nodes.

Objective(s):

301. Implement, manage, and troubleshoot disk devices.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[301 #383]

Explanation:

Although Windows XP automatically detects the new video adapter and installs the appropriate drivers, you must also extend the Windows desktop to the monitor. To do this, right-click the Desktop and select Properties. Then click the Settings tab. Click the second monitor and select Extend my Windows desktop onto this monitor. Then click OK.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

in from Computer Management. What should you do?

nmlkj Change the driver signing options on Sally’s computer to block unsigned drivers.

nmlkj Add Sally as a member of the Administrators local group on her computer.

nmlkji Instruct Sally to use Full view rather than Simple view.

nmlkjInstruct Sally to manually create a media pool and configure it to use the media format supported by the tape drive.

nmlkj Disable Enhanced Parallel Port (EPP) functionality in the BIOS of Sally’s computer.

nmlkj Instruct Sally to manually create a new media pool for every application she will back up.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors.

You acquire a second video adapter that is compatible with the dual-monitor feature and install it into Greg’s computer. You also connect a second monitor to the new video adapter.

You want to let Greg view his desktop across both monitors. What should you do?

nmlkj Run the Add Hardware wizard and configure the new adapter as a secondary adapter.

nmlkj Open the new monitor's Properties dialog box in Device Manager, and configure it to receive video input.

nmlkji Extend the Windows desktop onto the new monitor using the Settings tab of the Display control panel.

nmlkjReboot the computer. Windows XP will automatically detect the new video adapter, install the appropriate drivers, and make all other necessary configurations.

Hacked by Piratez 70-270

Page 123: 70 270 q & a

TestOut for Windows XP Administration, Section 2.3

[302 #260]

Explanation:

The positions of the icons on the Settings tab of the Display Properties dialog box determine how you move items from one monitor to another. If the icons are placed side by side, you move items from one monitor to another by dragging left and right; if the icons are placed one above the other, you move items by dragging up and down. You can rearrange the icons by dragging them to the desired positions.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #268]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors.

You acquire a second video adapter that is compatible with the dual-monitor feature and install it into Greg’s computer. You also connect a second monitor to the new video adapter and perform all other configurations required to display Greg’s desktop on both monitors. Although Greg’s desktop is viewable on both monitors, Greg is not satisfied with how items are moved from one monitor to another.

You want to adjust the visual relationship between Greg’s two monitors. What should you do?

nmlkj Open each monitor's Properties dialog box and change its relative position.

nmlkji Rearrange the monitor icons on the Settings tab of the Display Properties dialog box.

nmlkj Use Device Manager to reorder the monitors.

nmlkj Move each video card to a different slot.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. One user’s monitor has a noticeable flicker.

You open Display properties to examine the settings. Which action or actions may help resolve the problem? (Choose all that apply.)

gfedc Increase the resolution.

gfedc Increase the color quality.

gfedcb Reduce the resolution.

gfedc Reduce the refresh rate.

gfedcb Increase the refresh rate.

gfedcb Reduce the color quality.

Hacked by Piratez 70-270

Page 124: 70 270 q & a

Explanation:

If the screen refresh rate is set too low, a noticeable flicker can result on the monitor screen. Ultimately, you need to increase the refresh rate to get rid of the flicker. However, higher color quality or screen resolution can limit the possible refresh rates. Therefore, you might need to decrease color quality or screen resolution before you can increase the refresh rate.

If changing the settings doesn't fix the problem, make sure the display adapter is listed on the Windows XP hardware compatibility list (HCL). If it isn't listed, Microsoft doesn't provide support or drivers for that adapter. You may be able to find information at the manufacturer's Web site. If the adapter is supported, the HCL may include notes or an updated driver.

Make sure you're using the most recent driver. Download a new driver if there's a more recent version, and don't forget to read any README files.

Install the latest driver, or, if your driver is up to date, re-install the driver. Start in Safe Mode and use Device Manager to remove the driver. Then use Add Hardware to install the latest driver.

If none of these steps solves the problem, you may have a problem with the adapter itself. Contact the manufacturer for further help.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #285]

Explanation:

Windows XP supports a feature called mode pruning. Mode pruning removes display modes that the monitor can't support. In this way, only those modes that are supported by both the monitor and the display adapter are available for the user to select. Mode pruning isn't available if the monitor driver is the Default Monitor. The monitor needs to be Plug-and-Play, or a specific monitor driver needs to be installed. Mode pruning is enabled by default on Plug-and-Play monitors. To enable mode pruning:

1. Open the Display applet in the Control Panel. 2. On the Settings tab, click Advanced. 3. On the Monitor tab, select Hide modes that this monitor cannot display.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. One user’s monitor has a display problem. Upon investigating the problem, you determine that the user changed the refresh rate to an unsupported setting.

You boot the computer in Safe mode and correct the settings. You also want to configure the display settings to help the user prevent similar problems in the future. What should you do?

nmlkjiOn the Monitor tab of the advanced Display properties, select Hide modes that this monitor cannot display.

nmlkjOn the Adapter tab of the advanced Display properties, select Hide modes that this monitor cannot display.

nmlkj On the Monitor tab of the advanced Display properties, select List all modes.

nmlkj On the Adapter tab of the advanced Display properties, select List all modes.

Hacked by Piratez 70-270

Page 125: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #295]

Explanation:

The logon screen appears by default on the primary monitor. In this case, the primary monitor is set incorrectly. To change the primary monitor:

1. Open the Display applet in the Control Panel. 2. Click the Settings tab. 3. Click the icon for the monitor that you want to be primary, then select Use this device as the primary monitor.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #303]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors.

You install two PCI video adapters and a 17-inch Plug-and-Play monitor to one video adapter and a 15-inch Plug-and-Play monitor to the other video adapter. Both adapters and both monitors are listed on the HCL. After installing and configuring the appropriate drivers, you restart the computer. Both monitors show the display. However, the logon screen and task bar appear on the 15-inch monitor, not the 17-inch monitor that Greg plans to use as his main screen.

You want to make sure the logon screen and task bar appear on the 17-inch monitor. What should you do?

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 17-inch monitor.

nmlkji Configure the 17-inch monitor as the primary monitor.

nmlkj Ensure that the most current driver is installed for each adapter and monitor.

nmlkj Turn off VGA mode in the BIOS for the secondary adapter.

nmlkj Configure the 15-inch monitor as the primary monitor.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors. Currently, Greg’s computer has a PCI video adapter and a 17-inch Plug-and-Play monitor.

You install an ISA video adapter and connect a 15-inch Plug-and-Play monitor to it. You then boot the computer. You want to let Greg view his desktop across two monitors. What should you do?

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 17-inch monitor.

nmlkj Change the 15-inch monitor to a 17-inch monitor.

Hacked by Piratez 70-270

Page 126: 70 270 q & a

Explanation:

You must use Peripheral Component Interconnect (PCI) or Accelerated Graphics Port (AGP) video adapters when configuring multiple monitors.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #312]

Explanation:

If you use a built-in video adapter, the built-in adapter will normally be disabled when another video adapter is installed in an expansion slot. To enable multiple monitor support in this situation, you will need to make sure only one adapter is configured to post VGA and function as the primary adapter. The other adapter should not post VGA, and will function as a secondary adapter. In this scenario, you should disable VGA on the new adapter for the secondary monitor and make sure VGA is enabled for the built-in adapter.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

g

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 15-inch monitor.

nmlkj Ensure that Use this device as the primary monitor is selected for the 17-inch monitor.

nmlkj Ensure that Use this device as the primary monitor is selected for the 15-inch monitor.

nmlkji Change the ISA video adapter to a PCI video adapter.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors. Currently, Greg’s computer has a built-in video adapter and a 17-inch Plug-and-Play monitor.

You install another video adapter in an available expansion slot and connect a 15-inch Plug-and-Play monitor to it. After rebooting the computer, the entire desktop appears on the 15-inch monitor. You open the Display properties and discover that the option to extend the desktop to another monitor is unavailable.

You want to make sure that the desktop appears on both the 17-inch monitor and the 15-inch monitor. The 17-inch monitor should be the primary display. What should you do?

nmlkjConnect the 15-inch monitor to the built-in video adapter. Connect the 17-inch monitor to the other video adapter.

nmlkj Make sure VGA is disabled for the built-in video adapter. Reboot and extend the desktop.

nmlkj Edit the Display properties and change the relative position of each monitor.

nmlkji Make sure VGA is disabled for the new video adapter. Reboot and extend the desktop.

nmlkj Configure the BIOS to use the new video adapter as the primary adapter.

Hacked by Piratez 70-270

Page 127: 70 270 q & a

[302 #322]

Explanation:

A built-in video adapter might not support the hardware requirements needed for a secondary adapter. In this case, you will need to install another video adapter in an available expansion slot to have a secondary monitor.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #331]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors. Currently, Greg’s computer has a built-in video adapter and a 17-inch Plug-and-Play monitor.

You install another video adapter in an available expansion slot and connect a 15-inch Plug-and-Play monitor to it. When you reboot, nothing appears on the 17-inch monitor and the desktop only appears on the 15-inch monitor. You attempt to extend the desktop to the 17-inch monitor, but you are unable to do so.

You want to extend the desktop across both the 17-inch monitor and the 15-inch monitor. What should you do?

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 15-inch monitor.

nmlkj Ensure that Use this device as the primary monitor is selected for the 17-inch monitor.

nmlkjConnect the 15-inch monitor to the built-in video adapter. Connect the 17-inch monitor to the other video adapter.

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 17-inch monitor.

nmlkji Install another video adapter in an available expansion slot and connect the 17-inch monitor to it.

nmlkj Ensure that Use this device as the primary monitor is selected for the 15-inch monitor.

nmlkj Edit the Display properties and change the relative position of each monitor.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors. Currently, Greg’s computer has a built-in video adapter and a 15-inch Plug-and-Play monitor.

You install another video adapter in an available expansion slot and connect a 17-inch Plug-and-Play monitor to it. You then boot the computer and configure the desktop to be displayed across both monitors. You open Internet Explorer and move it to the 15-inch monitor. You can view the default home page fine. You go to a web page that provides streaming video, but the video does not appear.

You want to view the streaming video. What should you do?

nmlkj Increase the color depth of the 15-inch monitor.

nmlkji Move the Internet Explorer window to the 17-inch monitor.

nmlkj Install another video adapter in an available expansion slot and connect the 15-inch monitor to it.

nmlkj Install video codecs that support the streaming video’s format.

Hacked by Piratez 70-270

Page 128: 70 270 q & a

Explanation:

Some programs might not display correctly on a secondary video adapter. In this case, the plug-in or control that is providing the streaming video is not working on the secondary video adapter, so you should play the video on the primary monitor (in this case, the 17-inch monitor).

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #342]

Explanation:

Some video adapters might not support the hardware requirements needed for a secondary adapter (a built-in video adapter is always a secondary display). Updating the video adapter’s driver might help. If this does not work, you will need to install another video adapter in an available expansion slot to have a secondary monitor.

Objective(s):

302. Implement, manage, and troubleshoot display devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[302 #350]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a graphic artist, wants to use Windows XP’s multiple monitor feature to display his desktop across two monitors. Currently, Greg’s computer has a built-in video adapter and a 17-inch Plug-and-Play monitor.

You install another video adapter in an available expansion slot and connect a 15-inch Plug-and-Play monitor to it. When you reboot, nothing appears on the 17-inch monitor, and the desktop only appears on the 15-inch monitor. You attempt to extend the desktop to the 17-inch monitor, but you are unable to do so.

You want to extend the desktop across both the 17-inch monitor and the 15-inch monitor. What should you do?

nmlkj Ensure that Extend my Windows desktop into this monitor is selected for the 17-inch monitor.

nmlkj Ensure that Use this device as the primary monitor is selected for the 17-inch monitor.

nmlkji Update the driver for the built-in video adapter.

nmlkj Edit the Display properties and change the relative position of each monitor.

nmlkjConnect the 15-inch monitor to the built-in video adapter. Connect the 17-inch monitor to the other video adapter.

nmlkj Ensure that Use this device as the primary monitor is selected for the 15-inch monitor.

nmlkj Update the driver for the 17-inch monitor.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Pentium III computer with 512 MB RAM. Michelle wants open programs to be restored to the exact state as she left them when she turns her computer on.

Hacked by Piratez 70-270

Page 129: 70 270 q & a

Explanation:

Hibernation turns off the monitor, saves data in memory to the hard disk, turns off the disk, and turns off the computer. It takes longer for your computer to come out of hibernation than out of standby, but Windows XP still restores your desktop exactly as you left it. You can configure a power scheme to put the computer into hibernation after it has been idle for a specified amount of time. The computer’s hardware must support hibernation. Hibernation also requires as much free space on the system drive as there is RAM in the computer. In this scenario, free disk space is running low (less than 512 MB).

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #260]

Explanation:

You enable hibernation on the computer and verify that the computer hibernates properly. Several weeks later, Michelle informs you that her computer will no longer hibernate.

You need to make sure Michelle can hibernate her computer. What should you do?

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

nmlkji Free up disk space.

nmlkj Enable APM in the system BIOS.

nmlkj Instruct Michelle to install more memory.

nmlkj Replace the CMOS battery.

nmlkj Instruct Michelle to upgrade her computer.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, occasionally brings her personal laptop computer to the office. The laptop is a Pentium II computer with 256 MB RAM. The laptop is not a member of the company’s Active Directory domain.

Michelle wants open programs on her laptop to be restored to the exact state as she left them when she turns her computer on. You enable hibernation on Michelle’s laptop. However, when you try to test hibernation, you do not see a Hibernate option.

You need to make sure Michelle can hibernate her laptop computer. What should you do?

nmlkj Enable APM in the system BIOS.

nmlkj Free up disk space.

nmlkj Replace the CMOS battery.

nmlkj Instruct Michelle to install more memory.

nmlkji Instruct Michelle to press the Shift key when she turns the computer off.

nmlkj Recharge the laptop battery.

Hacked by Piratez 70-270

Page 130: 70 270 q & a

Computers that are not members of a domain might not show a Hibernate option. If the computer supports Standby mode and the Welcome screen is enabled, the Standby option will be shown rather than the Hibernate option. To toggle the Standby option to the Hibernate option, press the Shift key.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #270]

Explanation:

Some computers do not support hibernation, and the option to enable hibernation is unavailable.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #280]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium computer with 128 MB RAM. The laptop is a member of the company’s Active Directory domain.

Michelle wants open programs on her laptop to be restored to the exact state as she left them when she turns her computer on. You try to enable hibernation on Michelle’s laptop, but you do not see a Hibernate option. What should you do?

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

nmlkj Recharge the laptop battery.

nmlkj Free up disk space.

nmlkji Instruct Michelle to upgrade her computer.

nmlkj Replace the CMOS battery.

nmlkj Install more memory.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium II computer with 256 MB RAM. The laptop is a member of the company’s Active Directory domain.

Michelle wants open programs on her laptop to be restored to the exact state as she left them when she turns her computer on. You open the Power Options control panel, but you do not see a hibernation option for the computer’s power scheme.

You need to make sure Michelle can hibernate her laptop computer. What should you do?

Hacked by Piratez 70-270

Page 131: 70 270 q & a

Explanation:

To enable hibernation for a computer, open the Power Options control panel, click the Hibernate tab, and select the Enable hibernation option. After applying the change, you will be able to configure the computer to hibernate after a certain length of time or perhaps when you press a certain button on the computer.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #290]

Explanation:

If the computer’s hardware supports it, you can configure the computer to shut down, enter standby mode, or to hibernate when certain buttons are pressed (such as a power button or sleep button) or when a laptop’s lid closes. In this scenario, you want to configure the computer to enter standby mode. Standby mode restores the computer more quickly than when the computer returns from hibernation.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

nmlkji Enable hibernation on the Hibernate tab.

nmlkj Click the Advanced tab and configure the computer to hibernate when Michelle presses the sleep button.

nmlkj Open Device Manager and configure power management for the appropriate devices.

nmlkj Change the computer’s power scheme.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium II computer with 256 MB RAM. The laptop is a member of the company’s Active Directory domain.

Michelle often visits with potential customers and gives demonstrations with her laptop. While visiting with potential customers, Michelle wants to be able to put her laptop in a low power state more easily than selecting a shut down option from the Start menu. She also wants open programs on her laptop to be restored to the exact state as she left them when she brings her computer out of a low power state.

You need to configure the power options of Michelle’s laptop to support her requirements. What should you do?

nmlkj Open Device Manager and configure power management for the appropriate devices.

nmlkji Open Power Options and configure the computer to stand by when Michelle closes the laptop’s lid.

nmlkj Open Power Options and configure the computer to hibernate when Michelle presses the sleep button.

nmlkj Open Power Options and change the computer’s power scheme.

nmlkj Open Power Options and enable hibernation on the Hibernate tab.

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

Hacked by Piratez 70-270

Page 132: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #299]

Explanation:

To enable hibernation and standby options on a computer that supports Advanced Power Management (APM) but not Advanced Configuration Power Interface (ACPI), enable Advanced Power Management (APM) on the APM tab. The APM tab does not appear if the computer supports ACPI. It also does not appear if the computer does not support APM.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #309]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium II computer with 256 MB RAM. The laptop is a member of the company’s Active Directory domain.

Michelle wants open programs on her laptop to be restored to the exact state as she left them when she turns her computer on. You open the Power Options control panel and verify that hibernation is enabled. However, you do not see a hibernation option for the computer’s power scheme.

You need to make sure Michelle can hibernate her laptop computer. What should you do?

nmlkji Enable Advanced Power Management support on the APM tab.

nmlkj Click the Advanced tab and configure the computer to hibernate when Michelle presses the sleep button.

nmlkj Open Device Manager and configure power management for the appropriate devices.

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

nmlkj Change the computer’s power scheme.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium II computer with 256 MB RAM. The laptop is a member of the company’s Active Directory domain.

Michelle wants open programs on her laptop to be restored to the exact state as she left them when she turns her computer on. You open the Power Options control panel and attempt to enable Advanced Power Management. However, you do not see an APM tab.

You need to make sure Michelle can hibernate her laptop computer. What should you do?

nmlkj Click the Advanced tab and configure the computer to hibernate when Michelle presses the sleep button.

nmlkj Instruct Michelle to press the Shift key when she turns the computer off.

nmlkj Change the computer’s power scheme.

Hacked by Piratez 70-270

Page 133: 70 270 q & a

Explanation:

If an APM tab does not appear, either the computer does not support Advanced Power Management (APM), or the computer supports Advanced Configuration Power Interface (ACPI) instead. On an ACPI-compatible computer, simply go to the Hibernate tab and enable hibernation to add hibernation settings to the computer’s power scheme. On a computer that supports APM but not ACPI, you must enable Advanced Power Management on the APM tab as well as enabling hibernation on the Hibernate tab.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #318]

Explanation:

If an APM tab appears in the Power Options applet, the computer supports Advanced Power Management (APM) rather than Advanced Configuration Power Interface (ACPI). After you upgraded the BIOS to an ACPI-compliant BIOS, the computer’s hardware abstraction layer (HAL) and various registry entries no longer matched the BIOS. You need to reinstall Windows XP to install an ACPI hardware abstraction layer and perform other configurations so Windows XP supports ACPI. Simply copying an ACPI HAL will not perform all the necessary configurations. Using the Last Known Good configuration only affects the set of drivers loaded, but does not affect the HAL being used. You cannot start in Safe mode until the HAL mismatch is fixed. Repairing the Windows XP installation copies startup files and the appropriate boot sector, but does not fix the HAL mismatch problem.

Objective(s):

nmlkj Open Device Manager and configure power management for the appropriate devices.

nmlkji Enable hibernation on the Hibernate tab.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. Michelle often visits with potential customers and gives demonstrations with her laptop. While visiting with potential customers, Michelle wants to be able to put her laptop in a low power state more easily than selecting a shut down option from the Start menu. She also wants open programs on her laptop to be restored to the exact state as she left them when she brings her computer out of a low power state.

You open the Power Options control panel. You see an APM tab and a Hibernate tab. Before configuring any power options, you check the laptop manufacturer’s web site and discover a BIOS upgrade. You upgrade the laptop’s BIOS to support Advanced Configuration Power Interface (ACPI). However, when you reboot the computer, you receive a STOP error and cannot boot to Windows XP.

You want to boot the computer and configure power options for Michelle’s laptop computer. What should you do?

nmlkj Start the computer using the Last Known Good configuration.

nmlkj Enable ACPI support in the computer’s BIOS.

nmlkj Start the computer from the Windows XP CD-ROM. Select the option to repair the Windows XP installation.

nmlkji Start the computer from the Windows XP CD-ROM. Re-install Windows XP.

nmlkj Start the computer in Safe mode and enable the appropriate power options.

nmlkjStart the computer from the Windows XP CD-ROM. Start the Recovery Console and copy the ACPI HAL to the computer.

Hacked by Piratez 70-270

Page 134: 70 270 q & a

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #327]

Explanation:

If an APM tab does not appear in the Power Options applet, the computer either does not support Advanced Power Management (APM) or it supports Advanced Configuration Power Interface (ACPI) instead. In this scenario, the computer supports ACPI. The BIOS upgrade apparently left the ACPI setting in the BIOS in a disabled state. The computer’s hardware abstraction layer (HAL) and various registry entries then no longer matched the BIOS. You need to re-enable ACPI support in the BIOS to fix the mismatch. Re-installing Windows XP would install a non-ACPI hardware abstraction layer. Simply copying an ACPI HAL will not perform all the necessary configurations. Using the Last Known Good configuration only affects the set of drivers loaded, but does not affect the HAL being used. You cannot start in Safe mode until the HAL mismatch is fixed. Repairing the Windows XP installation copies startup files and the appropriate boot sector, but does not fix the HAL mismatch problem.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #337]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. Michelle often visits with potential customers and gives demonstrations with her laptop. While visiting with potential customers, Michelle wants to be able to put her laptop in a low power state more easily than selecting a shut down option from the Start menu. She also wants open programs on her laptop to be restored to the exact state as she left them when she brings her computer out of a low power state.

You open the Power Options control panel. You do not see an APM tab, but you do see a Hibernate tab. Before configuring any power options, you check the laptop manufacturer’s web site and discover a BIOS upgrade. You upgrade the laptop’s BIOS. However, when you reboot the computer, you receive a STOP error and cannot boot to Windows XP.

You want to boot the computer and configure power options for Michelle’s laptop computer. What should you do?

nmlkj Start the computer in Safe mode and enable the appropriate power options.

nmlkjStart the computer from the Windows XP CD-ROM. Start the Recovery Console and copy the ACPI HAL to the computer.

nmlkji Enable ACPI support in the computer’s BIOS.

nmlkj Start the computer from the Windows XP CD-ROM. Select the option to repair the Windows XP installation.

nmlkj Start the computer from the Windows XP CD-ROM. Reinstall Windows XP.

nmlkj Start the computer using the Last Known Good configuration.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a laptop computer. The laptop is a Pentium II computer with 256 MB RAM The laptop is a member of the company’s Active Directory domain

Hacked by Piratez 70-270

Page 135: 70 270 q & a

Explanation:

You can configure power management options for some devices using Device Manager. Right-click the device and open its properties. If the device has a Power Management tab, common options include Allow the computer to turn off this device to save power and Allow this device to bring the computer out of standby. To prevent the mouse from bringing the computer out of standby, you should disable that option for the mouse. To let the keyboard bring the computer out of standby, you should enable that option for the keyboard. This option will likely be enabled by default for both the keyboard and mouse.

Objective(s):

303. Configure Advanced Configuration Power Interface (ACPI).

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[303 #347]

II computer with 256 MB RAM. The laptop is a member of the company s Active Directory domain.

Michelle often visits with potential customers and gives demonstrations with her laptop. While visiting with potential customers, Michelle connects an external mouse to her computer. Michelle also puts her computer in a low power Standby state occasionally. Because the external mouse gets bumped occasionally, Michelle does not want movements of the mouse to bring her computer out of Standby mode. Instead, she wants the computer to leave Standby mode when she presses the keyboard.

You need to configure the power options of Michelle’s laptop to support her requirements. What should you do?

nmlkj Instruct Michelle to press the Shift key to leave Standby mode.

nmlkj Open Power Options and enable hibernation on the Hibernate tab.

nmlkjOpen Power Options and configure the computer to leave Standby mode when Michelle presses the sleep button.

nmlkj Open Power Options and configure the computer to leave Standby mode when Michelle uses the keyboard.

nmlkji Open Device Manager and configure power management for the appropriate devices.

nmlkj Open Power Options and change the computer’s power scheme.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You need to install a new Plug-and-Play print device on a user's computer. The printer uses a parallel port interface.

You connect the print device to the computer's parallel port, turn the print device on, and reboot the computer. After rebooting, you discover that Windows XP has not detected the new print device. You open Device Manager and manually trigger Windows to scan for hardware changes, but the new print device is still not detected.

You want to configure Windows to use the new Plug-and-Play print device. What should you do?

nmlkj Run the Add Hardware wizard and scan for legacy hardware.

nmlkj Run the Add Hardware wizard and scan for Plug-and-Play hardware.

nmlkj Back up the printer's driver configuration and reboot the computer.

nmlkji Enable Enhanced Parallel Port (EPP) support in the system BIOS.

nmlkj Use the File Signature Verification utility to ensure that the device's drivers are signed.

Hacked by Piratez 70-270

Page 136: 70 270 q & a

Explanation:

When a Plug-and-Play-compliant device is attached to a parallel port, the system's BIOS must be configured to use Enhanced Parallel Port (EPP) mode, or the Plug-and-Play manager will not be able to detect and configure it. EPP mode allows bidirectional communication between a device and the computer.

You have already scanned for Plug-and-Play hardware twice (once during the boot process and once when you manually triggered the scanning process from Device Manager), so you do not need to do it again. The print device is not a legacy device. The print device’s drivers have not yet been installed, and verifying their signature will not install them. Also, because Plug-and-Play uses the drivers that ship with Windows, the drivers will be signed.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #260]

Explanation:

Parallel ports do not support hot swapping. You can scan for a Plug-and-Play printer from the Add Printer wizard. The beginning of the Add Hardware wizard also scans for Plug-and-Play hardware. You can also manually trigger scanning for Plug-and-Play hardware from Device Manager or reboot the computer to trigger the scanning process.

When a Plug-and-Play-compliant device is attached to a parallel port, the system's BIOS must be configured to use Enhanced Parallel Port (EPP) mode, or the Plug-and-Play manager will not be able to detect and configure it. EPP mode allows bidirectional communication between a device and the computer. Standard parallel port mode will not work.

The print device is not a legacy device. The print device’s drivers have not yet been installed, and verifying their signature will not install them. Also, by default, Plug-and-Play uses drivers that ship with Windows, all of which are signed.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You need to install a new Plug-and-Play print device on a user's computer. The printer uses a parallel port interface.

You connect the print device to the computer's parallel port and turn the print device on. However, the computer does not detect the new device.

You want to configure Windows to use the new Plug-and-Play print device. What should you do?

nmlkj Enable standard parallel port support in the system BIOS.

nmlkj Back up the printer's driver configuration and reboot the computer.

nmlkj Run the Add Hardware wizard and scan for legacy hardware.

nmlkji Run the Add Printer wizard and scan for the Plug-and-Play print device.

nmlkj Use the File Signature Verification utility to ensure that the device's drivers are signed.

Hacked by Piratez 70-270

Page 137: 70 270 q & a

[304 #269]

Explanation:

If the manufacturer has supplied a driver, you can run the manufacturer’s setup program to install it. Once you scan for Plug-and-Play hardware, the driver that ships with Windows will be installed. Although you can then update the driver, that is an extra step. When a Plug-and-Play-compliant device is attached to a parallel port, the system's BIOS must be configured to use Enhanced Parallel Port (EPP) mode, or the Plug-and-Play manager will not be able to detect and configure it. EPP mode allows bidirectional communication between a device and the computer. However, in this case you will not be using Plug-and-Play, so EPP is not essential for installing the driver (although you will likely want to use EPP or the newer Enhanced Capabilities Port [ECP] so the printer can communicate printing status to Windows). The File Signature Verification (sigverif) utility is used to verify driver signatures, not sign them.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[304 #278]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You need to install a new Plug-and-Play print device on a user's computer. The printer uses a parallel port interface.

You connect the print device to the computer's parallel port and turn the print device on. You want to use the drivers provided by the manufacturer rather than those that ship with Windows. What should you do?

nmlkj Update the print device’s drivers using Device Manager.

nmlkj Run the Add Printer wizard and scan for the Plug-and-Play print device.

nmlkji Run the setup program provided by the print device’s manufacturer.

nmlkj Enable Enhanced Parallel Port (EPP) support in the system BIOS.

nmlkj Use the File Signature Verification utility to sign the manufacturer’s drivers.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You need to install a new Plug-and-Play print device on a user's computer. The printer uses a parallel port interface.

You connect the print device to the computer's parallel port and turn the print device on. You then scan for Plug-and-Play hardware and install the printer. Later, you download an updated driver from the print device’s manufacturer.

You want to update the driver for the print device. What should you do?

nmlkj Run the Add Printer wizard and scan for the Plug-and-Play print device.

nmlkj In Device Manager, open the properties of the printer and select Update Driver on the Drivers tab.

nmlkjiIn the Printers and Faxes folder, open the properties of the printer and run the Add Printer Driver wizard from the Advanced tab.

nmlkjIn the Printers and Faxes folder, open the properties of the printer and select Update Driver on the Drivers tab.

Hacked by Piratez 70-270

Page 138: 70 270 q & a

Explanation:

Unlike other types of drivers, printers are not listed in Device Manager. You can update a printer’s driver by running the Add Printer Driver wizard and selecting Have Disk. You can access this wizard by opening the Printers and Faxes folder, opening the properties of a printer, and selecting New Driver from the Advanced tab. You can also select Server Properties from the File menu and select the Drivers tab to view a list of all installed printer drivers on the computer. From there you can click Add to start the same wizard. You can also add printer drivers using the Add Hardware wizard or the Add Printer wizard, which also support the Have Disk option.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[304 #287]

Explanation:

By default, the Fax service is configured to start automatically. Apparently, the Fax service got changed to start manually. The Send a fax task in the Printers and Faxes folder starts the Fax service if it is stopped. However, when the computer reboots, the Fax service will not be started unless it is configured to start automatically. If the Fax service is not started, the Send a fax and Receive a fax now options are disabled in the Fax Console.

If a fax device for the local fax printer is not configured to support sending or receiving faxes, the Send a fax option will still be enabled. A fax job can be created, but the fax will not be sent from the local fax printer.

It is important to distinguish between using a computer’s local fax printer and using a remote fax printer. A single local fax printer is automatically created when the fax service is installed. The local fax printer can use an internal fax device (an internal fax modem card that connects to an expansion slot or that is integrated into the motherboard) or an external fax device (a fax modem connected to a serial port or USB port, for example). You configure the local fax printer and the local fax devices it uses by using the Fax Configuration wizard or by editing the properties of the local fax printer.

A remote fax printer is a fax device located elsewhere on the network. Use the Add Printer wizard to connect to a remote fax

You are the network administrator for your company. Your company uses Windows XP Professional as a desktop operating system. The company CEO frequently sends faxes to partners and potential clients using the computer’s local fax printer, which uses an external fax modem. The CEO also receives faxes from the local fax printer. Last week, you sent an assistant administrator to troubleshoot a problem on the CEO’s computer.

Later, the CEO informs you that the Send a fax option is disabled in the Fax Console. You go to the CEO’s computer, open the Printers and Faxes folder, and click Send a fax to open the Send Fax wizard. You successfully send a fax. You open the Fax Console and verify that the Send a fax option is enabled. The next day, the CEO informs you that the Send a fax option is again disabled in the Fax Console.

You want to make sure that the Send a fax option is always enabled in the Fax Console. What should you do?

nmlkj Manually create a local fax printer.

nmlkji Configure the Fax service to start automatically.

nmlkj Run the Fax Configuration wizard and change the Enable Send property for the fax device.

nmlkj Add the Fax Services Windows component using Add or Remove Programs.

nmlkj Edit the properties of the local fax printer and change Fax Security permissions.

nmlkj Edit the properties of the local fax printer and change the Enable device to send property for the fax device.

nmlkj Run the Send Fax wizard.

Hacked by Piratez 70-270

Page 139: 70 270 q & a

printer just as you would connect to any network printer. If you administer a remote fax printer, you configure it according to the instructions provided by the remote fax printer’s manufacturer.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #295]

Explanation:

A default installation of Windows XP does not install the Fax Services component. To install the Fax Services component, add it using the Add/Remove Windows Components option in Add or Remove Programs. You can also install the Fax Service component by selecting the Set up faxing task from the Printers and Faxes folder. By default, the Fax service is configured to start automatically.

When you install the Fax Services component, a local fax printer is automatically created. By default, the local fax printer is configured to use the local fax device to send faxes, but not to receive them. Although you can run the Fax Configuration wizard to perform additional configuration tasks, such as configuring the local fax device to receive faxes or to configure the sender information that will appear on fax cover sheets, this task is not a necessity before sending a test fax (definitely, you would not want to turn off sending capabilities as in this question’s distracters).

You can also edit the properties of the local fax printer to change its properties. However, there is no need to change Fax Security permissions. By default, administrators have all permissions, including managing the fax configuration, managing fax documents, and faxing. By default, all interactive users can fax.

The only thing left to do is send a fax, which you do through the Send Fax wizard.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

You are the desktop administrator for your company. The company CEO travels to client sites quite often and needs to dial into the main office to check e-mail and to fax contracts back to the main office. The CEO’s laptop is currently running Windows 98. The CEO asks you to install Windows XP Professional on the laptop and ensure that the modem and fax are working correctly before the next business trip.

You perform a new default installation of Windows XP, log on as the local administrator, and verify that the modem is working correctly by dialing into the main office from your house. However, when you try to test faxing, you cannot locate the Fax Console on the Communications menu.

You want to send a test fax. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Configure the Fax service to start automatically.

gfedc Edit the properties of the local fax printer and change the Enable device to send property for the fax device.

gfedc Manually create a local fax printer.

gfedcb Add the Fax Services Windows component using Add or Remove Programs.

gfedc Run the Fax Configuration wizard and change the Enable Send property for the fax device.

gfedcb Run the Send Fax wizard.

gfedc Edit the properties of the local fax printer and change Fax Security permissions.

Hacked by Piratez 70-270

Page 140: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #306]

Explanation:

By default, the Fax service is configured to start automatically after faxing is set up by executing the Set up faxing task. By default, the fax device used by the local fax printer is configured to send faxes, but not to receive them. You can run the Fax Configuration wizard to configure the local fax device to receive faxes. You can also edit the properties of the local fax printer to change its properties, including enabling the local fax device to receive faxes. To automatically answer fax calls, select the Automatically answer after option and configure the number of rings before answering. Otherwise, you will need to manually receive the fax by selecting the Receive a fax now action in the Fax Console, or by selecting the Answer now action in Fax Monitor when a fax call is received.

There is no need to change Fax Security permissions in this scenario. By default, administrators have all permissions, including managing the fax configuration, managing fax documents, and faxing. By default, all interactive users can fax and receive faxes.

It is important to distinguish between using a computer’s local fax printer and using a remote fax printer. A single local fax printer is automatically created when the fax service is installed. The local fax printer can use an internal fax device (an internal fax modem card that connects to an expansion slot or that is integrated into the motherboard) or an external fax device (a fax modem connected to a serial port or USB port, for example). You configure the local fax printer and the local fax devices it uses by using the Fax Configuration wizard or by editing the properties of the local fax printer.

A remote fax printer is a fax device located elsewhere on the network. Use the Add Printer wizard to connect to a remote fax printer just as you would connect to any network printer. If you administer a remote fax printer, you configure it according to the instructions provided by the remote fax printer’s manufacturer.

In this example, the CEO’s computer is using the local fax printer, which sends and receives faxes from an external fax modem device (not the same as a remote fax printer).

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

You are the network administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You just installed a new Windows XP Professional computer for the company CEO. The CEO needs to send faxes to partners and potential clients using an external fax modem connected to a dedicated telephone line. The CEO also needs to receive faxes from the local fax device.

You go to the Printers and Faxes folder and select the Set up faxing task. You then open the Fax Console and successfully send a fax using the Send Fax wizard. Later, the CEO informs you that a client has attempted to send a fax several times, but the new Windows XP computer never answers the fax call.

You want the CEO’s computer to automatically answer fax calls. What should you do? (Choose two possible solutions.)

gfedcbEdit the properties of the local fax printer and change the Enable device to receive property for the fax device. Configure the number of rings before answering.

gfedc Edit the properties of the local fax printer and change Fax Security permissions.

gfedc Select the Receive a fax now action in the Fax Console. Configure the number of rings before answering.

gfedc Configure the Fax service to start automatically.

gfedcbRun the Fax Configuration wizard and change the Enable Receive property for the fax device. Configure the number of rings before answering.

gfedc Select the Answer now action in Fax Monitor. Configure the number of rings before answering.

Hacked by Piratez 70-270

Page 141: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #317]

Explanation:

By default, the Fax service is configured to start automatically after faxing is set up by executing the Set up faxing task. By default, the fax device used by the local fax printer is configured to send faxes, but not to receive them. You can run the Fax Configuration wizard to configure the local fax device to receive faxes. You can also edit the properties of the local fax printer to change its properties, including enabling the local fax device to receive faxes. To automatically answer fax calls, select the Automatically answer after option and configure the number of rings before answering. Otherwise, you will need to manually receive the fax by selecting the Receive a fax now action in the Fax Console, or by selecting the Answer now action in Fax Monitor when a fax call is received. In this scenario, you can instruct the CEO to manually answer incoming fax calls. Because the telephone is shared by both voice and fax calls, the sender should notify the CEO when sending an incoming fax so the CEO can manually answer the call as a fax call.

There is no need to change Fax Security permissions in this scenario. By default, administrators have all permissions, including managing the fax configuration, managing fax documents, and faxing. By default, all interactive users can fax and receive faxes.

It is important to distinguish between using a computer’s local fax printer and using a remote fax printer. A single local fax printer is automatically created when the fax service is installed. The local fax printer can use an internal fax device (an internal fax modem card that connects to an expansion slot or that is integrated into the motherboard) or an external fax device (a fax modem connected to a serial port or USB port, for example). You configure the local fax printer and the local fax devices it uses by using the Fax Configuration wizard or by editing the properties of the local fax printer.

A remote fax printer is a fax device located elsewhere on the network. Use the Add Printer wizard to connect to a remote fax printer just as you would connect to any network printer. If you administer a remote fax printer, you configure it according to the instructions provided by the remote fax printer’s manufacturer.

In this example, the CEO’s computer is using the local fax printer, which sends and receives faxes from an external fax modem device (not the same as a remote fax printer).

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

You are the network administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You just installed a new Windows XP Professional computer for the company CEO. The CEO needs to send faxes to partners and potential clients by using an external fax modem connected to a telephone line that is also used for voice calls. Occasionally, the CEO also needs to receive faxes from the local fax device.

You go to the Printers and Faxes folder and select the Set up faxing task. You configure the local fax device to send and receive faxes. You then open the Fax Console and successfully send a fax using the Send Fax wizard. Later, the CEO informs you that a client has attempted to send a fax several times, but the new Windows XP computer never answers the fax call.

You want to instruct the CEO how to answer fax calls. What should you do? (Choose two possible solutions.)

gfedcb Instruct the CEO to select the Answer now action in Fax Monitor.

gfedcInstruct the CEO to edit the properties of the local fax printer and configure the number of rings before answering.

gfedc Instruct the CEO to run the Fax Configuration wizard and configure the number of rings before answering.

gfedc Instruct the CEO to configure the Fax service to start automatically.

gfedcb Instruct the CEO to select the Receive a fax now action in the Fax Console.

gfedc Instruct the CEO to edit the properties of the local fax printer and change Fax Security permissions.

Hacked by Piratez 70-270

Page 142: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #327]

Explanation:

In this case, you need to configure the computer to use a remote fax printer rather than the local fax printer. A remote fax printer is a fax device located elsewhere on the network. Use the Add Printer wizard to connect to a remote fax printer just as you would connect to any network printer. If you administer a remote fax printer, you configure it according to the instructions provided by the remote fax printer’s manufacturer. To send a fax, print to the remote fax printer as you would print to any printer. The remote fax printer might also be configured to receive faxes and route them to you through e-mail or other methods.

The Fax service pertains to sending and receiving faxes through the computer’s local fax printer. A single local fax printer is automatically created when the fax service is installed. The local fax printer can use an internal fax device (an internal fax modem card that connects to an expansion slot or that is integrated into the motherboard) or an external fax device (a fax modem connected to a serial port or USB port, for example). You configure the local fax printer and the local fax devices it uses by using the Fax Configuration wizard or by editing the properties of the local fax printer. To send a fax through the local fax printer, print to the local fax printer as you would print to any printer. This starts the Send Fax wizard. You can also start the Send Fax wizard manually. To receive a fax through the local fax printer, enable the local fax device to receive faxes and to answer fax calls either manually or automatically.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #337]

You are the network administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You just installed a new Windows XP Professional computer for the company CEO. The company uses a network fax device for sending and receiving faxes.

You need to configure the CEO’s new computer to use the remote fax device. What should you do? (Choose all that apply.)

gfedc Add the Fax Services windows component using Add or Remove Programs.

gfedcb Manually create a new network printer.

gfedcRun the Fax Configuration wizard and change the Enable Receive property for the fax device. Configure the number of rings before answering.

gfedc Manually create a local fax printer.

gfedc Configure the Fax service to start automatically.

gfedc Edit the properties of the local fax printer and change Fax Security permissions.

gfedc Run the Fax Configuration wizard and change the Enable Send property for the fax device.

You are the network administrator for your company. You recently installed a new Windows XP Professional computer for the company CEO. You installed the Fax service and configured the computer to send and receive faxes using the local fax printer. When working in the Printers and Faxes folder, the company CEO accidentally deleted the local fax printer.

Hacked by Piratez 70-270

Page 143: 70 270 q & a

Explanation:

To re-install the local fax printer, select the Install a local fax printer task in the Printers and Faxes folder. Although you can stop the Fax service and set up faxing again, this is unnecessary.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #348]

Explanation:

Use the Inbox and Sent Items in Fax Console to view received and sent faxes. Fax Console lets you work with fax jobs. It serves a similar function for faxing as Outlook Express serves for receiving and sending e-mail. Fax Console contains four folders:

Incoming (contains faxes that are currently being received.)

You need to restore the local fax printer so the company CEO can continue to send and receive faxes. What should you do?

nmlkj Run the Fax Configuration wizard.

nmlkj Stop the Fax service, then select the Set up faxing task in the Printers and Faxes folder.

nmlkj Run the Send Fax wizard.

nmlkj Add the Fax Services Windows component using Add or Remove Programs.

nmlkji Select the Install a local fax printer task in the Printers and Faxes folder.

You are the desktop administrator for a company. You recently installed Windows XP on the company CEO’s computer. You also installed and configured a fax modem card on the CEO’s machine. You installed and configured faxing and successfully sent and received a couple faxes.

A few days later the CEO asks you where to view received faxes and where to view copies of sent faxes.

You need to instruct the CEO on how to locate copies of received and sent faxes. What should you do? (Choose two. Each choice is part of the correct solution.)

gfedc Instruct the CEO to view received faxes in the Incoming folder of the Fax Console utility.

gfedc Instruct the CEO to view sent faxes in the Outbox folder of the Fax Monitor utility.

gfedcb Instruct the CEO to view sent faxes in the Sent Items folder of the Fax Console utility.

gfedc Instruct the CEO to view sent faxes in the Outbox folder of the Fax Console utility.

gfedc Instruct the CEO to view sent faxes in the Sent Items folder of the Fax Monitor utility.

gfedcb Instruct the CEO to view received faxes in the Inbox folder of the Fax Console utility.

gfedc Instruct the CEO to view received faxes in the Inbox folder of the Fax Monitor utility.

gfedc Instruct the CEO to view received faxes in the Incoming folder of the Fax Monitor utility.

Hacked by Piratez 70-270

Page 144: 70 270 q & a

Inbox (contains faxes that have been received.) Outbox (contains faxes that are scheduled to be sent.) Sent Items (contains faxes that have been sent.)

Fax Monitor is used to monitor faxing tasks as they occur during the sending or receiving of a fax. It is not applicable to this question.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 6.4

[304 #357]

Explanation:

If you're having trouble with a SCSI installation, check device IDs and termination for the SCSI bus. Make sure each SCSI device has a unique ID number and that both ends of the SCSI bus are terminated.

The Scanner and Camera Installation wizard lets you manually install a driver for an imaging device. You can start the wizard by opening the Scanners and Cameras folder and selecting the Add an imaging device task. You can perform the same tasks by manually adding an imaging device through the Add Hardware wizard. If the scanner or camera is Plug-and-Play-compatible, you should be able to simply connect the device and scan for new Plug-and-Play hardware. Because the scanner was previously working fine, there should not be a reason to install the driver again or check the scanner's Plug-and-Play compatibility.

Using the Last Known Good configuration would not be a potential solution because Greg has logged on the computer successfully.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #369]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Greg is a graphic artist who occasionally needs to scan images. Greg’s computer has an internal IDE hard disk and a SCSI adapter connected to an external scanner.

You install an internal SCSI hard disk in Greg’s computer. After the installation, Greg logs on but can no longer use the scanner to scan images.

You need to make sure Greg can use the scanner. What should you do?

nmlkj Run the Scanner and Camera Installation wizard.

nmlkji Check device IDs and termination on the SCSI bus.

nmlkj Open the Scanners and Cameras folder and select the Add an imaging device task.

nmlkj Make sure the scanner is Plug-and-Play compatible.

nmlkj Restart the computer and select the Last Known Good configuration.

Hacked by Piratez 70-270

Page 145: 70 270 q & a

Explanation:

Because the scanner in this scenario is a legacy scanner, you can try scanning for legacy hardware using the Add Hardware wizard, or you can install the driver manually. You can install drivers manually for imaging devices using the Scanner and Camera Installation wizard. You can start the wizard by opening the Scanners and Cameras folder and selecting the Add an imaging device task. You can perform the same tasks by manually adding an imaging device through the Add Hardware wizard.

If the scanner or camera is Plug-and-Play-compatible, you should be able to simply connect the device and scan for new Plug-and-Play hardware from Device Manager, rebooting the computer, or running the Add Hardware wizard (the beginning of the wizard scans for new PnP hardware). However, because the scanner in this scenario is a legacy device, these solutions are not applicable.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #378]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Greg is a graphic artist who occasionally needs to scan images.

You connect a legacy scanner to the parallel port on Greg’s computer and turn the device on. You need to make sure Greg can use the scanner. What should you do? (Choose all possible solutions.)

gfedc Run the Add Hardware wizard and scan for new PnP hardware.

gfedc Open Device Manager and scan for new hardware.

gfedcb Run the Add Hardware wizard and manually add a new imaging device.

gfedcb Open the Scanners and Cameras folder and select the Add an imaging device task.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Greg is a graphic artist who occasionally takes digital pictures. Greg has taken several pictures on his personal digital camera and now wants to import the pictures from his digital camera to his Windows XP Professional computer. He asks you for help.

You examine the cables provided by the camera’s manufacturer and discover a serial cable. Greg’s computer has a modem that is configured to use the first serial port, but the second serial port is available. Greg tells you that the camera is not Plug-and-Play-compatible.

You want to get the images from Greg’s camera. What should you do? (Choose all that apply. Each correct choice is part of the solution.)

gfedcb Configure the camera’s driver to use COM2.

gfedc Configure the camera’s driver to use LPT1.

gfedcb Select the Get pictures task.

gfedc Configure the camera’s driver to use LPT2.

gfedcb Connect the camera to the computer’s serial port and turn it on.

gfedc Open Device Manager and scan for new hardware.

Hacked by Piratez 70-270

Page 146: 70 270 q & a

Explanation:

You should first connect the camera to the computer and turn it on. You also need to install the driver for the camera. You can do this by running the manufacturer’s setup program or by using the Scanner and Camera Installation wizard. You can start the wizard by opening the Scanners and Cameras folder and selecting the Add an imaging device task. You can perform the same tasks by manually adding an imaging device through the Add Hardware wizard. If the device is Plug-and-Play-compatible, you should be able to simply connect the device and scan for new Plug-and-Play hardware from Device Manager, rebooting the computer, or running the Add Hardware wizard (the beginning of the wizard scans for new PnP hardware).

The driver needs to be configured to use the proper port. You can configure the port during the Scanner and Camera Installation wizard. You can often use automatic detection to detect the device once it has been connected to the proper port and turned on. You can also manually configure the port. In this scenario, you would choose the second serial port (COM2) if you decide to manually configure the port.

After the driver is configured, you can right-click the device in the list of scanners and cameras displayed in the Scanners and Cameras folder. Then select Get pictures to download the pictures from the camera. The camera might have come with third-party software from the manufacturer that performs similar tasks.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #386]

Explanation:

Windows XP does not automatically detect and install an appropriate driver for legacy (non-Plug-and-Play) devices. To install an appropriate driver, you can run the Add Hardware wizard and scan for legacy hardware. You can also use a Windows XP-compatible driver provided by the software manufacturer. Scanning for new Plug-and-Play hardware will not detect legacy hardware. The Plug-and-Play scanning process occurs automatically when the computer starts. You can also manually trigger scanning for new Plug-and-Play hardware from Device Manager or when you initially start the Add Hardware wizard.

Objective(s):

gfedcb Select the Add an imaging device task.

gfedc Configure the camera’s driver to use COM1.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. The company CEO wants to send and receive faxes.

You acquire a fax modem and supportive software from another user in the company who no longer uses it, install the modem in the CEO’s computer, and reboot the computer. However, the modem does not seem to be working, and it is not listed in Device Manager.

You need to make the fax modem available to use. What should you do? (Choose two possible solutions.)

gfedcb Run the Add Hardware wizard and scan for legacy hardware.

gfedcb Manually install the modem’s device driver supplied by the manufacturer.

gfedc Open Device Manager and scan for hardware changes.

gfedcOpen Device Manager, edit the properties of each COM port, and uncheck the Use automatic settings option.

Hacked by Piratez 70-270

Page 147: 70 270 q & a

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #406]

Explanation:

If no USB drivers are installed, USB may not be enabled in BIOS. Reboot the computer, run the BIOS setup program, and enable USB. You might need to update the BIOS to be able to use USB. Contact the manufacturer for the most current version. When you connect a USB device to the computer, appropriate drivers should automatically be installed, or you should be prompted to install them if Windows cannot locate an appropriate driver for the device. In this case, however, the computer does not even have the basic USB drivers for the USB controller because USB is not enabled on the computer.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #414]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a user in the art department, recently acquired a new USB keyboard. Previously, Greg used a PS/2 keyboard, but now he wants to use the new USB keyboard. Greg's computer has two USB ports.

Greg connects the new USB keyboard to his computer, but the keyboard fails to work. He reboots the computer, but the keyboard still fails to work. You open Device Manager, but you do not see a USB keyboard driver or any other USB drivers. You install the USB keyboard on another computer and it works fine.

You need to make sure Greg can use the new USB keyboard on his computer. What should you do? (Choose two possible solutions.)

gfedc Select Show hidden devices in Device Manager.

gfedc Run the Add Hardware wizard.

gfedcb Update the system BIOS.

gfedc Edit the properties of the USB keyboard driver and update the driver.

gfedc Download a Windows XP-compatible driver from the manufacturer.

gfedcb Enable USB in the system BIOS.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a user in the art department, recently acquired a new USB scanner. The scanner has a single five meter USB cable and no power cable. Greg’s computer has two USB ports. A USB keyboard is connected to one of the USB ports. The USB keyboard also has two USB ports on it. A USB mouse is connected to one of the USB ports on the USB keyboard.

Greg connects his new USB scanner to the free USB port on the keyboard. However, the scanner fails to work. You connect the USB scanner to a USB port on your computer and the scanner works fine. On Greg's computer, you open Device Manager and view devices by connection. You see three USB hubs. Two USB hubs are root hubs. One of the root hubs does not have any devices connected to it. You view the Power properties of the unused USB Root Hub and verify that it is self-powered

Hacked by Piratez 70-270

Page 148: 70 270 q & a

Explanation:

USB devices can be bus-powered (receive power over the USB cable) or self-powered (receive power over an external power cable). Bus-powered devices can be low-powered (draw 100 mA of power or less) or high-powered (draw between 100 mA and 500 mA of power). If a USB device requires more than 500 mA of power, it needs to be self-powered.

Like devices, USB hubs can be bus-powered or self-powered. You can only connect low-powered or self-powered devices to bus-powered USB hubs. You can connect any type of USB device to a self-powered hub. In Device Manager, you can view the properties of a USB hub and select the Power tab to see whether it is self-powered or bus-powered and how much power per port it supplies.

In this example, each USB port on Greg’s computer is a separate USB root hub. Each USB root hub is self-powered. Greg’s keyboard also contains a USB hub, which is bus-powered. Because the scanner is a high-powered device, it must be connected to a self-powered hub (USB port on the computer) rather than a bus-powered hub (USB hub in the keyboard). Apparently, this is how you connected the scanner to your computer when it worked.

Self-powered and high-powered USB cables must be 5 meters in length or less. Bus-powered USB cables must be 3 meters in length or less. The cable in this scenario is adequate because the scanner is a high-powered device.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #424]

unused USB Root Hub and verify that it is self powered.

You need to make sure Greg can use the new USB scanner on his computer. What should you do?

nmlkji Connect the USB scanner to the free USB port on Greg’s computer.

nmlkj Swap the ports used by the USB scanner and USB mouse.

nmlkj Acquire a shorter cable for the USB scanner and reconnect the scanner to the USB port on the keyboard.

nmlkjEdit the Power Management properties of the used USB Root Hub. Clear the Allow the computer to turn off this device to save power option. Reconnect the scanner to the USB port on the keyboard.

nmlkjEdit the Power Management properties of the unused USB Root Hub. Clear the Allow the computer to turn off this device to save power option. Reconnect the scanner to the USB port on the keyboard.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Greg, a user in the art department, recently acquired a new USB scanner. The scanner has a single five meter USB cable and no power cable. Greg’s computer has two USB ports. A USB keyboard is connected to one of the USB ports. The USB keyboard also has two USB ports on it. A USB mouse is connected to one of the USB ports on the USB keyboard.

You open Device Manager and view devices by connection. You see three USB hubs. Two USB hubs are root hubs. One of the root hubs does not have any devices connected to it. You view the Power properties of the unused USB Root Hub and verify that it is self-powered. You view the Power properties of the non-root USB hub and verify that it is bus-powered.

You want to successfully install the USB scanner on Greg’s computer. What should you do? (Choose all possible solutions.)

gfedcPurchase a new bus-powered USB hub Connect the hub to Greg’s computer Connect the USB scanner to

Hacked by Piratez 70-270

Page 149: 70 270 q & a

Explanation:

USB devices can be bus-powered (receive power over the USB cable) or self-powered (receive power over an external power cable). Bus-powered devices can be low-powered (draw 100 mA of power or less) or high-powered (draw between 100 mA and 500 mA of power). If a USB device requires more than 500 mA of power, it needs to be self-powered.

Like devices, USB hubs can be bus-powered or self-powered. You can only connect low-powered or self-powered devices to bus-powered USB hubs. You can connect any type of USB device to a self-powered hub. In Device Manager, you can view the properties of a USB hub and select the Power tab to see whether it is self-powered or bus-powered and how much power per port it supplies.

In this example, each USB port on Greg’s computer is a separate USB root hub. Each USB root hub is self-powered. Greg’s keyboard also contains a USB hub, which is bus-powered. Because the scanner is a high-powered device, it must be connected to a self-powered hub (USB port on the computer or a new self-powered USB hub) rather than a bus-powered hub (USB hub in the keyboard).

Self-powered and high-powered USB cables must be 5 meters in length or less. Bus-powered USB cables must be 3 meters in length or less. The cable in this scenario is adequate because the scanner is a high-powered device.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #433]

gfedcPurchase a new bus powered USB hub. Connect the hub to Greg s computer. Connect the USB scanner to the new bus-powered USB hub.

gfedcbPurchase a new self-powered USB hub. Connect the hub to Greg’s computer. Connect the USB scanner to the new self-powered USB hub.

gfedcPurchase a new bus-powered USB hub. Connect the hub to Greg’s keyboard. Connect the USB scanner to the new bus-powered USB hub.

gfedcb Connect the USB scanner to the free USB port on Greg’s computer.

gfedc Connect the USB scanner to the free USB port on Greg’s keyboard.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You just installed a legacy network adapter in a user’s computer and rebooted the computer. You attempt to connect to the network, but fail.

You open Network Connections but you cannot see a Local Area Connection icon. You reboot the computer again, but you still cannot see a Local Area Connection icon.

You need to connect the computer to the network. What should you do first?

nmlkj Replace the network adapter with a known good network adapter.

nmlkj Make sure the DIP switches on the card are set correctly and reboot the computer.

nmlkji Use the Add Hardware wizard to add the network adapter.

nmlkj Open Device Manager and scan for new hardware.

nmlkj Remove the network adapter and clean the contacts, then replace the card.

nmlkj Select the Create a new connection task in the Network Connections folder.

Hacked by Piratez 70-270

Page 150: 70 270 q & a

Explanation:

A Local Area Connection icon is automatically created when you install a network adapter. In this scenario, the adapter is not Plug-and-Play compatible, so a driver is not automatically installed. You need to manually install the card’s driver. Although the card might be faulty or have inadequate physical contact with the expansion slot, a more likely problem is that the driver is simply not installed. After the driver is installed, you can check other issues such as resource conflicts or improper network configuration. The Create a new connection task in the Network Connections folder is used to create other types of network connections, such as dial-up connections.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #442]

Explanation:

A Local Area Connection icon is automatically created when you install a network adapter. When you boot Windows XP, it scans for new Plug-and-Play hardware. In this scenario, the adapter is Plug-and-Play-compatible, so a driver should automatically be installed, or you should be prompted to supply a driver. However, the network card is improperly seated in the expansion slot, so it cannot be detected through Plug-and-Play. Scanning for new hardware again before the network adapter is properly seated will not help. Manually installing the card’s driver will create a local area connection, but it will be unusable because the network card is not physically connected properly. The Create a new connection task in the Network Connections folder is used to create other types of network connections, such as dial-up connections.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #452]

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You just installed a Plug-and-Play network adapter in a user’s computer and rebooted the computer. You do not see any message about a new device being found. You attempt to connect to the network, but fail.

You open Network Connections but you cannot see a Local Area Connection icon. You scan for new Plug-and-Play hardware, but you see no change. You reboot the computer again, but you still cannot see a Local Area Connection icon.

You need to connect the computer to the network. What should you do?

nmlkj Use the Add Hardware wizard to add the network adapter.

nmlkji Verify that the network adapter is properly seated in the expansion slot and reboot the computer.

nmlkj Make sure the DIP switches on the card are set correctly and reboot the computer.

nmlkj Select the Create a new connection task in the Network Connections folder.

Y th d kt d i i t t f Y Wi d XP P f i l d kt

Hacked by Piratez 70-270

Page 151: 70 270 q & a

Explanation:

Some devices require special software to function at all or to enable certain specialty functions on the device. In this example, Windows has loaded a basic keyboard driver for the new keyboard, but you need to install additional software for the keyboard’s specialty keys to work properly. You will then be able to configure the keyboard through the new software or perhaps through manufacturer-specific tabs in the Keyboard applet in the control panel.

In this scenario, the keyboard has successfully been installed (apparently using a generic driver supplied by Windows), so the other options are unnecessary.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #461]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You just installed a new USB keyboard for a user’s computer. You decide to test the new keyboard.

You open Wordpad and successfully type some text. You press the E-Mail button on the keyboard, but nothing happens. According to the manufacturer, the E-Mail button should open your default e-mail program. You open the Keyboard applet in the control panel, but you do not see any options for configuring the E-Mail button.

You want all the buttons on the keyboard to work. What should you do?

nmlkj Connect the keyboard to a self-powered hub.

nmlkj Open Device Manager and scan for new hardware.

nmlkj Enable USB in the system BIOS.

nmlkji Install the manufacturer’s software for the keyboard.

nmlkj Use the Add Hardware wizard to add the keyboard driver.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You just installed a new USB mouse for a user’s computer. The mouse installs successfully and you are able to move the mouse cursor on the screen, click, and double-click. However, some of the specialty features advertised by the mouse manufacturer do not work.

You open the Mouse applet in the Control Panel to configure the specialty features. However, you cannot find any settings related to the specialty features.

You want all the features of the new mouse to work. What should you do?

nmlkj Connect the mouse to a self-powered hub.

nmlkj Use the Add Hardware wizard to add the mouse driver.

nmlkj Open Device Manager and scan for new hardware.

nmlkji Install the manufacturer’s software for the mouse.

nmlkj Enable USB in the system BIOS.

Hacked by Piratez 70-270

Page 152: 70 270 q & a

Explanation:

Some devices require special software to function at all or to enable certain specialty functions on the device. In this example, Windows has loaded a basic mouse driver for the new mouse, but you need to install additional software for the mouse’s specialty functions to work properly. You will then be able to configure the mouse through the new software or perhaps through manufacturer-specific tabs in the Mouse applet in the control panel.

In this scenario, the mouse has successfully been installed (apparently using a generic driver supplied by Windows), so the other options are unnecessary.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #470]

Explanation:

Your first task in using infrared communications is to make sure an infrared transceiver is properly installed. For an external transceiver, make sure that it is physically connected to the computer properly. Because the desktop computer uses an external infrared transceiver, you do not need to enable the infrared controller in the computer’s BIOS. However, on computers with a built-in transceiver, you might need to do this. Because a driver for the infrared transceiver is not listed in Device Manager, you need to manually install the driver using the Add Hardware wizard.

After making sure the infrared transceiver is properly installed, you need to think about the infrared connection with the other infrared device. An infrared transceiver of the type mentioned in this question can only communicate with a single other infrared transceiver at a time, so you should move the laptop computer away from the printer. You should also make sure that the desktop computer’s transceiver is pointing to the printer’s transceiver and is no further than 1 meter away.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. The company CEO just purchased a wireless printer with an infrared port. The CEO wants to print to the printer from a desktop computer and from a laptop computer.

You verify that both the desktop and laptop computers have infrared transceivers. The desktop computer has an external infrared transceiver connected to the computer’s serial port. You point the laptop computer to the infrared printer, run the Add Printer wizard, and use Plug-and-Play to detect and install a new printer object. You successfully submit a print job to the new printer. However, when you attempt to perform the same tasks on the desktop computer, no printer is detected. You open Device Manager and you do not see an Infrared Devices node. You scan for new hardware, but no changes occur.

You want to configure the CEO’s desktop computer to print to the infrared printer. What should you do? (Choose three. Each choice is part of the correct solution.)

gfedcb Move the infrared transceivers of the desktop computer and printer within 1 meter of each other.

gfedc Move the infrared transceivers of the desktop computer and printer within 3 meters of each other.

gfedc Enable the infrared controller in the computer’s BIOS.

gfedcb Move the laptop computer away from the printer.

gfedcRun the Add Printer wizard and add a new printer object that uses the serial port to which the infrared transceiver is connected.

gfedcb Run the Add Hardware wizard and add an infrared device.

gfedc Open the Wireless Link applet in the Control Panel and configure the file transfer options.

Hacked by Piratez 70-270

Page 153: 70 270 q & a

Once you establish an infrared connection, you can use the connection. In this case, you want to add a printer. Because the printer is Plug-and-Play compatible, you should be able to detect the printer using Plug-and-Play, just as you did when configuring the laptop. You would not configure the new printer object to print to a serial port, such as COM 1 (Serial Port). Instead, you would configure it to print to an IR (Local Port).

You don’t need to configure file transfer options. That is a task related to transferring files between two devices over an infrared link.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #479]

Explanation:

Your first task in using infrared communications is to make sure an infrared transceiver is properly installed. Because the laptop computer uses an internal infrared transceiver, you might need to enable the infrared controller in the computer’s BIOS. In this scenario, the infrared controller has been disabled in the BIOS. Although moving the transceivers within proper distance of each other might be necessary, the first step is to install the infrared transceiver hardware.

In this scenario, both the printer and the infrared transceiver are Plug-and-Play-compatible and should be detected. Therefore, you should not need to manually add an infrared device or manually add the printer. If you do manually configure the printer object, you would configure it to use the computer’s IR (Local Port) rather than a serial (COM) port.

You don’t need to configure file transfer options. That is a task related to transferring files between two devices over an infrared link.

Objective(s):

304. Implement, manage, and troubleshoot input and output (I/O) devices.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. The company CEO just purchased a wireless printer with an infrared port. The printer supports the Plug-and-Play standard. The CEO wants to print to the printer from a laptop computer. The laptop computer has a built-in Plug-and-Play infrared transceiver.

You point the laptop computer to the infrared printer and run the Add Printer wizard. However, no printer is detected. You open Device Manager and you do not see an Infrared Devices node. You scan for new hardware, but no changes occur.

You want to configure the CEO’s laptop computer to print to the infrared printer. What should you do?

nmlkjMove the laptop computer within 1 meter of the printer and make sure the infrared transceivers are pointed directly at each other. Run the Add Printer wizard again and detect the printer through Plug-and-Play.

nmlkj Open the Wireless Link applet in the Control Panel and configure the file transfer options.

nmlkjRun the Add Hardware wizard and add an infrared device. Configure the infrared device to use a free serial port, such as COM1. Run the Add Printer wizard again and detect the printer through Plug-and-Play.

nmlkjRun the Add Hardware wizard and add an infrared device. Configure the infrared device to use a free serial port, such as COM1. Run the Add Printer wizard and manually add a new printer object that uses the same serial port.

nmlkji Enable the infrared controller in the computer’s BIOS.

Hacked by Piratez 70-270

Page 154: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 2.1

[304 #490]

Explanation:

Because a successful logon has not occurred since the STOP errors began, you can use the computer’s Last Known Good Configuration option. The new driver that is causing the boot problem will no longer be used. Because the boot process has progressed to the point that a STOP error is generated, you do not need to fix the boot sector or master boot record using the Recovery Console. Reloading the system or performing a parallel installation will likely correct the problem, but this is unnecessary. A parallel installation would require another partition. The Enable Boot Logging option will generate a log of the driver loading process, but you already have a good idea of which driver is causing the problem and this is not a complete solution.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[305 #260]

You are the desktop administrator for your company. Rodney, a user in the research department, reports that he is getting STOP errors during system startup. Rodney uses a Windows XP Professional computer with an 800 MHz CPU, 192 MB of RAM, and a 40 GB hard drive configured as a single NTFS volume.

You ask Rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA just before receiving the first STOP error. He immediately rebooted and has not been able to use Windows XP since then due to STOP errors during the boot process.

You need to fix Rodney’s computer. What should you do?

nmlkj Re-install Windows XP Professional from the CD-ROM.

nmlkji Reboot the system. Select Last Known Good Configuration from the Advanced Startup options.

nmlkjBoot the system using a Windows XP Professional CD-ROM, select the Recovery Console option, and then use the Fixboot and Fixmbr utilities.

nmlkj Perform a parallel installation of Windows XP.

nmlkjReboot the system and select the Enable Boot Logging option to determine which driver is loading just before the STOP error occurs.

You are the desktop administrator for your company. Rodney, a user in the research department, reports that he is getting STOP errors while using his computer. Rodney uses a Windows XP Professional computer with an 800 MHz CPU with 192 MB of RAM and a 40 GB hard drive configured as a single NTFS volume.

You ask Rodney if anything has changed recently on the computer. Rodney explains that he ran the installation program for his PDA and everything worked fine until he tried to hot sync. Now any time he hot syncs, he has to reboot the computer.

You need to fix Rodney’s computer and prevent Rodney from using the PDA until you can install an updated driver. What should you do?

Hacked by Piratez 70-270

Page 155: 70 270 q & a

Explanation:

You should disable the driver. Although you might be able to disable the driver without booting in Safe mode, booting in Safe mode is a good way to prevent drivers that could interfere with your task from being loaded. Because the system can successfully boot and the error occurs after logon, the Last Known Good Configuration option will still load the drivers. Rolling back the driver will not help because the driver was not updated. Because the boot process is functioning, there is no indication that the boot sector or master boot record needs fixing using the Recovery Console. Reloading the system or performing a parallel installation will likely correct the problem, but this is unnecessary. A parallel installation would require another partition.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[305 #269]

Explanation:

To install an unsigned driver, the Driver Signing Options dialog box cannot be configured to block unsigned drivers. When you log on using your administrative account, changes made to the Driver Signing Options dialog box will only affect your

nmlkj Reboot the system and select the Last Known Good Configuration from the Advanced Startup options.

nmlkj Perform a parallel installation of Windows XP.

nmlkj Re-install Windows XP Professional from the CD-ROM.

nmlkjReboot the system and select Safe Mode. Edit the properties of the PDA’s driver in Device Manager and select Roll Back Driver.

nmlkjBoot the system using a Windows XP Professional CD-ROM, select the Recovery Console option, and then use the Fixboot and Fixmbr utilities.

nmlkji Reboot the system and select Safe Mode. Disable the PDA’s driver in Device Manager.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system, and all computers are members of a single Active Directory domain. Greg, a user in the art department, just received a new USB scanner and is installing it. Greg is a member of his computer’s Administrators group and wants to install the device driver supplied by the manufacturer.

Greg runs the manufacturer’s setup program but receives an error indicating that the driver has not been signed. You log on to Greg’s computer to fix the problem.

You want Greg to be able to successfully install the manufacturer’s driver for his new scanner. What should you do? (Choose all that apply.)

gfedc Open Device Manager and roll back the scanner’s current driver.

gfedcb Select the Make this action the system default check box in the Driver Signing Options dialog box.

gfedc Select the Block option in the Driver Signing Options dialog box.

gfedcb Select an option other than Block in the Driver Signing Options dialog box.

gfedc Temporarily add Greg's User object as a member of the Domain Admins group.

gfedc Open Device Manager and disable the scanner’s current driver.

Hacked by Piratez 70-270

Page 156: 70 270 q & a

account on that computer, unless you select the Make this action the system default check box. Otherwise, the change will have no effect when another user logs on.

Disabling or rolling back the current driver will not fix this problem. Greg is already a member of his computer’s Administrators group, which gives him sufficient permissions. Letting him be a domain administrator gives him far too many permissions.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #279]

Explanation:

The Warn driver signing option notifies the user that an unsigned driver will be installed and asks for approval. Changes made to the Driver Signing Options dialog box will only affect your account on that computer, unless you select the Make this action the system default check box.

If you remove Greg from his computer’s Administrators group, he will not have permissions to install software.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #289]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system, and all computers are members of a single Active Directory domain. Greg, a user in the art department, just received a new USB scanner and is installing it. Greg is a member of his computer’s Administrators group and wants to install the device driver supplied by the manufacturer.

Greg runs the manufacturer’s setup program and receives no error messages. Afterwards, Greg’s computer locks up. He reboots the computer and successfully logs on, but the system locks up again. You log on to Greg’s computer and fix the problem by updating the driver for the scanner.

In the future, you want Greg to be notified before he installs drivers that have a potential problem. However, you still want Greg to be able to install the drivers he chooses. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Select the Ignore option in the Driver Signing Options dialog box.

gfedc Remove Greg’s user account from his computer’s Administrators local group.

gfedcb Select the Warn option in the Driver Signing Options dialog box.

gfedc Select the Block option in the Driver Signing Options dialog box.

gfedcb Select the Make this action the system default check box in the Driver Signing Options dialog box.

Y th d kt d i i t t f Y Wi d XP P f i l it d kt

Hacked by Piratez 70-270

Page 157: 70 270 q & a

Explanation:

If you remove Greg from his computer’s Administrators group, he will not have permissions to install drivers and other software. Adding Greg’s user account to other groups will not remove his user from the Administrators group which is giving him permission to install drivers and other software. Configuring unsigned driver options is insufficient, because unsigned driver options do not pertain to signed drivers.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #300]

Explanation:

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system, and all computers are members of a single Active Directory domain. Greg, a user in the art department, just received a new USB scanner and is installing it. Greg is a member of his computer’s Administrators group and wants to install the device driver supplied by the manufacturer.

Greg runs the manufacturer’s setup program and receives no error messages. Afterwards, Greg’s computer locks up. He reboots the computer and successfully logs on, but the system locks up again. You log on to Greg’s computer and fix the problem.

You want to prevent Greg from installing any drivers on his computer. What should you do?

nmlkji Remove Greg’s user account from his computer’s Administrators local group.

nmlkj Select the Block option in the Driver Signing Options dialog box.

nmlkj Select the Warn option in the Driver Signing Options dialog box.

nmlkj Select the Ignore option in the Driver Signing Options dialog box.

nmlkj Add Greg’s user account to his computer’s Power Users local group.

nmlkj Select the Make this action the system default check box in the Driver Signing Options dialog box.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system, and all computers are members of a single Active Directory domain. Greg, a user in the art department, just installed a freeware program from the Internet on his computer. Now his computer consistently goes down several minutes after logging on.

Greg uninstalls the software and restarts his computer, but the problems still occur. You need to prevent crashes on Greg’s computer. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Boot the system using a Windows XP Professional CD-ROM and repair the installation of Windows XP.

gfedc Configure the computer's swap file to be located on a different drive.

gfedc Run sfc /revert.

gfedcb Run sigverif.

gfedcb Replace unsigned system files with signed versions.

gfedc Perform an administrative restore.

Hacked by Piratez 70-270

Page 158: 70 270 q & a

An application may overwrite system files with unsigned versions that are not tested and may be incompatible with the operating system or other applications. Use the File Signature Verification (sigverif) program to identify system files that are unsigned and replace them with signed versions from Microsoft. The File Signature Verification program lists the following information:

File name File location File modification date File type File version number

Some system files are protected and are automatically replaced when the system is scanned. You can manually initiate a system scan using the system file checker (sfc) program. However, the /revert switch sets the behavior of the scanning software and is not applicable to this question.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #310]

Explanation:

The System Information utility meets the requirements stated in this scenario. From the command line, you can launch the System Information utility using the winmsd command.

The msinfo32 command launches the System Information utility from the Run dialog. The sigverif command launches the File Signature Verification utility. The sfc command configures the system file checker and scans protected system files. The msconfig command, when run from the Run dialog, launches the System Configuration utility, which lets you troubleshoot system startup.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

You are a help desk technician for your company. You often connect to other computers in your company using Remote Assistance. After connecting, you often want to access system information from a central location. Information of interest to you includes signed drivers, startup programs, hardware components and their configuration, recent errors generated by programs, and settings for Internet Explorer and Microsoft Office applications. You also want to easily launch programs such as Net Diagnostics, the File Signature Verification utility, and System Restore.

You want to start a single program that meets these requirements. You want to start the program from the command line. What should you do? (Choose all correct solutions.)

gfedc Run msinfo.

gfedc Run sfc.

gfedc Run msconfig.

gfedcb Run winmsd.

gfedc Run msinfo32.

gfedc Run sigverif.

Hacked by Piratez 70-270

Page 159: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #320]

Explanation:

The System Information utility meets the requirements stated in this scenario. From the Run command, you can launch the System Information utility using the winmsd command or the msinfo32 command.

The sigverif command launches the File Signature Verification utility. The sfc command configures the system file checker and scans protected system files. The msconfig command, when run from the Run dialog, launches the System Configuration utility, which lets you troubleshoot system startup.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #330]

You are a help desk technician for your company. You often connect to other computers in your company using Remote Assistance. After connecting, you often want to access system information from a central location. Information of interest to you includes signed drivers, startup programs, hardware components and their configuration, recent errors generated by programs, and settings for Internet Explorer and Microsoft Office applications. You also want to easily launch programs such as Net Diagnostics, the File Signature Verification utility, and System Restore.

You want to start a single program that meets these requirements. You want to start the program by selecting Run from the Start menu and entering a command. What should you do? (Choose all correct solutions.)

gfedcb Run msinfo32.

gfedc Run msconfig.

gfedcb Run winmsd.

gfedc Run sigverif.

gfedc Run msinfo.

gfedc Run sfc.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Greg, a graphic artist, installs a new art application on his computer. The application prompts Greg to install an updated video driver, which is unsigned. Greg accepts the unsigned driver and completes the installation. However, after he reboots and starts the new application, the display appears to not be refreshing properly.

You want to configure Greg’s computer to use the previous video driver until the manufacturer provides a signed driver. What should you do?

nmlkj Boot to the Windows XP installation CD and use the Repair option.

Hacked by Piratez 70-270

Page 160: 70 270 q & a

Explanation:

To roll back to a previous driver, use the Roll Back Driver option available in the driver’s properties. Although you might be able to perform this task without rebooting in Safe mode, you will need to use Safe mode if the problem is serious enough to make the display difficult to use. Safe mode uses a generic VGA driver. You should not disable the driver in this situation. Although an updated driver might be available, the question does not indicate that fact. The Last Known Good configuration will also not work.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[305 #340]

Explanation:

The video driver used by the upgraded computers is working. Therefore, you should be able to use the same driver in Greg’s computer.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

nmlkj Boot to the Windows XP installation CD and use the Repair option.

nmlkjiBoot to Safe Mode. Open Device Manager and select the video driver. Open the driver’s properties and select Roll Back Driver.

nmlkj Boot to the Last Known Good Configuration.

nmlkjBoot to Safe Mode. Open Device Manager and select the video driver. Open the driver’s properties and select Update Driver.

nmlkj Boot to Safe Mode. Open Device Manager and disable the video driver.

nmlkj Boot to the Windows XP installation CD and use the System Recovery Console.

You are the desktop administrator for your company. You recently upgraded all desktop computers in your company from Windows 2000 to Windows XP Professional. A new user named Greg is hired in the art department. You acquire a new computer for Greg, which is identical to other art department users' computers. You install a new copy of Windows XP Professional on Greg’s computer.

You start Greg’s computer, but the display operates in VGA mode only. You verify that the video card in Greg’s computer is the same make and model as other video cards used by users in the art department.

You want to install a functional video driver on Greg’s computer. What should you do?

nmlkji Copy the video driver from an upgraded Windows XP computer.

nmlkj Reboot the computer. Select Enable VGA Mode on the startup options menu.

nmlkj Boot to Safe Mode. Open Device Manager and disable the video driver.

nmlkjBoot to Safe Mode. Open Device Manager and select the video driver. Open the driver’s properties and select Roll Back Driver.

nmlkj Reboot the computer. Select Last Known Good Configuration on the startup options menu.

Hacked by Piratez 70-270

Page 161: 70 270 q & a

TestOut for Windows XP Administration, Section 2.2

[305 #350]

Explanation:

The best solution in this scenario is to upgrade Greg’s video driver using a signed driver from the manufacturer. There is no indication that any other upgraded computer uses the same video card and has a driver that is working. Therefore, copying the driver from another computer will not work.

Objective(s):

305. Manage and troubleshoot drivers and driver signing.

Reference(s):

TestOut for Windows XP Administration, Section 2.2

[305 #359]

You are the desktop administrator for your company. You recently upgraded all desktop computers in your company from Windows 2000 to Windows XP Professional. After the upgrade, a user named Greg complains that his display operates in VGA mode only.

You want to install a functional video driver on Greg’s computer. What should you do?

nmlkj Reboot the computer. Select Enable VGA Mode on the startup options menu.

nmlkji Upgrade the video driver using a signed driver from the manufacturer.

nmlkjBoot to Safe Mode. Open Device Manager and select the video driver. Open the driver’s properties and select Roll Back Driver.

nmlkj Reboot the computer. Select Last Known Good Configuration on the startup options menu.

nmlkj Copy the video driver from another upgraded Windows XP computer.

nmlkj Boot to Safe Mode. Open Device Manager and disable the video driver.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer that supports dual processors. However, only one processor is currently installed. Rodney asks you to install a second processor to increase his computer’s performance.

You install a second processor and reboot the computer. However, performance does not appear to increase. You open Device Manager and expand the Computer node. You see a driver called ACPI Uniprocessor PC. You open Task Manager and select the CPU tab. You only see a single CPU usage chart.

You want to configure Rodney’s computer to use both processors. What should you do?

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Multiprocessor PC.

nmlkji Update the ACPI Uniprocessor PC driver to ACPI Multiprocessor PC.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select MPS Multiprocessor PC.

nmlkj Update the ACPI Uniprocessor PC driver to MPS Multiprocessor PC.

nmlkj Open Task Manager and configure processor affinity for Rodney’s applications.

Hacked by Piratez 70-270

Page 162: 70 270 q & a

Explanation:

Use Device Manager to update the HAL from one that uses a single processor to one that uses multiple processors. It is important that you upgrade to the correct computer model type. Standard PC and MPS Uniprocessor PC should be upgraded only to MPS Multiprocessor PC. Advanced Configuration and Power Interface (ACPI) PC and ACPI Uniprocessor PC should be upgraded only to ACPI Multiprocessor PC.

Objective(s):

306. Monitor and configure multiprocessor computers.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[306 #260]

Explanation:

Use Device Manager to update the HAL from one that uses a single processor to one that uses multiple processors. It is important that you upgrade to the correct computer model type. Standard PC and MPS Uniprocessor PC should be upgraded only to MPS Multiprocessor PC. Advanced Configuration and Power Interface (ACPI) PC and ACPI Uniprocessor PC should be upgraded only to ACPI Multiprocessor PC.

Objective(s):

306. Monitor and configure multiprocessor computers.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Uniprocessor PC.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer that supports dual processors. However, only one processor is currently installed. Rodney asks you to install a second processor to increase his computer’s performance.

You install a second processor and reboot the computer. However, performance does not appear to increase. You open Device Manager and expand the Computer node. You see a driver called MPS Uniprocessor PC. You open Task Manager and select the CPU tab. You only see a single CPU usage chart.

You want to configure Rodney’s computer to use both processors. What should you do?

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Uniprocessor PC.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select MPS Multiprocessor PC.

nmlkj Update the MPS Uniprocessor PC driver to ACPI Multiprocessor PC.

nmlkji Update the MPS Uniprocessor PC driver to MPS Multiprocessor PC.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Multiprocessor PC.

nmlkj Open Task Manager and configure processor affinity for Rodney’s applications.

Hacked by Piratez 70-270

Page 163: 70 270 q & a

[306 #270]

Explanation:

Apparently, during the upgrade process from Windows NT 4.0 to Windows XP Professional, the Hardware Abstraction Layer (HAL) changed to a single processor HAL. Use Device Manager to update the HAL from one that uses a single processor to one that uses multiple processors. It is important that you upgrade to the correct computer model type. Standard PC and MPS Uniprocessor PC should be upgraded only to MPS Multiprocessor PC. Advanced Configuration and Power Interface (ACPI) PC and ACPI Uniprocessor PC should be upgraded only to ACPI Multiprocessor PC.

Objective(s):

306. Monitor and configure multiprocessor computers.

Reference(s):

TestOut for Windows XP Administration, Section 2.3

[306 #280]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows NT 4.0 computer that uses dual processors. You upgrade Rodney’s computer to Windows XP Professional. However, after the upgrade, performance of Rodney’s computer decreases dramatically.

You open Device Manager and expand the Computer node. You see a driver called MPS Uniprocessor PC. You open Task Manager and select the CPU tab. You only see a single CPU usage chart.

You want to configure Rodney’s computer to use both processors. What should you do?

nmlkj Update the MPS Uniprocessor PC driver to ACPI Multiprocessor PC.

nmlkj Open Task Manager and configure processor affinity for Rodney’s applications.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Multiprocessor PC.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Uniprocessor PC.

nmlkji Update the MPS Uniprocessor PC driver to MPS Multiprocessor PC.

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select MPS Multiprocessor PC.

You are the desktop administrator for your company. Rodney, a user in the research department, uses an ACPI-based Windows 2000 computer with dual processors. You install a clean copy of Windows XP on Rodney's computer.

After the installation, Rodney boots to Windows XP and notices that Windows XP performs much more slowly than Windows 2000. You open Device Manager and expand the Computer node. You see a driver called MPS Uniprocessor PC. You open Task Manager and select the CPU tab. You only see a single CPU usage chart. Rodney did not experience any problems related to ACPI in Windows 2000.

You want to force Rodney’s computer to use ACPI when booted to Windows XP. You also want to ensure that Windows XP uses both processors. What should you do?

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Uniprocessor PC.

nmlkj Update the MPS Uniprocessor PC driver to ACPI Multiprocessor PC.

Hacked by Piratez 70-270

Page 164: 70 270 q & a

Explanation:

The Windows XP setup program attempts to detect whether a computer is ACPI-compliant and uses a good ACPI BIOS. If an ACPI BIOS is not on the known good ACPI BIOS list, setup might not install an ACPI HAL. If Windows setup does not install the correct HAL, you need to force setup to use a specific HAL. Do this by pressing F5 and choosing from the list of HALs (you can also use this procedure to install a third-party HAL).

If setup had installed an ACPI HAL rather than an MPS HAL, you could use Device Manager to update the HAL to an ACPI Multiprocessor PC HAL. However, because a non-ACPI HAL was installed, you need to rerun the setup.

Reference(s):

TestOut for Windows XP Administration, Section 10.2

[306 #315]

k p p p

nmlkjBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select MPS Multiprocessor PC.

nmlkj Open Task Manager and configure processor affinity for Rodney’s applications.

nmlkj Update the MPS Uniprocessor PC driver to MPS Multiprocessor PC.

nmlkjiBoot to the Windows XP Professional installation CD-ROM. Press F5 during setup and select ACPI Multiprocessor PC.

Hacked by Piratez 70-270

Page 165: 70 270 q & a

400

Monitoring and Optimizing

System Performance

and Reliability

Page 166: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

By default, all 16-bit Windows programs run in the same NT virtual DOS machine (NTVDM) process. By configuring a 16-bit Windows program to run in a separate memory space, it runs in its own NTVDM process. Configuring processor affinity for each NTVDM process is an unnecessary step and decreases flexibility. The computer’s HAL already appears to be a multiprocessor HAL because the 32-bit programs have increased in performance.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #260]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer that supports dual processors. You recently installed a second processor in Rodney’s computer. Rodney reports that his 32-bit programs run much faster, but his 16-bit programs do not run any faster. In fact, when Rodney runs several 16-bit programs, performance of his 32-bit programs also decrease.

You open several 16-bit Windows programs on Rodney’s computer. You then open Task Manager and view the CPU usage statistics. The statistics indicate that Rodney’s first CPU is being used heavily and his second CPU is not being used much at all.

You want to distribute the processing load of Rodney’s 16-bit programs over both CPUs. What should you do?

nmlkj In Device Manager, update Rodney’s HAL to a multiprocessor HAL.

nmlkjOpen the properties of each 16-bit program. In the Advanced Properties dialog, enable the Run in separate memory space option. Then in Task Manager configure processor affinity for each NTVDM process.

nmlkj Open the properties of each 16-bit program. Configure each program to run in compatibility mode.

nmlkjiOpen the properties of each 16-bit program. In the Advanced Properties dialog, enable the Run in separate memory space option.

nmlkjIn Task Manager, select the Processes tab. Make sure the Show 16-bit tasks option is enabled. Then configure processor affinity for each 16-bit process.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer that supports dual processors. You recently installed a second processor in Rodney’s computer. Rodney reports that his 32-bit programs run much faster, but his 16-bit programs do not run any faster. In fact, when Rodney runs several 16-bit programs, performance of his 32-bit programs also decreases.

You want to create a log file that contains data about the performance of each individual 16-bit Windows program. What should you do?

nmlkj Open the properties of each 16-bit program. Configure each program to run in compatibility mode.

nmlkjiOpen the properties of each 16-bit program. In the Advanced Properties dialog, enable the Run in separate memory space option.

nmlkj In Device Manager, update Rodney’s HAL to a multiprocessor HAL.

nmlkj In Task Manager, select the Processes tab. Make sure the Show 16-bit tasks option is enabled.

Page 167: 70 270 q & a

Explanation:

By default, all 16-bit Windows programs run in the same NT virtual DOS machine (NTVDM) process. Therefore, when you monitor the NTVDM process, you are monitoring all 16-bit Windows programs. By configuring a 16-bit Windows program to run in a separate memory space, it runs in its own NTVDM process, which can be monitored individually.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #269]

Explanation:

The realtime priority setting for a process will allocate any resources and process requests immediately, superceding all others. If you want to run the processes simultaneously, reduce the priority for P1.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #277]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer that uses dual processors. Rodney runs two important processes on his computer: P1 and P2.

Rodney configures P1 to run with realtime priority. P1 has 12 threads. Rodney leaves the configuration of P2 to run with normal priority. P2 has 1 thread. When Rodney runs both processes, P2 always times out. When he pauses or stops P1, P2 runs fine.

You want to let P2 run without timing out. What should you do?

nmlkji Decrease the priority for P1.

nmlkj Configure processor affinity for P2 to the second processor.

nmlkj Decrease the simultaneous thread setting for P1.

nmlkj Run P1 and P2 on separate computers or at separate times.

You are the desktop administrator for your company. Greg is a graphic artist who uses a Windows XP Professional computer to render complex animations. Greg wants to run the animation rendering process and continue working on tasks in other programs. Greg complains that when the animation program is running, other programs run slowly.

You want to minimize the negative effect that the animation rendering program has on other programs. What should you do?

Hacked by Piratez 70-270

Page 168: 70 270 q & a

Explanation:

To minimize performance impact on other programs, configure the animation program to run with a Low priority. The valid priority levels (from highest to lowest) are as follows:

Realtime High AboveNormal Normal BelowNormal Low

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #285]

Explanation:

The Disk Defragmenter utility rearranges files so that they are stored contiguously on the disk.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

nmlkj Set the priority of the animation program to Realtime.

nmlkj Set the priority of the animation program to BelowNormal.

nmlkji Set the priority of the animation program to Low.

nmlkj Set the priority of all programs except the animation program to High.

nmlkj Set the priority of all programs except the animation program to Realtime.

nmlkj Set the priority of the animation program to Normal.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney frequently accesses and updates files stored on his local computer. He notices that the larger the files, the longer it takes to access the files.

You suspect that the slowness in opening large files is related to the files being spread over the disk. You want to ensure that the data for Rodney’s files are stored sequentially on his computer’s hard disk. What should you do?

nmlkj Run Disk Administrator.

nmlkj Run Disk Management.

nmlkj Run Disk Cleanup.

nmlkji Run Disk Defragmenter.

Hacked by Piratez 70-270

Page 169: 70 270 q & a

[401 #295]

Explanation:

The best choice is to use the Pause Task Scheduler command. It is available on the Advanced menu in the Scheduled Tasks folder. When you are done installing the software, select Continue Task Scheduler. You can also disable each task individually by editing its properties, but this involves more work.

Removing the scheduled tasks will prevent the tasks from running, but you will have to recreate the tasks.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #303]

Explanation:

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You previously scheduled Disk Defragmenter and Windows Backup to run every Friday evening after 8:00 on Rodney’s computer.

You are planning to work late this Friday evening to install some software on Rodney’s computer and other research department computers. You do not want any scheduled tasks to run while you are installing the software. What should you do?

.

nmlkjIn the properties of the Disk Defragmenter and Windows Backup scheduled tasks, configure the Scheduled Task Completed settings.

nmlkjIn the advanced properties of the Disk Defragmenter and Windows Backup scheduled tasks, disable the Repeat Task setting.

nmlkji In the Scheduled Tasks folder, use the Pause Task Scheduler command.

nmlkj In the Scheduled Tasks folder, delete the Disk Defragmenter and Windows Backup scheduled tasks.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You previously scheduled Disk Defragmenter and Windows Backup to run every Friday evening after 8:00 on Rodney’s computer.

Rodney does not want his hard drive to be defragmented this Friday evening. What should you do?

nmlkj In the Scheduled Tasks folder, use the Pause Task Scheduler command.

nmlkjIn the properties of the Disk Defragmenter and Windows Backup scheduled tasks, configure the Scheduled Task Completed settings.

nmlkji Edit the properties of the Disk Defragmenter scheduled task and disable the task.

nmlkjIn the advanced properties of the Disk Defragmenter and Windows Backup scheduled tasks, disable the Repeat Task setting.

nmlkj In the Scheduled Tasks folder, delete the Disk Defragmenter and Windows Backup scheduled tasks.

Hacked by Piratez 70-270

Page 170: 70 270 q & a

You can disable tasks individually by editing their properties. You should do this rather than deleting the task. You also should not do anything that would cause the backup task not to complete, since the scenario did not indicate this as a requirement.

Removing the scheduled tasks will prevent the tasks from running, but you will have to recreate the tasks.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #311]

Explanation:

If you can't run any scheduled tasks on a computer, make sure the Task Scheduler service is started. This can be done with the Services applet in the Administrative Tools folder in the Control Panel.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #320]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You have configured a tape backup device on Rodney’s computer. You want to perform a weekly backup of Rodney’s computer.

You create a scheduled task that performs a weekly backup using Windows Backup. The task is scheduled to run every Friday evening after 8:00. The Monday morning after you configure the scheduled task, you go to Rodney’s computer to verify the backup. Unfortunately, the scheduled task did not run. You create another simple task as a test and configure it to run in 2 minutes. The task does not run.

You want Rodney’s computer to be backed up using the scheduled task. What should you do?

nmlkj Make Rodney’s user account a member of the Power Users group.

nmlkj Configure the scheduled task to use an account that is a member of the Administrators local group.

nmlkj In the Scheduled Tasks folder, select the Notify Me of Missed Tasks action.

nmlkji Start the Task Scheduler service.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You have configured a tape backup device on Rodney’s computer.

You want to perform a weekly backup of Rodney’s computer. What should you do?

nmlkj Write a script that launches the backup program Put the script in the Startup folder

Hacked by Piratez 70-270

Page 171: 70 270 q & a

Explanation:

Scheduled Tasks can create jobs that run at regular intervals. You can schedule a task to run daily, weekly, monthly, or at some other specified time.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #328]

Explanation:

Task Scheduler lets you schedule programs to run automatically. To schedule a new task:

1. Open the Scheduled Tasks folder in the Control Panel. 2. Double-click Add Scheduled Task. 3. The Scheduled Task wizard guides you through the scheduling process.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #336]

nmlkj Write a script that launches the backup program. Put the script in the Startup folder.

nmlkj Create a weekly backup job and distribute it to Rodney’s computer using Group Policy.

nmlkji Add a weekly backup job to the Scheduled Tasks folder.

nmlkj Write a script that launches the backup program. Put a reference to the script in his user profile.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney creates and deletes many files on his computer. He also frequently installs and uninstalls software programs. Rodney has noticed that his computer has begun to open large files and programs more slowly than before.

You defragment Rodney’s hard disk. You want to automatically defragment Rodney’s computer once a month. What should you do?

nmlkj Put a shortcut to Msconfig in the Startup folder. Configure Msconfig to use a Selective Startup.

nmlkji Create a task using the Scheduled Task wizard to automatically run Disk Defragmenter once a month.

nmlkjWrite a batch file that runs Defrag.exe, then schedule the batch file to run once a month with the at command.

nmlkj Put a shortcut to Defrag.exe in the Startup folder.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney complains that his computer is running slowly. His computer is connected to

Hacked by Piratez 70-270

Page 172: 70 270 q & a

Explanation:

The CPU on this computer needs to be upgraded, or an additional CPU needs to be installed. Sustained processor activity over 85% may indicate a processor bottleneck. Also, even on a busy processor, the processor queue length should be less than 3. If System Monitor consistently reports these values, it is likely that a CPU bottleneck exists.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #344]

XP Professional computer. Rodney complains that his computer is running slowly. His computer is connected to an Ethernet network.

You collect the following performance information. These numbers represent an average taken over an entire workday.

PhysicalDisk/% Disk Time: 70%

Memory/Pages/sec: 10

Memory/Available Bytes: 6 MB

Network Segment/% Net Utilization: 18%

Processor/% Processor Time: 93%

System/Processor Queue Length: 4

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Search for a cause of network congestion.

nmlkj Upgrade the disk drive.

nmlkj Add more RAM.

nmlkj Upgrade the network card.

nmlkji Upgrade the CPU.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a dual-processor Windows XP Professional computer. Rodney complains that his computer is running slowly. His computer is connected to an Ethernet network.

You collect the following performance information. These numbers represent an average taken over an entire workday.

PhysicalDisk/% Disk Time: 68%

Memory/Pages/sec: 15

Memory/Available Bytes: 8 MB

Network Segment/% Net Utilization: 22%

Processor/% Processor Time: 87%

Hacked by Piratez 70-270

Page 173: 70 270 q & a

Explanation:

System\Processor Queue Length reports the total queue length for all processors. The optimal queue length can vary. On a busy system with Processor\ % Processor Time ranging between 80 to 90 percent, the queue length should be between one and three threads per processor. In this example, two to six is acceptable. On a system with less of a load on the CPU, 0 or 1 are good values for processor queue length. If the value exceeds these recommendations, there are more threads than the processor can service effectively. You may need to add more CPUs, or upgrade to faster CPUs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #353]

System/Processor Queue Length: 9

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Add more RAM.

nmlkj Search for a cause of network congestion.

nmlkj Upgrade the network card.

nmlkji Upgrade the CPUs.

nmlkj Upgrade the disk drive.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney complains that his computer is running slowly. His computer is connected to an Ethernet network.

You collect the following performance information. These numbers represent an average taken over an entire workday.

PhysicalDisk/% Disk Time: 92%

Memory/Pages/sec: 18

Memory/Available Bytes: 8 MB

Network Segment/% Net Utilization: 10%

Processor/% Processor Time: 72%

System/Processor Queue Length: 1

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Search for a cause of network congestion.

nmlkji Upgrade the disk drive.

nmlkj Add more RAM.

nmlkj Upgrade the CPU.

nmlkj Upgrade the network card.

Hacked by Piratez 70-270

Page 174: 70 270 q & a

Explanation:

This computer has a problem with the disk subsystem. Generally, % Disk Time should be less than 90 percent. If it is sustained at 90 percent or more, monitor the Physical Disk\Current Disk Queue Length counter to check the number of system requests that are waiting for disk access. This should not be more than 1.5 to 2 times the number of spindles making up the physical disk.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #362]

Explanation:

The Page Faults parameter was high, so adding more memory will help improve system performance. Page Faults/sec measures how often data was not in the process's working set. The parameter includes hard and soft page faults. A hard page fault occurs when the computer must read the required data from disk. A soft page fault occurs when the data is found elsewhere in memory. A high Page Faults/sec parameter is an indication of limited memory. In this situation, disk performance will improve with additional memory, because the amount of paging between memory and the hard drive will decrease.

Note: For a more accurate reading, monitor Page Faults/sec and Pages Input/sec to determine the proportion of hard page faults. (Pages Input/sec measures pages retrieved from disk to satisfy hard page faults.)

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #371]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney complains that his computer is running slowly. His computer is connected to an Ethernet network.

You run System Monitor and collect information for an hour. When you examine the performance information, you notice that the system disk usage is very high. You also notice that during the same time period, there seems to be a large number of Page Faults.

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Upgrade the network card.

nmlkj Upgrade the disk drive.

nmlkji Add more RAM.

nmlkj Create a stripe set on multiple physical disks.

nmlkj Upgrade the CPU.

Hacked by Piratez 70-270

Page 175: 70 270 q & a

Explanation:

Logical Disk counters are available by default in Windows XP. You no longer need to enable them by typing diskperf -yv or diskperf -y. Simply open System Monitor and add counters for the LogicalDisk performance object.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #380]

Explanation:

The current size of the paging file is less than the recommended size (1.5 times the total RAM). Of the options listed, the only one that fixes the paging file size would be to move it to Drive D: and increase its size. Reducing the paging file,

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You just installed a new Windows XP Professional computer for Rodney in the research department.

You want to establish baseline system performance statistics for Rodney’s computer. You want to make sure you can monitor statistics for drives C: and D: which exist on Disk 0. What should you do?

nmlkji Open System Monitor and add counters for the LogicalDisk performance object.

nmlkj Run the Diskperf program with the -yd switch.

nmlkj Activate the Disk Service to start automatically.

nmlkj Install the Disk Management MMC snap-in.

nmlkj Run the Diskperf program with the -yv switch.

nmlkj Open System Monitor and add counters for the PhysicalDisk performance object.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 1 GHz CPU, 512 MB of RAM, and three 40 GB hard disks, each with a single volume that uses the entire drive. Drive C: has 1.5 GB of free space, Drive D: has 18 GB of free space, and Drive E: has 9 GB of free space. The paging file is 512 MB in size, and is located on the C: drive. Windows XP Professional is installed to the C: drive. Rodney complains that his computer is running slowly.

You monitor Rodney’s computer and notice that CPU utilization varies between 2% and 100%, memory utilization varies from 30% to 100%, and page faults are high and remain high regardless of memory utilization.

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Move the paging file to Drive E: and reduce its size.

nmlkjAdd another hard disk, map it as a subfolder on Drive C:, move the paging file to the subfolder, and increase the size of the paging file.

nmlkj Keep the paging file on Drive C: and reduce its size.

nmlkji Move the paging file to Drive D: and increase its size.

Hacked by Piratez 70-270

Page 176: 70 270 q & a

whether located on Drive C: or Drive E:, will only increase page faults. You cannot configure the folder where the paging file resides.

Moving the paging file off any drives that are heavily used (such as the boot or system volumes) can also increase performance.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #390]

Explanation:

If a computer needs more than the minimum sized paging file when it starts, it will need to allocate the increased virtual memory each time it starts. You can improve performance by increasing the minimum paging file size, so the paging file is sized appropriately when the computer starts.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #398]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 1 GHz CPU, 256 MB of RAM, and a 40 GB hard disk. The hard disk has a single 20 GB partition with 20 GB unallocated space. Rodney’s computer has a paging file configured with a minimum size of 128 MB and a maximum size of 512 MB. Rodney complains that his computer pauses when it starts up.

You want to improve the performance of Rodney’s computer as it starts. What should you do?

nmlkj Increase the maximum size of the paging file.

nmlkji Increase the minimum size of the paging file.

nmlkj Create a second partition. Move the paging file to the new partition.

nmlkj Decrease the maximum size of the paging file.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 1 GHz CPU, 512 MB of RAM, and three 40 GB hard disks, each with a single volume that uses the entire drive. Drive C: has 1.5 GB of free space, Drive D: has 18 GB of free space, and Drive E: has 9 GB of free space. The paging file is 512 MB in size, and is located on the C: drive. Windows XP Professional is installed to the C: drive. Rodney complains that his computer is running slowly.

You monitor Rodney’s computer and notice that CPU utilization varies between 2% and 100%, memory utilization varies from 30% to 100%, and page faults are high and remain high regardless of memory utilization.

You want to improve the performance of Rodney’s computer. You also want to ensure that you can perform a

Hacked by Piratez 70-270

Page 177: 70 270 q & a

Explanation:

The current size of the paging file is less than the recommended size (1.5 times the total RAM). Also, you must have a paging file on the boot volume (the drive where the Windows operating system files reside) to accommodate a memory dump. Of the options listed, the only one that meets both requirements is to keep the paging file on Drive C:, free up disk space, and increase the paging file size. Reducing the paging file, whether located on Drive C: or Drive E:, will only increase page faults. You cannot configure the folder where the paging file resides.

Moving the paging file off any drives that are heavily used (such as the boot or system volumes) can also increase performance. The optimal solution in this scenario would be to keep a paging file on the boot volume and create another paging file on a volume that is less frequently accessed.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #406]

Explanation:

You need to defragment this computer’s hard drive. Adding RAM is unnecessary, because there is no sustained high level of page faults. Replacing the drive with a larger one would not directly solve the problem. Neither would replacing the drive and

p p y p y pcomplete memory dump in the event of a STOP error. What should you do?

nmlkj Move the paging file to Drive D: and increase its size.

nmlkjAdd another hard disk, map it as a subfolder on Drive C:, move the paging file to the subfolder, and increase the size of the paging file.

nmlkj Keep the paging file on Drive C: and reduce its size.

nmlkj Move the paging file to Drive E: and reduce its size.

nmlkji Keep the paging file on Drive C:, free up disk space, and increase the paging file size.

You are the desktop administrator for your company. Rodney, a user in the research department, reports that his workstation has slowed down over time. Rodney’s computer is a Windows XP Professional system. It has an 800 MHz processor with 512 MB of RAM and a 20 GB hard disk formatted as a single NTFS volume. You have kept the system continually updated and patched as each service pack and hotfix has been made available over the last year and a half.

You review the event logs and do not see anything out of the ordinary. You monitor the system and find that CPU utilization varies between 5% and 100%, memory utilization is between 20% and 80%, and page faults are low but hard drive access remains high. You check the drive and find it to have 25% free space.

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Replace the hard drive with a larger one.

nmlkji Defragment the hard drive.

nmlkj Add RAM to the system.

nmlkj Replace the hard drive and controller with faster versions.

Hacked by Piratez 70-270

Page 178: 70 270 q & a

controller with faster versions.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #415]

Explanation:

Windows XP uses hard drive space to simulate RAM. This is called virtual memory and is stored in virtual memory paging files named Pagefile.sys. By default, the paging file is 1.5 times the amount of RAM in the computer and is stored on the system drive.

To optimize virtual memory performance:

Divide the paging file between multiple drives. Remove the paging file from slow or heavily used drives. If possible, don't put the paging file on the same drive as the system files. Don't put multiple paging files on different partitions of one physical drive.

In this case, the paging file is divided between Disk 1 and Disk 2, and not placed on Disk 0 with the system files.

You may want to leave a minimal paging file on the boot volume. Windows XP requires at least a 2 MB file on the boot volume (the volume where the Windows system files reside) to write events to the system log, send administrative alerts, or automatically restart after a STOP error. If you want to dump memory to the paging file after a STOP error, you need at least the amount of RAM plus 1 MB.

To configure the virtual memory paging file:

1. Open the System applet in Control Panel, then click the Advanced tab 2. Click the Settings button under the Performance section. 3. Click the Advanced button and click the Change button under the Virtual Memory section. 4. Configure the virtual memory settings for each drive. If you decrease the maximum or minimum page file size, restart

your computer for the change to take effect.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 1 GHz CPU, 512 MB of RAM, and three 40 GB hard disks. Disk 0 has a single volume (Drive C:) that uses the entire drive. Disk 1 has two volumes (Drives D: and E:). Disk 2 also has two volumes (Drives F: and G:). Windows XP Professional is installed to the C: drive. Rodney’s applications are also installed on Drive C:. Rodney’s stores data on his remaining drives. Each drive has approximately 10 GB free disk space.

You want to optimize virtual memory performance on Rodney’s computer. What should you do?

nmlkj Configure paging files on drives D:, F:, and G:.

nmlkj Configure paging files on drives D:, E:, and F:.

nmlkj Configure paging files on drives D: and E:.

nmlkji Configure paging files on drives D: and F:.

Hacked by Piratez 70-270

Page 179: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #423]

Explanation:

Windows XP provides a variety of visual effects that can affect performance. In this scenario, performance is degraded by the translucent selection rectangle that appears when users click and drag to select multiple icons. To customize the visual effects that Windows XP uses, open the System applet in the Control Panel. On the Advanced tab, click the Settings button under the Performance section. Then enable or disable specific visual effects on the Visual Effects tab.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #431]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 400 MHz CPU, 256 MB of RAM, and a 40 GB hard disk configured with a single volume. Rodney complains that his computer performs slowly when he clicks and drags to select multiple files and folders in Windows Explorer.

You want to improve the performance of Rodney’s computer. What should you do?

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Show shadows under mouse pointer option.

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Show window contents while dragging option.

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Use a background image for each folder type option.

nmlkjiOpen the System applet in the Control Panel and configure performance options. Clear the Show translucent selection rectangle option.

You are the desktop administrator for your company. You are in the process of upgrading computers in the research department from Windows 2000 to Windows XP Professional. Rodney is a user in the research department. You recently upgraded Rodney’s computer. Now Rodney complains that one of his 32-bit programs does not display correctly.

Users of other Windows XP Professional computers experience the same error when running the program. However, when the program is run on Windows 2000 or when other 32-bit programs are run, the problem does not occur.

You want to configure the program to run correctly on Rodney’s computer and other Windows XP Professional computers. What should you do?

nmlkj Roll back to the previous video driver.

nmlkj Run the program from a network drive.

Hacked by Piratez 70-270

Page 180: 70 270 q & a

Explanation:

You can configure local programs running in Windows XP Professional to run in compatibility mode. Compatibility mode applies a predefined set of modifications that changes the operating system’s behavior to more closely emulate a previous version of Windows. You can also configure the program to run in 256 colors, 640 x 480 screen resolution, or disable themes.

PIF files are only applicable to 16-bit programs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #439]

Explanation:

Windows 2000 Professional computers do not provide a compatibility mode. The only possible solution that relates to all computers is to change the screen resolution and color depth. On Windows XP computers, you can do this on a per-program basis using compatibility mode.

PIF files are only applicable to 16-bit programs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #447]

nmlkj Configure a PIF file for the program.

nmlkji Configure the program to run in compatibility mode.

You are the desktop administrator for your company. Originally, all computers in the research department ran Windows NT 4.0 Workstation. You upgrade some computers in the research department to Windows 2000 and other computers in the research department to Windows XP Professional. After you upgrade the computers, all users complain that a particular 32-bit program does not display correctly.

You want to configure the program to run correctly on all research department computers. What should you do?

nmlkj Configure the program to run in 256 colors and 640 x 480 screen resolution on all computers.

nmlkj Configure a PIF file for the program.

nmlkj Roll back to the previous video driver.

nmlkj Run the program from a network drive.

nmlkji Change the screen resolution and color depth on all computers.

nmlkj Configure the program to run in compatibility mode on all computers.

Hacked by Piratez 70-270

Page 181: 70 270 q & a

Explanation:

Windows 2000 Professional computers do not provide a compatibility mode. The only possible solution that relates to all computers is to acquire and install an updated version of the program that is more compatible with Windows 2000 and XP. You might also want to make sure the video driver is up-to-date.

PIF files are only applicable to 16-bit programs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #457]

You are the desktop administrator for your company. Originally, all computers in the research department ran Windows NT 4.0 Workstation. You upgrade some computers in the research department to Windows 2000 and other computers in the research department to Windows XP Professional. After the upgrade, all users complain that a particular 32-bit program does not display correctly.

You want to configure the program to run correctly on all research department computers. What should you do?

nmlkj Run the program from a network drive.

nmlkj Configure the program to run in 256 colors and 640 x 480 screen resolution on all computers.

nmlkji Install an updated version of the program.

nmlkj Roll back to the previous video driver.

nmlkj Configure a PIF file for the program.

nmlkj Configure the program to run in compatibility mode on all computers.

You are the desktop administrator for your company. You are in the process of upgrading computers in the research department from Windows 2000 to Windows XP Professional. Rodney is a user in the research department. You recently upgraded Rodney’s computer. Now Rodney complains that one of his 32-bit programs does not display correctly.

Users of other Windows XP Professional computers experience the same error when running the program. However, when the program is run on Windows 2000 or when other 32-bit programs are run, the problem does not occur. You attempt to configure the program to run in compatibility mode, but the desired setting is disabled.

You want to configure the program to run correctly on Rodney’s computer and other Windows XP Professional computers. What should you do?

nmlkj Configure a PIF file for the program.

nmlkji Install the program locally to each Windows XP Professional computer.

nmlkj Run the program from a network drive.

nmlkj Roll back to the previous video driver.

Hacked by Piratez 70-270

Page 182: 70 270 q & a

Explanation:

Compatibility mode is only available on local programs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #467]

Explanation:

First, Microsoft recommends using 128 MB of RAM on a Windows XP Professional computer. Therefore, you should expect that adding more RAM will improve the performance of this computer.

The Performance tab in Task Manager shows some basic measures of system performance. Physical memory lists the total amount of memory in your system, and the amount of available memory. Commit memory lists the memory allocated to programs and the operating system. Because Windows XP uses virtual memory, this may exceed the amount of physical memory in the computer. In this case, it is likely that the amount of committed memory greatly exceeds the amount of physical memory. It is usually okay for some virtual memory to be used, but it should not be used excessively.

You can also monitor various performance statistics using System Monitor. A page fault indicates that a program could not find the necessary piece of data in its working set of memory. Although high page faults per second could possibly indicate a memory shortage, necessary pages of memory can be retrieved from other parts of physical memory or from virtual memory. Therefore, the Page Faults/sec statistic by itself does not indicate insufficient physical memory.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #475]

You are the administrator of your company's network. The network has 75 Windows XP Professional computers. Each computer has 64 MB of RAM. A user named Sally in the sales department reports that her computer performs poorly when she runs multiple programs. You suspect that her computer's RAM is insufficient.

You want to find out whether adding more RAM would improve the performance of Sally’s computer. You start the programs Sally typically runs simultaneously. What should you do next?

nmlkj Use System Monitor to see if the Memory/Page Faults/sec counter consistently exceeds 50.

nmlkj Use System Monitor to see if the Processor/%ProcessorTime counter consistently exceeds 50.

nmlkj Use Task Manager to see if memory usage exceeds 64 MB.

nmlkji Use Task Manager to see if the peak commit charge exceeds 64 MB.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You have configured a tape backup device on Rodney’s computer. You want to perform a weekly backup of Rodney’s computer.

Hacked by Piratez 70-270

Page 183: 70 270 q & a

Explanation:

If the tasks don't run, then the Task Scheduler service may not be running. Normally, the Task Scheduler service will already be configured to log on as the local system account and to start automatically. If it is not, you should configure it so.

Although scheduled tasks might not run properly due to insufficient permissions, this does not seem to be the problem in this scenario because even the simple test task you scheduled does not run.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #483]

Explanation:

Scheduled tasks run under the security context of a particular user. In this case, the task should be running as if you were logged on to the network, so you need to configure the task to run using your Active Directory user account. Open the properties for the task and enter your account information in the Run as box.

perform a weekly backup of Rodney s computer.

You create a scheduled task that performs a weekly backup using Windows Backup. The task is scheduled to run every Friday evening after 8:00. The Monday morning after you configure the scheduled task, you go to Rodney’s computer to verify the back up. Unfortunately, the scheduled task did not run. You create another simple task as a test and configure it to run in 2 minutes. The task does not run and you receive no notifications.

You want Rodney’s computer to be backed up using the scheduled task. What should you do?

nmlkj Configure the Task Scheduler service to run under the Administrator account.

nmlkj Enable the Messenger service.

nmlkji Configure the Task Scheduler service to run under the local system account and to start automatically.

nmlkj Configure the weekly backup task to run under the Administrator account.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. You log on to your computer using the local Administrator account and create a new scheduled task. The task performs administrative actions on other computers. You notice that the task does not complete the necessary actions.

You verify that your other scheduled tasks are working correctly. You log on to the network and manually run the problematic task. It appears to work fine.

You want the new task to run automatically and perform correctly as scheduled. What should you do?

nmlkji Use Scheduled Tasks to configure the new task to run using your Active Directory user account.

nmlkjUse Computer Management to start the Task Scheduler service. Configure the Task Scheduler service to start automatically.

nmlkjUse Computer Management to start the Messenger service. Configure the Messenger service to start automatically.

nmlkj Configure the Task Scheduler service to run using your local Administrator account and password.

Hacked by Piratez 70-270

Page 184: 70 270 q & a

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #491]

Explanation:

Scheduled tasks run under the security context of a particular user. In this case, you can manually perform the backup when you are logged on using your administrative user account, but the task does not run properly because it is run using Rodney’s user account. Rodney must not be a member of the Backup Operators group. Open the properties for the task and enter your administrative account information in the Run as box. Another solution would be to make Rodney’s user account a member of the Backup Operators group (or the Administrators group).

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #499]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. You have configured a tape backup device on Rodney’s computer. You want to perform a weekly backup of Rodney’s computer.

You create a scheduled task that performs a weekly backup using Windows Backup. The task is scheduled to run every Friday evening after 8:00 and to run using Rodney’s user account. The Monday morning after you configure the scheduled task, you go to Rodney’s computer, log on using your administrative account, and verify the backup. Unfortunately, the backup was not completed as scheduled. You manually perform a backup successfully.

You want the backup to be performed as scheduled. What should you do?

nmlkj Add your administrative user account as a member of the Backup Operators local group.

nmlkji Schedule the task to run using your administrative user account.

nmlkj Take ownership of the scheduled task.

nmlkj Log on as Rodney and recreate the scheduled task.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney’s computer has a 400 MHz CPU, 256 MB of RAM, and a 40 GB hard disk configured with a single volume. Rodney complains that his computer performs slowly when he drags multiple selected files and folders in Windows Explorer.

You want to improve the performance of Rodney’s computer. What should you do?

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Show shadows under mouse pointer option.

Hacked by Piratez 70-270

Page 185: 70 270 q & a

Explanation:

Windows XP provides a variety of visual effects that can affect performance. In this scenario, performance is degraded by showing the contents of items being dragged. To customize the visual effects that Windows XP uses, open the System applet in the Control Panel. On the Advanced tab, click the Settings button under the Performance section. Then enable or disable specific visual effects on the Visual Effects tab.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #507]

Explanation:

The paging file size is adequate (it is recommended to be at least 1.5 times the amount of physical RAM). There is still physical RAM available to be used, and the total committed memory (Commit Charge Total) is a small portion of the total available to commit (Commit Charge Limit). However, the CPU is at 89% utilization. Rodney must be running some

p

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Show translucent selection rectangle option.

nmlkjiOpen the System applet in the Control Panel and configure performance options. Clear the Show window contents while dragging option.

nmlkjOpen the System applet in the Control Panel and configure performance options. Clear the Use a background image for each folder type option.

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. His computer has a 1.8 GHz Pentium 4 computer with 512 MB RAM. Rodney complains that his computer is running slowly.

You open Task Manager and view the following statistics:

CPU Usage: 89%

PF Usage: 274 MB

Physical Memory (K) Total: 523276

Physical Memory (K) Available: 201616

Commit Charge (K) Total: 282276

Commit Charge (K) Limit: 1278024

You want to improve the performance of Rodney’s computer. What should you do?

nmlkj Upgrade the disk drive.

nmlkj Decrease the paging file size.

nmlkj Increase the paging file size.

nmlkj Add more RAM.

nmlkji Upgrade the CPU.

Hacked by Piratez 70-270

Page 186: 70 270 q & a

processor-intensive programs. An upgraded processor could improve his computer’s performance.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #515]

Explanation:

If you hold the Shift key down during the log on process, program shortcuts located in the Startup folder of your user account profile or the All Users profile will be skipped. Normally, such programs will be started automatically. Although you could boot in Safe mode to skip startup programs, there is not an option to boot in Safe mode once you reach the log on screen.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #524]

You are the desktop administrator for your company. Rodney, a user in the research department, uses a Windows XP Professional computer. Rodney has configured his computer to start several programs automatically when he (or any other user) logs on to it.

You need to perform administrative tasks on Rodney’s computer. You boot the computer and are ready to log on. However, to save time you do not want any programs to be automatically launched when you log on. What should you do?

nmlkj At the log on dialog, click the Options button. Configure the logon process to bypass startup programs.

nmlkj At the log on dialog, click the Options button. Select the option to log on in Safe mode.

nmlkji Hold down the Shift key during the log on process.

nmlkj Hold down the Esc key during the log on process.

You are the desktop administrator for your company. Rodney, a user in the research department, frequently runs 16-bit Windows applications. He is currently running two 16-bit Windows applications named App1.exe and App2.exe. The programs are configured to run using their default memory configuration. Rodney complains that both of his 16-bit programs have stopped responding. You open Task Manager.

You want to forcefully end App1.exe and App2.exe and the entire 16-bit Windows environment in which these programs are being run. What should you do?

nmlkj End the explorer.exe process.

nmlkji End the ntvdm process.

nmlkj End the App1.exe and App2.exe process trees.

Hacked by Piratez 70-270

Page 187: 70 270 q & a

Explanation:

By default, 16-bit Windows programs run in the same memory space. In other words, they run using the same NT virtual DOS machine (ntvdm). Because 16-bit Windows programs use cooperative multitasking, a malfunctioning 16-bit Windows program can cause all other 16-bit Windows programs running in the same memory space to hang. To forcefully end a virtual DOS machine as well as all programs running in it, end the ntvdm process. 16-bit Windows programs also use a process called wowexec (Windows on Windows) which emulates a Windows 3.x environment. Wowexec also runs in the NT virtual DOS machine.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #532]

Explanation:

To open Task Manager, press Ctrl+Alt+Del. If the computer is a member of a domain, you will then need to select the Task Manager button.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #541]

nmlkj End the wowexec.exe process.

nmlkj End the App1.exe and App2.exe processes.

You are the desktop administrator for your company. Rodney, a user in the research department, frequently runs 16-bit Windows applications. He is currently running two 16-bit Windows applications named App1.exe and App2.exe. The programs are configured to run using their default memory configuration. Rodney complains that both of his 16-bit programs have stopped responding.

You want to open Task Manager so you can forcefully end App1.exe and App2.exe. What should you do?

nmlkji Press Ctrl+Alt+Del.

nmlkj Open the Add or Remove Programs applet in the Control Panel.

nmlkj Open Computer Management.

nmlkj Open the System applet in the Control Panel.

nmlkj Press Esc.

You are the desktop administrator for your company. Rodney is a user in the research department. Rodney’s computer has come close to running out of disk space on multiple occasions. You want Disk Cleanup to run automatically when a low disk space condition is detected. What should you do?

Hacked by Piratez 70-270

Page 188: 70 270 q & a

Explanation:

Eventtriggers.exe is a command-line tool that you can use to view, set, or delete trigger events. You can create triggers that run other programs.

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.2

[401 #550]

Explanation:

Tasklist.exe is a command-line tool that lists all the processes running on a computer (similar to the list displayed in Task Manager).

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #558]

nmlkj Execute a taskmon command.

nmlkj Execute an alert command.

nmlkji Execute an eventtriggers command.

nmlkj Execute a log command.

You are the desktop administrator for your company. Rodney, a user in the research department, is currently running two 32-bit Windows applications named App1.exe and App2.exe. Rodney complains that both of his programs have stopped responding.

You want to view the list of processes running on Rodney’s computer. What should you do?

nmlkj Execute the tslist command.

nmlkji Execute the tasklist command.

nmlkj Execute the systeminfo command.

nmlkj Open the Add or Remove Programs applet in the Control Panel.

nmlkj Open the System applet in the Control Panel.

You are the desktop administrator for your company. Rodney is a user in the research department. He is currently running two 32-bit Windows applications named App1 exe and App2 exe Rodney complains that App1 exe has

Hacked by Piratez 70-270

Page 189: 70 270 q & a

Explanation:

Tskill.exe is a command-line tool that ends a process running on a computer (similar to ending a process from Task Manager).

Objective(s):

401. Monitor, optimize, and troubleshoot performance of the Windows XP Professional desktop.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[401 #567]

Explanation:

Create one hardware profile for work and one for away from work. Each profile stores hardware configuration information. In this situation, simply create a network-disabled profile and instruct the CEO to use it when not connected to the network.

Use the System applet in the Control Panel to create hardware profiles. Use Device Manager to configure the profiles. When you configure a hardware profile, you should then tell Windows which devices it should enable and turn on as the computer starts under each profile. You must log on as an administrator of the local computer to create, copy, rename, or delete hardware profiles. To create and configure a new hardware profile:

running two 32 bit Windows applications named App1.exe and App2.exe. Rodney complains that App1.exe has stopped responding.

You want to end App1.exe without affecting App2.exe. What should you do?

nmlkj Execute the taskkill command.

nmlkji Execute the tskill command.

nmlkj Open the Add or Remove Programs applet in the Control Panel.

nmlkj Open the System applet in the Control Panel.

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. When the CEO puts the laptop in the docking station at work, the computer starts correctly and connects to the network. However, when the CEO starts the laptop at home or on the road when no network is present, a message appears stating, "One or more services failed to start. See the Event Viewer for details."

You want to prevent this message from appearing when the CEO starts the laptop computer away from the office. What should you do? (Choose three. Each correct choice is part of the solution.)

gfedc Copy the default user profile and name it Away.

gfedcb Copy the current hardware profile and name it Away.

gfedcb Disable the network card’s driver in the Away profile.

gfedc Create a roaming user profile and name it Away.

gfedc Disable the network card’s driver in the current profile.

gfedc Disable the network card’s driver in the default user profile.

gfedcb Instruct the CEO to use the Away profile when the laptop is not connected to the network.

Hacked by Piratez 70-270

Page 190: 70 270 q & a

1. Open the System applet in the Control Panel. 2. Click the Hardware tab, then click Hardware Profiles. 3. Select a profile from the Available Hardware Profiles list, then click Copy. 4. Type a name for the new profile. 5. Restart the computer using the new profile. 6. Open the Device Manager and modify the configuration settings for the new hardware profile by enabling or disabling

devices for the profile.

You might also need to disable services (such as network clients) that rely on the network from starting in the Away profile:

1. Open the Services applet from the Administrative Tools folder in the Control Panel. 2. Right-click the service you want to manage and select Properties. 3. On the Log On tab, select the applicable hardware profile and click Disable.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

TestOut for Windows XP Administration, Section 2.4

[402 #260]

Explanation:

You can create multiple hardware profiles, each of which enables or disables certain drivers. Use the System applet in the Control Panel to create hardware profiles. Use Device Manager to configure the profiles. When you configure a hardware profile, you should then tell Windows which devices it should enable and turn on as the computer starts under each profile. You must log on as an administrator of the local computer to create, copy, rename, or delete hardware profiles. To create and configure a new hardware profile:

1. Open the System applet in the Control Panel. 2. Click the Hardware tab, then click Hardware Profiles. 3. Select a profile from the Available Hardware Profiles list, then click Copy. 4. Type a name for the new profile. 5. Restart the computer using the new profile. 6. Open the Device Manager and modify the configuration settings for the new hardware profile by enabling or disabling

devices for the profile.

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. When at the office, the CEO uses an AC power adapter. After installing Windows XP, the CEO complains that the computer loses battery power quickly when it is not plugged into the AC power adapter. The laptop has an internal network card that the CEO only uses when at the office.

You want to prevent the network card from being used when the CEO is not at the office. You hope that this will help conserve battery power. What should you do? (Choose three. Each correct choice is part of the solution.)

gfedcb Instruct the CEO to use the Away profile when the laptop is not connected to the network.

gfedc Create a roaming user profile and name it Away.

gfedc Disable the network card’s driver in the current profile.

gfedcb Copy the current hardware profile and name it Away.

gfedcb Disable the network card’s driver in the Away profile.

gfedc Copy the default user profile and name it Away.

gfedc Disable the network card’s driver in the default user profile.

Hacked by Piratez 70-270

Page 191: 70 270 q & a

In this scenario, you would configure the new hardware profile to disable the network card. After configuring the new hardware profile, instruct the CEO to use it when not connected to the network.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

TestOut for Windows XP Administration, Section 2.4

[402 #271]

Explanation:

If you have multiple hardware profiles, you can configure the first profile in the list to load automatically after a certain number of seconds:

1. Open the System applet in the Control Panel. 2. Click the Hardware tab, then click Hardware Profiles. 3. Order the hardware profiles so the desired default profile is first in the list. 4. For the When Windows starts: option, select Select the first profile listed if I don’t select a profile in a number

seconds and configure a value for a number.

F8 is used to show startup options but not hardware profiles. The Spacebar shows the list of hardware profiles if the list is configured to not be shown.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. The CEO frequently travels to branch offices. While at branch offices, the CEO often connects the laptop to the branch office network using the laptop’s internal network card. When traveling to other locations besides branch offices, the CEO occasionally connects to the Internet through the laptop’s internal modem.

You create two profiles. One profile is named Branch, and it disables the modem. The other profile is named Dialup, and it disables the network card. After you configure the profiles, the CEO complains of always needing to choose a profile.

You want the Branch profile to load by default if the CEO does not pick a different profile within 5 seconds. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Edit the properties of the Branch and Dialup profiles and select This is a portable computer.

gfedc Instruct the CEO to press the F8 key when the computer boots.

gfedc Move the Dialup profile to the top of the profile list.

gfedcEdit the properties of the Branch and Dialup profiles and select Always include this profile as an option when Windows starts.

gfedcb Configure a profile to be automatically selected in 5 seconds.

gfedc Instruct the CEO to press the Spacebar when the computer boots.

gfedcb Move the Branch profile to the top of the profile list.

gfedc Instruct the CEO to press the Shift key when the computer boots.

Hacked by Piratez 70-270

Page 192: 70 270 q & a

TestOut for Windows XP Administration, Section 2.4

[402 #282]

Explanation:

If you have multiple hardware profiles, you can configure the first profile in the list to load automatically after a certain number of seconds:

1. Open the System applet in the Control Panel. 2. Click the Hardware tab, then click Hardware Profiles. 3. Order the hardware profiles so the desired default profile is first in the list. 4. For the When Windows starts: option, select Select the first profile listed if I don’t select a profile in a number

seconds and configure a value for a number.

If you configure the default profile to load in 0 seconds, the list of profiles will not be shown during the boot process.

F8 is used to show startup options but not hardware profiles. The Spacebar shows the list of hardware profiles if the list is configured to not be shown.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

TestOut for Windows XP Administration, Section 2.4

[402 #294]

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. The CEO frequently travels to branch offices. While at branch offices, the CEO often connects the laptop to the branch office network using the laptop’s internal network card. When traveling to other locations besides branch offices, the CEO occasionally connects to the Internet through the laptop’s internal modem.

You create two profiles. One profile is named Branch, and it disables the modem. The other profile is named Dialup, and it disables the network card. After you configure the profiles, the CEO complains of always needing to choose a profile.

You want the Branch profile to load by default without showing the list of profiles. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Edit the properties of the Branch and Dialup profiles and select This is a portable computer.

gfedcb Move the Branch profile to the top of the profile list.

gfedcEdit the properties of the Branch and Dialup profiles and select Always include this profile as an option when Windows starts.

gfedc Instruct the CEO to press the F8 key when the computer boots.

gfedcb Configure a profile to be automatically selected in 0 seconds.

gfedc Instruct the CEO to press the Spacebar when the computer boots.

gfedc Instruct the CEO to press the Shift key when the computer boots.

gfedc Move the Dialup profile to the top of the profile list.

Yo are the desktop administrator for o r compan Yo recentl installed Windo s XP Professional on the

Hacked by Piratez 70-270

Page 193: 70 270 q & a

Explanation:

If you have multiple hardware profiles, you can configure the first profile in the list to load automatically after a certain number of seconds. If you configure the default profile to load in 0 seconds, the list of profiles will not be shown during the boot process unless you press the Spacebar.

During the boot process, Windows eliminates hardware profiles in the profile list if it determines that it is not a usable profile (for example, if the profile requires a docking station, but the laptop is not docked). The Always include this profile as an option when Windows starts option forces the profile to be listed always.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

TestOut for Windows XP Administration, Section 2.4

[402 #306]

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. The CEO frequently travels to branch offices. While at branch offices, the CEO often connects the laptop to the branch office network using the laptop’s internal network card. When traveling to other locations besides branch offices, the CEO occasionally connects to the Internet through the laptop’s internal modem.

You create two profiles. One profile is named Branch, and it disables the modem. The other profile is named Dialup, and it disables the network card. You configure the Branch profile as the default profile. You also configure the list of profiles to not be shown by default. Later, the CEO complains that the Dialup profile is never available as an option when booting the laptop.

You want the CEO to have the option to choose the DialUp profile when necessary. What should you do?

nmlkj Move the Dialup profile to the top of the profile list.

nmlkj Edit the properties of the Branch and Dialup profiles and select the This is a portable computer setting.

nmlkj Instruct the CEO to press the Shift key when the computer boots.

nmlkj Instruct the CEO to press the F8 key when the computer boots.

nmlkjEdit the properties of the Dialup profile and select Always include this profile as an option when Windows starts.

nmlkji Instruct the CEO to press the Spacebar when the computer boots.

You are the desktop administrator for your company. You recently installed Windows XP Professional on the company CEO’s laptop computer. The CEO connects the laptop to a docking station when at the office. When traveling to other locations, the CEO occasionally connects to the Internet through the laptop’s internal modem.

You create two profiles. One profile is named Docked, and it disables the laptop’s modem and enables its network card. The other profile is named Undocked, and it enables the modem and disables the network card. Because the CEO travels so often, you configure the Undocked profile as the default profile. You also configure the list of profiles to not be shown by default.

One day, the CEO complains of trouble connecting the laptop to the docking station. As you troubleshoot the problem, the Undocked profile keeps loading. You display the list of profiles while loading, but the Docked profile is not listed. You want to force the Docked profile to load. What should you do?

nmlkj Press the F8 key when the computer boots.

Hacked by Piratez 70-270

Page 194: 70 270 q & a

Explanation:

If you have multiple hardware profiles, you can configure the first profile in the list to load automatically after a certain number of seconds. If you configure the default profile to load in 0 seconds, the list of profiles will not be shown during the boot process unless you press the Spacebar. In this case, you need to press the Spacebar when booting to show the list of hardware profiles, but the Docked profile is still not listed.

During the boot process, Windows eliminates hardware profiles in the profile list if it determines that it is not a usable profile (for example, if the profile requires a docking station, but the laptop is not docked). The Always include this profile as an option when Windows starts option forces the profile to be listed always.

Objective(s):

402. Manage, monitor, and optimize system performance for mobile users.

Reference(s):

TestOut for Windows XP Administration, Section 2.4

[402 #316]

Explanation:

To install the Recovery Console locally to a system, insert the Windows XP Professional CD-ROM and run

y

nmlkj Press the Shift key when the computer boots.

nmlkj Press the Spacebar when the computer boots.

nmlkjiEdit the properties of the Docked profile and select Always include this profile as an option when Windows starts.

nmlkj Edit the properties of the Undocked profile and enable the This is a portable computer setting.

nmlkj Edit the properties of the Docked profile and clear the This is a portable computer setting.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Jim, a user in the sales department, reports that his laptop computer no longer boots to Windows XP Professional.

You examine the computer and conclude that the master boot record has been corrupted by a virus. You reboot the computer and attempt to fix the master boot record, but you cannot open the Recovery Console. The option is not listed on the startup menu. You get a Windows XP Professional CD-ROM from the company’s fireproof safe and successfully fix the master boot record.

You want to ensure that you can open the Recovery Console in the future on Jim’s computer without using the Windows XP Professional CD-ROM. What should you do?

nmlkj Run Backup and create an ASR backup.

nmlkj Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

nmlkj Copy the i386 folder from the Windows XP Professional CD-ROM to the hard disk.

nmlkj Run Backup and create a backup of the System State data.

nmlkj Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

nmlkji Insert the Windows XP Professional CD-ROM and run winnt32 /cmdcons.

nmlkjInsert the Windows XP Professional CD and run the Recovery Console. Run enable cmdcons SERVICE_AUTO_START.

Hacked by Piratez 70-270

Page 195: 70 270 q & a

Winnt32 /cmdcons. This installation requires at least 7MB of free space.

The enable command in Recovery Console lets you enable a service and is not used to pre-install the Recovery Console itself. The Recovery Console files would be copied to the hard disk if you copy the i386 folder, but the Recovery Console would still not be available as a startup option. Booting to the Windows XP Professional CD-ROM and using the Repair option would start Recovery Console, but would not make it available as a startup option.

A backup of the System State data and an Automated System Recovery (ASR) backup are used for other disaster recovery purposes and do not have anything to do with installing the Recovery Console as a startup option. Pressing F2 while booting to the Windows XP Professional CD-ROM performs a restore of an Automated System Recovery (ASR) backup.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #260]

Explanation:

Booting to the Windows XP Professional CD-ROM and using the Repair option starts Recovery Console. You can then use the fixmbr command to fix the master boot record.

Running Winnt32 /cmdcons installs the Recovery Console as a startup option. The enable command in Recovery Console lets you enable a service and configure its startup method. Pressing F2 while booting to the Windows XP Professional CD-ROM performs a restore of an Automated System Recovery (ASR) backup. System restore points are automatically made when protected system files change. You can use System Restore to restore the system to a previous state or to manually create a system restore point.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Jim, a user in the sales department, reports that his laptop computer no longer boots to Windows XP Professional.

You examine the computer and conclude that the master boot record has been corrupted by a virus. You reboot the computer and attempt to fix the master boot record, but you cannot open the Recovery Console. The option is not listed on the startup menu. You get the company’s original Windows XP Professional CD-ROM from the company’s fireproof safe.

You want to open the Recovery Console and repair the master boot record. What should you do?

nmlkj Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

nmlkj Insert the Windows XP Professional CD-ROM and run winnt32 /cmdcons.

nmlkj Open System Restore and apply a system restore point.

nmlkjInsert the Windows XP Professional CD and run the Recovery Console. Run enable cmdcons SERVICE_AUTO_START.

nmlkji Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

Hacked by Piratez 70-270

Page 196: 70 270 q & a

TestOut for Windows XP Administration, Section 8.3

[403 #271]

Explanation:

Booting to the Windows XP Professional CD-ROM and using the Repair option starts Recovery Console. You can then use the fixmbr and fixboot commands to rewrite the master boot record and the volume boot sector.

Copying ntldr will not write a new master boot record or boot sector. There is no need to re-install the operating system. Pressing F2 while booting to the Windows XP Professional CD-ROM performs a restore of an Automated System Recovery (ASR) backup. This will not help, and an ASR backup does not exist anyway. The fdisk utility from Windows 98 will not fix a master boot record or boot sector corruption problem. In this scenario, it appears that the computer is already looking at the active partition and trying to load an operating system. Therefore, the problem is likely in the volume boot sector, which would be fixed by running fixboot.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #280]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Jim, a user in the sales department, reports that his laptop computer no longer boots to Windows XP Professional.

You boot Jim’s computer and receive a message stating "Invalid Disk or Operating System not found." You suspect that the boot environment of Jim’s computer has been damaged. You have not made an ASR backup of Jim’s computer. You get the company’s original Windows XP Professional CD-ROM from the company’s fireproof safe.

You want to repair the boot sector of Jim’s computer. What should you do?

nmlkji In Recovery Console, use the fixmbr and fixboot utilities.

nmlkj Obtain a Windows 98 boot disk and boot the system. Use the fdisk utility to make the boot volume active.

nmlkj Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

nmlkjBoot to the Windows XP Professional CD-ROM and install a new copy of the operating system over the previous copy.

nmlkj In Recovery Console, copy ntldr from a floppy disk to the system drive.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Jim, a user in the sales department, reports that his laptop computer no longer boots to Windows XP Professional. You have updated Jim’s computer several times in the past. After each update, you have verified that the laptop was in working order and created an automated system recovery backup.

You ask Jim if he has updated his laptop recently. He says no, but informs you that during a recent return flight from a sales event, the plane experienced some severe turbulence. The operating system immediately froze, and Jim has been unable to boot to Windows XP since that time.

You attempt to boot Jim’s computer in Safe mode. The operating system begins to load, but the boot process fails. You suspect that the jolt to the hard drive damaged some system files required for the computer to boot.

Y t t l ll t fil ith k d i Wh t h ld d ?

Hacked by Piratez 70-270

Page 197: 70 270 q & a

Explanation:

You can try to use an Automated System Recovery (ASR) backup to restore a computer if all other options fail. An ASR backup consists of a floppy disk and a backup medium (such as a tape). The floppy disk contains hard disk configuration data and the backup medium contains a copy of system files. ASR backups replace Emergency Repair Disks (ERDs) used in previous versions of Windows NT. To make an ASR backup, use the Automated System Recovery wizard in the Windows Backup program. You should make an ASR backup after every change to the system, such as installing drivers or updated system files. To restore an ASR backup, press F2 while booting to the Windows XP Professional CD-ROM. Insert the ASR backup floppy to begin the restore process.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #289]

You want to replace all system files with known good copies. What should you do?

nmlkj In Backup, run the Restore wizard.

nmlkji Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

nmlkj Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

nmlkj Open System Restore and apply a system restore point.

nmlkj Insert the Windows XP Professional CD-ROM and run winnt32 /cmdcons.

nmlkj In Backup, run the Automated System Recovery wizard.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Jim, a user in the sales department, reports that his laptop no longer boots to Windows XP. You have updated Jim’s computer several times in the past. After each update, you have verified that the laptop was in working order and created an ASR backup.

You ask Jim if he has updated his laptop recently. He says no, but informs you that during a recent return flight from a sales event, the plane experienced some severe turbulence. The operating system immediately froze, and Jim has been unable to boot to Windows XP since that time.

You attempt to boot Jim’s computer in Safe mode. The operating system begins to load, but the boot process fails. You suspect that the jolt to the hard drive damaged some system files required for the computer to boot. You retrieve the latest ASR backup, but you cannot locate the latest ASR floppy disk.

You want to use the ASR backup to replace all system files with known good copies. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

gfedcb Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

gfedc Run System Restore on another computer. Apply a system restore point.

gfedcbRun Backup on another computer. Run the Restore wizard and restore the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the ASR backup to a floppy disk.

gfedcRun Backup on another computer. Run the Automated System Recovery wizard and restore the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the ASR backup to a floppy disk.

gfedc Insert the Windows XP Professional CD-ROM and run winnt32 /cmdcons.

Hacked by Piratez 70-270

Page 198: 70 270 q & a

Explanation:

If you have made an Automated System Recovery (ASR) backup of a computer, you can use it to try to restore a computer if all other options fail. An ASR backup consists of a floppy disk and a backup medium (such as a tape or a backup file copied to a CD). The floppy disk contains hard disk configuration data and the backup medium contains a copy of system files. The files on the ASR floppy are also backed up to the ASR backup. They are named Asr.sif and Asrpnp.sif and are located in the %SystemRoot%\Repair folder. You can restore these files to a floppy disk by running the Windows Backup program from another computer and using the Restore wizard. To restore an ASR backup, press F2 while booting to the Windows XP Professional CD-ROM. Insert the ASR backup floppy to begin the restore process.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #299]

Explanation:

Backing up the C: drive will back up all the user data and operating system files on the computer. However, to be able to restore the operating system to its exact state, you also need to select the System State node to be backed up. Do not disable volume shadow copy or else open files will not be backed up. To be able to restore the backup from a single tape, you need to perform a Normal backup.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Each Windows XP Professional computer has a single NTFS volume (C: drive). You are responsible for regularly backing up your company’s Windows XP computers.

You open Backup to create a backup job for a computer. The backup must meet all of the following requirements:

Accommodate a restore of all user data. Accommodate a restore of the operating system files and its entire configuration. Require a single tape to perform a complete restoration. Back up all open files rather than skipping them.

What should you do? (Choose three. Each correct choice is part of the solution.)

gfedc Configure the backup job to back up My Computer.

gfedc Configure the backup job to disable volume shadow copy.

gfedcb Configure the backup job to back up System State.

gfedc Configure the backup job to be an Incremental backup type.

gfedcb Configure the backup job to be a Normal backup type.

gfedcb Configure the backup job to back up the C: drive.

gfedc Configure the backup job to be a Differential backup type.

Hacked by Piratez 70-270

Page 199: 70 270 q & a

[403 #309]

Explanation:

Backing up the C: drive will back up all the user data and operating system files on the computer. However, to be able to restore the operating system to its exact state, you also need to select the System State node to be backed up. Do not disable volume shadow copy or else open files will not be backed up. You should use a differential backup to be able to complete a full restore with a maximum of two disks.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #320]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Each Windows XP Professional computer has a single NTFS volume (C: drive). You are responsible for regularly backing up your company’s Windows XP computers.

You schedule a Normal backup job to run every Friday evening. You open Backup to create another backup job for a computer. This backup job will run every day Monday through Thursday and will be used in conjunction with the Normal backup to perform a complete restoration. In addition, this backup job must meet all of the following requirements:

Accommodate a restore of all user data using a maximum of two disks. Accommodate a restore of the operating system files and its entire configuration. Back up all open files rather than skipping them.

What should you do? (Choose three. Each correct choice is part of the solution.)

gfedc Configure the backup job to disable volume shadow copy.

gfedcb Configure the backup job to back up the C: drive.

gfedc Configure the backup job to be an Incremental backup type.

gfedc Configure the backup job to back up My Computer.

gfedcb Configure the backup job to back up System State.

gfedcb Configure the backup job to be a Differential backup type.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You have implemented a nightly backup plan at your office to back up all Windows XP Professional computers.

One Thursday afternoon, a computer’s hard disk crashes. When you look at the backup log you see the following:

Friday - normal backup, completed Saturday - incremental backup, completed Sunday - incremental backup, completed Monday - incremental backup, completed Tuesday - incremental backup, terminated incomplete (some files were backed up) Wednesday - incremental backup, complete

Which tapes and in what order should you restore the files?

Hacked by Piratez 70-270

Page 200: 70 270 q & a

Explanation:

Incremental backups back up only items that were changed since the last backup. You should restore all tapes in order, including the partial backup.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #330]

Explanation:

To begin, you need to restore the latest Normal backup made on Monday, which is on Tape 1. Because other backups are differential backups, you only need to restore the latest differential backup. In this example, the latest successful differential backup was made on Thursday and is on Tape 2. (Friday's backup cannot be restored since it was not completed when the failure occurred.)

It is not necessary to attempt to reload each of the differential backups in order because Thursday's backup will include all changes since Monday's Normal backup.

nmlkj Friday, Saturday, Sunday, Monday, Wednesday

nmlkj Friday, Wednesday

nmlkji Friday, Saturday, Sunday, Monday, Tuesday, Wednesday

nmlkj Friday, Saturday, Sunday, Monday, Wednesday, Tuesday

You are a desktop administrator for your company. Each workstation in your company is running Windows XP Professional with 500 MHz dual-processors, 256MB of RAM, and two 40 GB HDDs. One hard disk is used for the operating system and temporary file space, and the other is used for user files. Each system has a built-in tape drive for backups. The tape drive uses 60 GB tapes and is currently barely able to contain two full backups of the user drive on each tape. There are only three tapes available for this tape drive, so you decide to implement the following backup scheme (all backups are performed at 10pm):

Tape 1: Monday (Normal) Tape 2: Tuesday (Differential) and Thursday (Differential) Tape 3: Wednesday (Differential) and Friday (Differential)

While you are backing up one user’s computer on Friday, the hard disk that stores the user’s data fails. You replace the disk. All data on Tape 3 is also lost.

You need to restore as much data to the disk as possible using the least amount of time. What should you do? (Choose all that apply.)

gfedc Restore Friday’s backup from Tape 3.

gfedcb Restore Thursday’s backup from Tape 2.

gfedc Restore Wednesday’s backup from Tape 3.

gfedc Restore Tuesday’s backup from Tape 2.

gfedcb Restore Monday's backup from Tape 1.

Hacked by Piratez 70-270

Page 201: 70 270 q & a

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #338]

Explanation:

To begin, you need to restore the latest Normal backup made on Monday, which is on Tape 1. Because other backups are incremental backups, you need to restore each backup in succession until the time of failure. In this example, you need to restore Tuesday’s backup from Tape 2 and Wednesday’s backup from Tape 3. (Thursday's backup was not yet completed, so you should not restore it.)

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #347]

You are a desktop administrator for your company. Each workstation in your company is running Windows XP Professional with 500 MHz dual-processors, 256MB of RAM, and two 40 GB HDDs. One hard disk is used for the operating system and temporary file space, and the other is used for user files. Each system has a built-in tape drive for backups. The tape drive uses 60 GB tapes and is currently barely able to contain two full backups of the user drive on each tape. There are only three tapes available for this tape drive, so you decide to implement the following backup scheme (all backups are performed at 10pm):

Tape 1: Monday (Normal) Tape 2: Tuesday (Incremental) and Thursday (Incremental) Tape 3: Wednesday (Incremental) and Friday (Incremental)

Thursday prior to the backup, the hard disk that stores the user’s data fails on one of the computers. You replace the disk.

You need to restore as much data to the disk as possible using the least amount of time. What should you do? (Choose all that apply.)

gfedcb Restore Tuesday’s backup from Tape 2.

gfedcb Restore Wednesday’s backup from Tape 3.

gfedcb Restore Monday's backup from Tape 1.

gfedc Restore Thursday’s backup from Tape 2.

gfedc Restore Friday’s backup from Tape 3.

You are a desktop administrator for your company. Each workstation in your company is running Windows XP Professional with 500 MHz dual-processors, 256MB of RAM, and two 40 GB HDDs. One hard disk is used for the operating system and temporary file space, and the other is used for user files. Each system has a built-in tape drive for backups. The tape drive uses 60 GB tapes and is currently barely able to contain two full backups of the user drive on each tape. There are only three tapes available for this tape drive, so you decide to implement the following backup scheme (all backups are performed at 10pm):

Hacked by Piratez 70-270

Page 202: 70 270 q & a

Explanation:

The problem is caused by the backup process taking too long to complete each night. Although you might not be able to fix the problem for Monday’s backup, by changing the backups for Tuesday through Friday to the Incremental backup type, you can shorten the amount of time required each day for the backup process.

Normal backups each day would increase the amount of time the backup process would take, making the problem worse rather than better. When creating a backup schedule, you should not mix differential and incremental backups following a full backup.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #356]

g p ( p p p )

Tape 1: Monday (Normal) Tape 2: Tuesday (Differential) and Thursday (Differential) Tape 3: Wednesday (Differential) and Friday (Differential)

You implement the backup plan. Friday morning, a user named Michelle arrives at the office and finds that her computer is still completing the backup. You want to minimize the chance that this will occur in the future. What should you do?

nmlkj Change the backups for Thursday and Friday to Incremental backups.

nmlkj Change the backups for Wednesday through Friday to Incremental backups.

nmlkj Change the backups for Tuesday through Friday to Normal backups.

nmlkji Change the backups for Tuesday through Friday to Incremental backups.

nmlkj Change the backups for Tuesday and Wednesday to Normal backups.

You are the desktop administrator for a company that employs several hundred engineers. The engineers are developing a satellite tracking system using a graphic-intensive application. You receive a call from one of the engineers named Rodney. Rodney informs you that his Windows XP computer is performing very slowly.

You ask Rodney if he has made any changes to his computer. Rodney explains that he recently removed his computer’s video card and installed a new 128 MB video card. Ever since, the operating system and his programs have been operating slowly. He replaced the new card with the original card, but is still experiencing performance degradation. You suspect that the installation program for Rodney’s video card updated some system files, which are still installed.

You want to revert to the versions of Rodney’s system files used prior to the video card installation. You want to minimize risk to Rodney’s existing data files and system configuration while doing so. What should you do?

nmlkj In Device Manager, open the properties of the video card and select Roll Back Driver.

nmlkj Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

nmlkji Run System Restore. Apply a system restore point.

nmlkj Reboot the computer and select the Last Known Good Configuration startup option.

nmlkj Boot to the Windows XP Professional CD-ROM. Press F2 when prompted. Apply an ASR restore.

Hacked by Piratez 70-270

Page 203: 70 270 q & a

Explanation:

System Restore automatically backs up protected system files when they are updated. You can also manually create a system restore point, which is a good idea to do before installing new drivers or before applying a service pack or otherwise updating system files. Use the System Restore utility to revert a Windows XP computer to a previous restore point.

The Last Known Good Configuration cannot be used because the user has logged on since installing the updated driver. Rolling back the video driver would not work because a new driver was likely installed rather than the existing driver being updated. Also, rolling back the driver would not roll back other system files that were apparently updated. An ASR backup should be used only when other recovery options fail. The Repair option starts Recovery Console, but using the Recovery Console is unnecessary since you can boot the computer.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #365]

Explanation:

To disable a service that is preventing Windows XP Professional from starting, use the disable command in the Recovery Console. You can start the Recovery Console by booting to the Windows XP Professional CD-ROM and choosing the Repair option.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

nmlkj Boot to the Windows XP Professional CD ROM. Press F2 when prompted. Apply an ASR restore.

You are the desktop administrator for a company that employs several hundred engineers. The engineers are developing a satellite tracking system using a graphic-intensive application. You receive a call from one of the engineers named Rodney. Rodney informs you that his Windows XP computer will not boot.

You ask Rodney if he has made any changes to his computer. Rodney explains that he recently installed a new 128 MB video card. You try to boot using the Last Known Good configuration, but fail. You also try to boot in Safe mode, but fail. Finally, you consult Technet and find an article that suggests that the Agp440 service might be preventing the computer from booting.

You want to boot Rodney’s computer to Windows XP Professional. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Revert to a system restore point that was previous to the recent video card installation.

gfedc Run System Restore.

gfedcb Execute the disable agp440 command.

gfedcb Boot to the Windows XP Professional CD-ROM. Choose the Repair option.

gfedc Boot to the Windows XP Professional CD-ROM. Press F2 when prompted.

Hacked by Piratez 70-270

Page 204: 70 270 q & a

[403 #374]

Explanation:

An ASR backup consists of a floppy disk and a backup medium (such as a tape or a backup file copied to a CD). The floppy disk contains hard disk configuration data, and the backup medium contains a copy of system files. The files on the ASR floppy are also backed up to the ASR backup. They are named Asr.sif and Asrpnp.sif and are located in the %SystemRoot%\Repair folder. You can restore these files to a floppy disk by running the Windows Backup program from another computer and using the Restore wizard.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #383]

You are the desktop administrator for your company. You are responsible for maintaining several Windows XP computers. You want to be prepared to recover an employee’s computer in any event without having to perform a new installation of Windows XP. You decide to go to each employee’s computer and create an Automated System Recovery (ASR) backup.

You successfully create an ASR backup, including an ASR floppy disk, for several computers. However, one laptop does not have a floppy drive because the user always copies files using the company network when at the office. You create an ASR backup (not including an ASR floppy disk) for the laptop computer.

You want to create an ASR floppy disk for the laptop. What should you do?

nmlkjRun Backup on the laptop computer. Run the Backup wizard and create a backup of the System State data. Copy the backup file to a floppy disk.

nmlkj Perform a disk copy of another computer’s ASR floppy disk.

nmlkjiRun Backup on another computer. Run the Restore wizard and restore the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the ASR backup to a floppy disk.

nmlkjRun Backup on another computer. Run the Automated System Recovery wizard and restore the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the ASR backup to a floppy disk.

You are the desktop administrator for your company. You are responsible for maintaining several Windows XP computers. You want to be prepared to recover an employee’s computer in any event without having to perform a new installation of Windows XP. You decide to go to each employee’s computer and create an Automated System Recovery (ASR) backup.

You successfully create an ASR backup, including an ASR floppy disk, for several computers. However, one laptop does not have a floppy drive because the user always copies files using the company network when at the office. You create an ASR backup (not including an ASR floppy disk) for the laptop computer.

You want to create an ASR floppy disk for the laptop. What should you do?

nmlkjiCopy the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the laptop computer to a network share. Using another computer, copy the files from the network share to a floppy disk.

nmlkjRun Backup on another computer. Run the Automated System Recovery wizard and restore the Asr.sif and Asrpnp.sif files from the %SystemRoot%/Repair folder on the ASR backup to a floppy disk.

Hacked by Piratez 70-270

Page 205: 70 270 q & a

Explanation:

An ASR backup consists of a floppy disk and a backup medium (such as a tape or a backup file copied to a CD). The floppy disk contains hard disk configuration data and the backup medium contains a copy of system files. The files on the ASR floppy are also backed up to the ASR backup. They are named Asr.sif and Asrpnp.sif and are located in the %SystemRoot%\Repair folder. Immediately after creating an ASR backup, you can copy these files from the computer’s Repair folder to a floppy disk to create an ASR floppy. In this scenario, you will need to copy the files to a network share, then use another computer to copy the files from the network share to a floppy disk.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #391]

Explanation:

The Windows XP Backup program (Ntbackup.exe) does not recognize the software compression format that Msbackup uses. This refers to the compression algorithm used by Msbackup, not the fact that the drives were compressed using a compression utility in Windows 98. The fact that the drives were compressed is irrelevant to this question. To prevent problems restoring data to Windows XP, you need to disable compression when backing up using Msbackup.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

p p y p p ppy

nmlkjRun Backup on the laptop computer. Run the Backup wizard and create a backup of the System State data. Copy the backup file to a floppy disk.

nmlkj Perform a disk copy of another computer’s ASR floppy disk.

You are the desktop administrator for your company. Your company uses Windows 98 as its desktop operating system. You regularly back up the company’s desktop computers. To conserve disk space, you have compressed the drives on which user data is stored. Your company recently purchased new Windows XP Professional computers with larger hard drives.

You are planning to transfer each user’s data to a new Windows XP Professional computer using the User State Migration Tool (USMT). Before doing so, you want to make a final backup of each Windows 98 computer. You want to use the backup to restore user data to users’ Windows XP Professional computers should the need arise. What should you do?

nmlkj Before restoring any backup using Ntbackup, compress the destination drive.

nmlkj Before beginning any backup using Msbackup, uncompress the source drive.

nmlkj Before restoring any backup using Ntbackup, disable compression for the backup.

nmlkji Before beginning any backup using Msbackup, disable compression for the backup.

nmlkj Before restoring any backup using Ntbackup, uncompress the destination drive.

Hacked by Piratez 70-270

Page 206: 70 270 q & a

[403 #402]

Explanation:

The Windows XP Backup program (Ntbackup.exe) does not recognize the software compression format that Msbackup uses. This refers to the compression algorithm used by Msbackup, not the fact that the drives were compressed using a compression utility in Windows 98. The fact that the drives were compressed is irrelevant to this question. To fix this problem, you need to restore the file using Msbackup.exe on a Windows 95, 98, or ME computer. You can then copy the file to the Windows XP Professional computer over the network.

Objective(s):

403. Restore and back up the operating system, System State data, and user data.

Reference(s):

TestOut for Windows XP Administration, Section 8.3

[403 #411]

You are the desktop administrator for your company. Your company uses Windows 98 as its desktop operating system. You regularly back up the company’s desktop computers. To conserve disk space, you have compressed the drives on which user data is stored. Your company recently purchased new Windows XP Professional computers with larger hard drives.

You transfer each user’s data to a new Windows XP Professional computer using the User State Migration Tool (USMT). Later, Michelle, a user in the marketing department asks you to restore an important document on her Windows XP Professional computer to a prior state. The correct version of the document is located on a backup created from Michelle’s Windows 98 computer. You attempt to restore the file to Michelle’s Windows XP computer, but you receive a message stating, “The backup file contains unrecognized data and cannot be used.”

You need to restore Michelle’s document to its prior state. What should you do?

nmlkj Use the Automated System Restore feature of Windows XP to perform the restore.

nmlkjiRestore the file to a Windows 98 computer. Then copy the file over the network to the Windows XP computer.

nmlkj Run System Restore and manually apply a restore point.

nmlkj Verify that the compress attribute is enabled for the folder where you want to restore the file.

nmlkj Verify that the compress attribute is not enabled for the folder where you want to restore the file.

Hacked by Piratez 70-270

Page 207: 70 270 q & a

500

Configuring and Troubleshooting

the Desktop

Environment

Page 208: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

A mandatory roaming profile is stored on the network. The user can log on to any Windows XP computer in the network, and the mandatory roaming profile will create the same desktop environment. A mandatory user profile is created by renaming the ntuser.dat file to ntuser.man. Changes made to the profile are then never updated to the server when users log off. To configure a user account, configure each user account to use a profile path referring to a user profile folder on a network server (in this scenario, configure profile path for part-time sales employees to point to the PTSales folder). When copying the user profile, you need to make sure to configure it so the necessary users will have access to it. Besides network share and NTFS permissions, select the appropriate group for the Permitted to Use setting when copying the profile. This will configure the ntuser file to apply the appropriate registry permissions.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #260]

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

You want to configure the desktops of part-time sales employees to always have the same desktop settings, including the same start menu and desktop shortcuts. To minimize support problems, you do not want part-time sales employees to be able to save any changes they make to their desktop. You delete all existing user profiles for part-time sales employees. You then create a temporary domain user account named Temp and log on to a Windows XP computer as Temp. You configure the desktop how you would like it and log off. You then log on to the same computer using your domain administrator account.

You want to require all part-time sales employees’ desktop and Start menu settings to be the same as the Temp user account’s desktop and Start menu settings. You want to meet these requirements using the least amount of administrative effort. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcConfigure the profile path for each part-time sales employee’s user account to refer to the ntuser file in the PTSales folder.

gfedcb Configure the profile path for each part-time sales employee’s user account to refer to the PTSales folder.

gfedcConfigure the profile path for each part-time sales employee’s user account to refer to the ntuser file in the folder in the Default User profile.

gfedcIn System properties, copy the Temp user profile to the Default User profile. Rename ntuser.dat to ntuser.man in the Default User profile.

gfedcIn System properties, copy the Temp user profile to a folder named PTSales on a network server. Make the ntuser.dat file read-only in the PT Sales profile.

gfedcIn System properties, copy the Temp user profile to the Default User profile. Make the ntuser.dat file read-only in the Default User profile.

gfedcbIn System properties, copy the Temp user profile to a folder named PTSales on a network server. Rename ntuser.dat to ntuser.man in the PTSales profile.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

You want to configure the desktops of part time sales employees to always have the same desktop settings

Page 209: 70 270 q & a

Explanation:

You can use group policy settings to accomplish the same goals as a mandatory roaming profile. None of the options regarding user profiles is a complete solution for this scenario.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.5

[501 #271]

Explanation:

You want to configure the desktops of part-time sales employees to always have the same desktop settings, including the same Start menu and desktop shortcuts. To minimize support problems, you do not want part-time sales employees to be able to save any changes they make to their desktop. You also want to disable access to certain features such as the Control Panel.

You want to meet these requirements using the least amount of administrative effort. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc In System properties, copy the Temp user profile to a folder named PTSales.man on a network server.

gfedcbConfigure a group policy object to redirect the Start Menu and Desktop folders to shared folders on a network server. Allow part time sales employees Read & Execute permissions to the folders. Distribute the GPO to part-time sales employees.

gfedcIn System properties, copy the Temp profile to a folder on a network server named PTSales. Specify part-time sales employees as the only users with access to the copied profile.

gfedcCreate a new user profile for a user named Temp. Configure it with the Start Menu and Desktop settings you desire.

gfedcbConfigure a group policy object that disables prohibited features such as the Control Panel. Distribute the GPO to part-time sales employees.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

You distribute a group policy object to all part-time sales employees that disables access to certain operating system features such as the Control Panel. Afterwards, you notice a part-time sales employee with the Control Panel open.

You want to make sure the group policy object you created applies to the sales employee. What should you do?

nmlkjConfigure computer configuration settings rather than user configuration settings in the group policy object. Distribute the group policy object to computers rather than users.

nmlkj Run the gpupdate /target:computer command.

nmlkji Run the gpupdate /target:user command.

nmlkj Run the secedit /refreshpolicy user_policy command.

nmlkj Run the secedit /refreshpolicy machine_policy command.

Hacked by Piratez 70-270

Page 210: 70 270 q & a

User-related group policy is applied when users log on or the group policy refresh interval expires. Computer-related group policy is applied when computers start up or the group policy refresh interval expires. In this scenario, the user was logged on when you distributed the group policy object, and you should manually refresh the user’s group policy. In Windows XP, the gpupdate command is used rather than the secedit /refreshpolicy command, which was used in Windows 2000. To refresh user-related group policy only, use the /target:user switch. To refresh computer-related group policy only, use the /target:computer switch. To refresh all group policy, you can omit the switch altogether.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.5

[501 #280]

Explanation:

A roaming profile is a user profile that is stored on the network. The user can log on to any Windows XP computer in the network, and the roaming profile will create the same desktop environment. To set up a roaming user profile:

1. Create a folder in a network share for each user account. This folder will contain the roaming profile. 2. In each user account’s properties, click the Profile tab, then enter the path to the user’s roaming profile folder (for

example, \\server_name\share_name\%username%).

Although you could manually create individual folders for each user and copy a default user profile to each user’s network profile folder, this could be administration-intensive, and is unnecessary if you simply configure each user account’s profile path to refer to %username% in a network shared folder. If you use the variable %username% instead of the user name, Windows automatically replaces the variable with the name of the user account, creates the appropriate folder, and copies a profile to the folder when the user logs off.

Objective(s):

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee might use a different computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

You want to let part-time sales employees customize their desktop. You also want the desktops of each part-time sales employee to be the same no matter which computer the employee is using.

You want to accomplish these goals using the least amount of administrative effort. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcIn System properties of one of the part-time sales computers, copy the Default User profile to a folder named PTSales in a network share.

gfedcConfigure the profile path for each part-time sales employee’s user account to refer to a ntuser.man file in the PTSales shared folder.

gfedcCreate a network share named PTSales that contains a folder for each part-time sales employee. Copy a default user profile to each folder.

gfedc Configure the profile path for each part-time sales employee’s user account to refer to the PTSales folder.

gfedcIn System properties of one of the part-time sales computers, copy the Default User profile to the root of a shared network folder named PTSales.

gfedcb Create a shared folder named PTSales on a network server.

gfedcbConfigure the profile path for each part-time sales employee’s user account to refer to %username% in the PTSales shared folder.

Hacked by Piratez 70-270

Page 211: 70 270 q & a

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #289]

Explanation:

A roaming profile is a user profile that is stored on the network. The user can log on to any Windows XP computer in the network, and the roaming profile will create the same desktop environment. The best solution in this scenario is to redirect each user’s My Documents folder to a shared network folder. In this way, a reference to the network folder rather than the entire folder’s contents would be downloaded with the user’s roaming profile to the local computer.

Although you could exclude a user’s My Documents folder from roaming with the user, the user would then not have access to the data in their My Documents folder. Slow link detection is used to configure the bandwidth threshold before a network connection is considered to be slow. Some group policy settings do not apply over slow connections.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #300]

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee might use a different computer every day. You configure roaming user profiles for each part time sales employee. After you implement roaming user profiles, some users complain that it takes an excessive amount of time to log on to a computer for the first time.

You investigate the problem and discover that these users store large amounts of files in their My Documents folders. You suspect that the increased log on times are due to the large amount of data being downloaded from the network.

You want to decrease log on times for part-time sales employees. You also want to maintain access to each user’s My Documents folder when the user logs on to any computer. What should you do?

nmlkj Change each part-time sales employee’s user profile to be a local profile.

nmlkjCreate a group policy object that enables the Group Policy slow link detection setting. Distribute the group policy object to each part-time sales employee.

nmlkjCreate a group policy object that configures the Exclude Directories in Roaming Profile setting to exclude the My Documents folder. Distribute the group policy object to each part-time sales employee.

nmlkji Redirect each part-time sales employee’s My Documents folder to a folder on a network share.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

A part-time sales employee named Sally frequently runs a network application named Tracking.exe. The other part time sales employee who shares Sally’s computer does not need to run this application

Hacked by Piratez 70-270

Page 212: 70 270 q & a

Explanation:

To put a shortcut on a user’s desktop that is only available to that user, put the shortcut in the specific user’s profile folder. To put a shortcut on all users’ desktops, put the shortcut in the All Users profile folder. To put a shortcut on all new users’ desktops by default, put the shortcut in the Default User profile folder.

Put the shortcut in the Desktop folder of the appropriate user profile folder for the shortcut to appear on the desktop. Put the shortcut in the Start Menu folder for the shortcut to appear on the Start Menu. Put the shortcut in the Start Menu\Programs\Startup folder for the shortcut to be opened automatically when the user logs on.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #308]

part-time sales employee who shares Sally s computer does not need to run this application.

You want to put a shortcut to Tracking.exe on Sally’s desktop. You do not want the shortcut to appear when any other employees use the computer. What should you do?

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/All Users/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Start Menu folder.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Default User/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open All Users. Put a shortcut to Tracking.exe in the window that opens.

nmlkjLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open. Put a shortcut to Tracking.exe in the window that opens.

nmlkjiLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Desktop folder.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

A part-time sales employee named Sally frequently runs a network application named Tracking.exe. The other part-time sales employee who shares Sally’s computer also needs to run this application.

You want to put a shortcut to Tracking.exe on the desktop of Sally’s computer. You want the shortcut to appear when any other employee uses the computer. What should you do?

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Desktop folder.

nmlkjiLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/All Users/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Start Menu folder. Log on to Sally’s computer using an administrative account Put a shortcut to Tracking exe in the Documents

Hacked by Piratez 70-270

Page 213: 70 270 q & a

Explanation:

To put a shortcut on a user’s desktop that is only available to that user, put the shortcut in the specific user’s profile folder. To put a shortcut on all users’ desktops, put the shortcut in the All Users profile folder. To put a shortcut on all new users’ desktops by default, put the shortcut in the Default User profile folder.

Put the shortcut in the Desktop folder of the appropriate user profile folder for the shortcut to appear on the desktop. Put the shortcut in the Start Menu folder for the shortcut to appear on the Start Menu. Put the shortcut in the Start Menu\Programs\Startup folder for the shortcut to be opened automatically when the user logs on.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #318]

Explanation:

nmlkjLog on to Sally s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Default User/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open All Users. Put a shortcut to Tracking.exe in the window that opens.

nmlkjLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open. Put a shortcut to Tracking.exe in the window that opens.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

A part-time sales employee named Sally frequently runs a network application named Tracking.exe. The other part-time sales employee who shares Sally’s computer also needs to run this application.

You want to put a shortcut to Tracking.exe on the Start Menu of Sally’s computer. You want the shortcut to appear when any other employee uses the computer. What should you do?

nmlkjiLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open All Users. Put a shortcut to Tracking.exe in the window that opens.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/All Users/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Right-click the Start menu and select Open. Put a shortcut to Tracking.exe in the window that opens.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Default User/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Desktop folder.

nmlkjLog on to Sally’s computer using an administrative account. Put a shortcut to Tracking.exe in the Documents and Settings/Sally/Start Menu folder.

Hacked by Piratez 70-270

Page 214: 70 270 q & a

To put a shortcut on a user’s desktop that is only available to that user, put the shortcut in the specific user’s profile folder. To put a shortcut on all users’ desktops, put the shortcut in the All Users profile folder. To put a shortcut on all new users’ desktops by default, put the shortcut in the Default User profile folder.

Put the shortcut in the Desktop folder of the appropriate user profile folder for the shortcut to appear on the desktop. Put the shortcut in the Start Menu folder for the shortcut to appear on the Start Menu. Put the shortcut in the Start Menu\Programs\Startup folder for the shortcut to be opened automatically when the user logs on.

You can quickly open the Start Menu folder for the All Users profile by right-clicking the Start menu and selecting Open All Users.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #328]

Explanation:

You can configure Windows XP to turn off accessibility features after the computer has been idle for a specified number of minutes.

1. Open Accessibility Options in the Control Panel. 2. Click the General tab, then enable Turn off accessibility features after idle for:. 3. Specify the number of minutes.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You manage a computer lab with 25 Windows XP Professional computers. The lab is used for training purposes.

You lock down the lab’s computers and prevent all user profiles and user-specific group policy from applying to these computers. You then realize that some users who use the computer lab require accessibility options, but most users do not want to use any accessibility options. You enable the required accessibility options on five of the lab's computers.

After a user turns on an accessibility feature, you want the feature to be turned off before other users use the computer. What should you do?

nmlkj Train all users who use the lab how to turn accessibility features off.

nmlkji Configure Windows XP to turn off accessibility features after the computer has been idle for a few minutes.

nmlkjCreate a group policy that enables accessibility features. Distribute the group policy to users who use accessibility features.

nmlkjCreate a group policy that disables accessibility features. Distribute the group policy to users who do not use accessibility features.

Hacked by Piratez 70-270

Page 215: 70 270 q & a

[501 #338]

Explanation:

You can configure Windows XP to turn off accessibility features after the computer has been idle for a specified number of minutes.

1. Open Accessibility Options in the Control Panel. 2. Click the General tab, then disable Turn off accessibility features after idle for:. 3. Specify the number of minutes.

Although you could increase the idle timeout value, to prevent accessibility options from ever automatically resetting themselves, you need to disable this setting. The other options affect how accessibility options are started, but do not affect how they get turned off.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[501 #346]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You manage a computer lab with 25 Windows XP Professional computers. The lab is used for training purposes.

You lock down the lab’s computers and prevent all user profiles and user-specific group policy from applying to these computers. You then realize that some users who use the computer lab require accessibility options, but most users do not want to use any accessibility options. You enable the required accessibility options on five of the lab's computers.

During one training seminar, a user who uses accessibility options complains that the options keep turning themselves off. You want to prevent this from happening. What should you do?

nmlkji In Accessibility Options, disable the automatic reset feature for accessibility options.

nmlkjIn Utility Manager, verify that the Start automatically when Utility Manager starts option is enabled for each accessibility program.

nmlkjIn Accessibility Options, verify that the appropriate accessibility features are enabled, but that the Use shortcut option is disabled.

nmlkj In Accessibility Options, increase the idle timeout for turning off accessibility features.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. You manage a computer lab with 25 Windows XP Professional computers. The lab is used for training purposes.

You lock down the lab’s computers and prevent all user profiles and user-specific group policy from applying to these computers. One user who is beginning a class has trouble reading the computer screen. You decide to enable accessibility options for one of the lab’s computers, which the user will use throughout the class.

You want to configure the computer to use colors and fonts designed for easy reading. What should you do?

Hacked by Piratez 70-270

Page 216: 70 270 q & a

Explanation:

The Use High Contrast setting in Accessibility Options applies a modified theme that uses the Windows Classic look and feel for buttons and windows, uses large fonts, and uses a high contrast color scheme.

ClearType smoothes the edges of screen fonts and is especially useful on LCD displays, but ClearType does not affect colors or font sizes.

Code pages conversion tables let Windows display correct characters for programs that use code pages (a table of characters listed according to a particular standard).

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[501 #354]

Explanation:

One option in Utility Manager is to configure specific accessibility programs to start whenever the user logs on. The setting is saved in the user profile of the user who is currently logged on. Therefore, you should be logged on as Sally when you perform this configuration. Although you could log on as a different user, make the configuration, and then copy the user

nmlkji In Accessibility Options, enable the Use High Contrast setting.

nmlkjIn Regional and Language Options, enable the IBM EBCDIC code page conversion table for the appropriate language.

nmlkj In Display Properties, enable the Windows Classic theme.

nmlkj In Display Properties, enable ClearType.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

A part-time sales employee named Sally requires enhanced vision support when using her computer. Sally already uses a local user profile with some specialized settings. You show Sally how to open the Magnifier utility. The next day, Sally informs you that the Magnifier utility did not open when she logged on.

You want the Magnifier program to start whenever Sally logs on to the computer. You want this configuration to apply to Sally only. What should you do?

nmlkjLog on using an administrative account. In Accessibility Options, open Utility Manager and configure the Magnifier utility to start automatically when the user logs on.

nmlkjCreate a new user account. Log on using the new user account. In Accessibility Options, open Utility Manager and configure the Magnifier utility to start automatically when the user logs on. Log on using an administrative account and copy the new user account’s profile to Sally’s user account.

nmlkjiInstruct Sally to log on. While logged on as Sally, open Utility Manager and configure the Magnifier utility to start automatically when the user logs on.

nmlkj Log on using an administrative account. In Accessibility Options, enable the Use High Contrast setting.

nmlkj Instruct Sally to log on. In Accessibility Options, enable the Use High Contrast setting.

Hacked by Piratez 70-270

Page 217: 70 270 q & a

profile to Sally’s user profile, this would replace Sally’s current user profile settings.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #362]

Explanation:

A roaming profile is a user profile that is stored on the network. The user can log on to any Windows XP computer in the network, and the roaming profile will create the same desktop environment. To set up a roaming user profile:

1. Create a folder in a network share for each user account. This folder will contain the roaming profile. 2. In each user account’s properties, click the Profile tab, then enter the path to the user’s roaming profile folder (for

example, \\server_name\share_name\%username%).

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #371]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. A user in the sales department named Sally frequently logs on to multiple computers. To maintain consistent desktop settings across multiple computers, Sally wants to use a roaming user profile.

Using your administrative account, you log on to the most recent computer that Sally has used. In System Properties, you select Sally’s user profile and click Change Type. However, the Roaming profile setting is grayed out.

You want Sally to use a roaming user profile. What should you do?

nmlkj Edit the Permitted to use property of Sally’s user profile.

nmlkji Configure Sally’s user profile path to refer to a folder on a network share.

nmlkj Log on as Sally. Then configure her profile type.

nmlkj Instruct Sally to log on then log off twice.

You are the administrator for your company. A Windows XP Professional computer is shared by several users. Sally, a user in the sales department, logs on to the computer for the first time and receives a message stating, "Windows cannot copy file c:/Documents and Settings/Default User/ to location C:/Documents and Settings/Sally. Contact you network administrator. Detail - Access is denied."

You need to prevent this error from occurring. What should you do?

nmlkjEnsure that the Everyone group has the Modify permission to the Documents and Settings folder (including

Hacked by Piratez 70-270

Page 218: 70 270 q & a

Explanation:

When a user first logs on to a Windows XP computer, a new profile folder is created for the user in the Documents and Settings folder. The profile is based on a copy of the Default User profile. To create the copy, the Everyone group requires at least the Read & Execute permission to the Default User profile folder. Normally, this permission exists by default. Someone must have changed it. Do not grant Everyone the Full Control permission to the Default User profile, or everyone will be able to change settings in it. Do not grant Everyone the Full Control or Modify permissions to the Documents and Settings folder and all its subfolders, or everyone will be able to change other user’s profile settings.

Objective(s):

501. Configure and manage user profiles and desktop settings.

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #379]

Explanation:

The All Users profile folder applies to all users of the computer. By default, Power Users can modify the contents of this folder. To prevent Power Users from modifying the contents of the All Users folder, make sure they only have the Read & Execute permission.

Objective(s):

501. Configure and manage user profiles and desktop settings.

nmlkjy g p y p g ( g

subfolders and files).

nmlkj Ensure that the Everyone group has the Full Control permission to the Default User profile folder.

nmlkjEnsure that the Everyone group has the Full Control permission to the Documents and Settings folder (including subfolders and files).

nmlkji Ensure that the Everyone group has the Read & Execute permission to the Default User profile folder.

You are the desktop administrator for your company. You manage a group of Windows XP Professional computers used by a part-time sales staff. All computers are members of a single Active Directory domain. Each part-time sales employee uses the same computer every day. One part-time sales employee uses the computer during the morning hours, and another part-time sales employee uses the computer during the afternoon hours.

One part-time sales employee named Sally uses a legacy application that requires her to be a member of her computer’s local Power Users group. You put a shortcut to the application on Sally’s desktop. You also configure Sally’s computer to put several shortcuts on the desktop of all users who use Sally’s computer.

You want to prevent Sally from removing shortcuts that affect all users of her computer. What should you do?

nmlkjLog on to Sally’s computer using an administrative account. Edit the security properties of the Documents and Settings/Default User profile. Allow the Power Users group the Read & Execute permission only.

nmlkjLog on to Sally’s computer using an administrative account. Edit the security properties of the Documents and Settings/%username% profile for all profiles except Sally’s. For each profile, allow the Power Users group the Read & Execute permission only.

nmlkjLog on to Sally’s computer using an administrative account. Edit the security properties of the Documents and Settings/Sally profile. Allow the Power Users group the Read & Execute permission only.

nmlkjiLog on to Sally’s computer using an administrative account. Edit the security properties of the Documents and Settings/All Users profile. Allow the Power Users group the Read & Execute permission only.

Hacked by Piratez 70-270

Page 219: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 1.4

[501 #387]

Explanation:

With the English version of Windows XP, users can input, view, and print many languages. It is not necessary to install a localized version or the multi-language version of Windows XP. Localized versions of Windows XP change the language of the Windows interface. In this scenario, you only need to change the input language capabilities.

Use the Regional and Language Options applet in the Control Panel to add an input language. When multiple input languages are configured, the language toolbar should automatically be made available.

You must be logged on as an administrator or as a member of the Administrators group to install languages.

Objective(s):

502. Configure support for multiple languages or multiple locations.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[502 #260]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Windows XP Professional laptop computer. Michelle frequently travels to Moscow, Russia and wants to create documents in both English and Russian (using the Cyrillic alphabet).

You right-click the taskbar and select Toolbars. However, the language toolbar is not listed as an option. You want to enable Russian language support on Michelle’s laptop. You also want to enable the language toolbar so Michelle can quickly switch between Russian and English as an input language. What should you do?

nmlkj Install a localized Russian language version of Windows XP.

nmlkj In Add or Remove Programs, add the Russian language component to the system.

nmlkjIn Regional and Language Options, edit the Text Services and Input Language settings. Enable the Show additional Language bar icons in the Notification area setting.

nmlkj Install the multi-language version of Windows XP.

nmlkjiIn Regional and Language Options, edit the Text Services and Input Language settings. Add the Russian input language with the default keyboard layout.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Windows XP Professional laptop computer. Michelle frequently travels to Tokyo, Japan and wants to create documents in both English and Japanese.

You open the Regional and Language Options applet in the Control Panel and attempt to add Japanese as an input language. However, Japanese is not listed as an option.

You want to enable Japanese language support on Michelle’s laptop. What should you do?

Hacked by Piratez 70-270

Page 220: 70 270 q & a

Explanation:

With the English version of Windows XP, users can input, view, and print many languages. It is not necessary to install a localized version or the multi-language version of Windows XP. Localized versions of Windows XP change the language of the Windows interface. In this scenario, you only need to change the input language capabilities.

Use the Regional and Language Options applet in the Control Panel to add an input language. When multiple input languages are configured, the language toolbar should automatically be made available.

If you need to use East Asian languages such as Chinese, Japanese, or Korean, you must first install East Asian language support by enabling the Install files for East Asian languages option. Because East Asian language support requires significant disk space, files for these languages are not installed by default.

You must be logged on as an administrator or as a member of the Administrators group to install languages.

Objective(s):

502. Configure support for multiple languages or multiple locations.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[502 #269]

Explanation:

With the English version of Windows XP, users can input, view, and print many languages. It is not necessary to install a localized version or the multi-language version of Windows XP. Localized versions of Windows XP change the language of the Windows interface. In this scenario, you only need to change the input language capabilities.

nmlkj Install a localized Japanese language version of Windows XP.

nmlkj Install the multi-language version of Windows XP.

nmlkj In Regional and Language Options, go to the Regional Options tab and configure the Location to be Japan.

nmlkj In Add or Remove Programs, add the Japanese language component to the system.

nmlkji In Regional and Language Options, install files for East Asian languages.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Windows XP Professional laptop computer. Michelle frequently travels to the Middle East and wants to create documents in Arabic and Hebrew in addition to English.

You open the Regional and Language Options applet in the Control Panel and attempt to add Arabic and Hebrew as input languages. However, Arabic and Hebrew are not listed as options.

You want to enable Arabic and Hebrew language support on Michelle’s laptop. What should you do?

nmlkji In Regional and Language Options, install files for complex script and right-to-left languages.

nmlkj In Add or Remove Programs, add the Arabic and Hebrew language components to the system.

nmlkj Install the multi-language version of Windows XP.

nmlkjIn Regional and Language Options, select Arabic as the language for non-Unicode programs. Instruct Michelle to change the setting to Hebrew if she wants to create Hebrew documents.

nmlkj In Regional and Language Options, install files for East Asian languages.

Hacked by Piratez 70-270

Page 221: 70 270 q & a

Use the Regional and Language Options applet in the Control Panel to add an input language. When multiple input languages are configured, the language toolbar should automatically be made available.

If you need to use complex script or right-to-left languages such as Arabic, Armenian, Georgian, Hebrew, Indic languages, Thai, or Vietnamese, you must first enable the Install files for complex script and right-to-left languages (including Thai) option.

You must be logged on as an administrator or as a member of the Administrators group to install languages.

Objective(s):

502. Configure support for multiple languages or multiple locations.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[502 #278]

Explanation:

Use the Regional and Language Options applet in the Control Panel to configure the computer’s standards and formats. You can select a pre-defined set of formats on the Regional Options tab. You can also customize the computer’s formats and standards.

Objective(s):

502. Configure support for multiple languages or multiple locations.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[502 #287]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Windows XP Professional laptop computer. Michelle frequently travels between New York and London. When in London, Michelle wants to use a United Kingdom keyboard layout. She also wants the pound sign rather than the dollar sign to be used for currency. She also wants long dates to match the local standard used by other Windows XP computers in the London office.

You open the Regional and Language Options applet in the Control Panel and verify that English is listed as an input language. You also add the United Kingdom keyboard layout to Michelle’s computer and ensure that the language bar is available.

You want to show Michelle how to configure her computer’s currency and date format when she travels to London. What should you do?

nmlkjIn Date and Time Properties, select (GMT) Greenwich Mean Time: Dublin, Edinburgh, Lisbon, London as the time zone.

nmlkj Click the language bar and choose the English (United Kingdom) option.

nmlkjIn Regional and Language Options, select English (United Kingdom) as the language for non-Unicode programs. Instruct Michelle to change the setting to English (United States) when in New York.

nmlkji In Regional and Language Options, select English (United Kingdom) on the Regional Options tab.

Hacked by Piratez 70-270

Page 222: 70 270 q & a

Explanation:

You do not need to install the Russian version of the operating system to create a Russian document. You should close Michelle’s word processing program, change the language, and then restart the program to let it reinitialize with the new standard character set. This procedure is not necessary for all programs.

Objective(s):

502. Configure support for multiple languages or multiple locations.

Reference(s):

TestOut for Windows XP Administration, Section 1.1

[502 #295]

Explanation:

You are a helpdesk technician for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, uses a Windows XP Professional laptop computer. Michelle is developing a product manual that has text in both English and Russian. The word processing program Michelle uses is a Windows 16-bit character-based application.

Michelle starts the word processing program and completes the English portion of the document. She then installs Russian as an input language group and returns to her word processing program. However, Michelle is unable to complete the Russian portion of the document.

You need to help Michelle type in Russian using her word processing program. What should you do?

nmlkj Change the language preference from English to Russian in Michelle’s word processing program.

nmlkjSave Michelle’s document and close the word processing program. Instruct Michelle to log off and back on to her computer. Restart the word processing program and select Russian in the language toolbar.

nmlkjiSave Michelle’s document and close the word processing program. Select Russian in the language toolbar and restart the word processing program.

nmlkj Install the Russian version of Windows XP Professional.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. All Windows XP Professional computers in your company came with a pre-installed version of a software application. You need to update the computers by deploying the latest service release for the software application to all Windows XP Professional computers in the company’s domain.

You create a group policy object that assigns the update to all computers. You apply the group policy object to each OU containing Windows XP Professional computers. The service release is successfully applied to all computers except one.

You need to make sure the service release is applied to all computers. What should you do?

nmlkji Restart Windows Installer on the computer that failed to install the service release.

nmlkj Re-deploy the service release using a .zap file.

nmlkj Repackage and re-deploy the Windows Installer package.

nmlkj Re-deploy the Windows Installer package. Publish the package rather than assigning it.

Hacked by Piratez 70-270

Page 223: 70 270 q & a

The problem is obviously with the single computer, because all other computers are working correctly. Therefore, you should not change the installer files or server settings.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #260]

Explanation:

An .msp file can patch an .msi file, but it cannot be deployed by itself. The supplier of the Windows Installer patch should include instructions about how to use the Windows Installer patch to update the Windows Installer package. Afterwards you must redeploy the package.

To redeploy an assigned or published package:

1. Open the Software Installation snap-in. 2. Locate the Group Policy object that originally deployed the application. 3. Click the package name, or browse to locate the package. 4. Right-click All Tasks. 5. Click Redeploy Application.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #268]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. You need to deploy a software application to all Windows XP Professional computers in your domain.

You create a group policy object that assigns the appropriate .msi file to all computers. You apply the group policy object to each OU containing Windows XP Professional computers. The software is successfully deployed to all computers. After deploying the software, you discover that a patch is available for the application.

You want to apply the patch to all computers. What should you do?

nmlkj Create a new group policy object that deploys a .msp file. Deploy the group policy object.

nmlkj Replace the .msi file on the network server with a .msp file. Redeploy the group policy object.

nmlkj Use the msiexec command to apply a .mst file. Redeploy the group policy object.

nmlkji Use the msiexec command to apply a .msp file. Redeploy the group policy object.

nmlkj Replace the .msi file on the network server with a .mst file. Redeploy the group policy object.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system All computers are members of a single Active Directory domain You need to deploy a software

Hacked by Piratez 70-270

Page 224: 70 270 q & a

Explanation:

Transform files (.mst files) are applied at the time you publish or assign a software package. They change the .msi file. In this scenario, two group policy objects are needed. One should distribute the .msi file without the transform file to all OUs except the Marketing OU. The other group policy object should distribute the .msi file and the transform file to the Marketing OU.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #284]

Explanation:

operating system. All computers are members of a single Active Directory domain. You need to deploy a software application to all Windows XP Professional computers in your domain. Computers in the Marketing OU require a special customization to the software.

You create a .msi file for the software application and a .mst file that applies the needed customizations for the computers in the Marketing OU. You create a group policy object that publishes the appropriate .msi file to users. You apply the group policy object to each OU containing Active Directory user accounts. Currently, computers in the Marketing OU are not receiving the necessary customizations.

You want the customizations in the .mst file to apply to computers in the Marketing OU. What should you do?

nmlkj Publish the software rather than assigning it.

nmlkjCopy the .mst file to the software distribution folder. Make sure all users in the Marketing OU have appropriate permissions to the .mst file.

nmlkj Use the msiexec command to apply the .mst file. Redeploy the group policy object to the Marketing OU.

nmlkjiCreate a new group policy object that deploys the .msi file and the .mst file. Deploy the new group policy object to the Marketing OU rather than using the original group policy object.

nmlkjReplace the .msi file on the network server with the .mst file. Redeploy the group policy object to the Marketing OU.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. You need to deploy a software application to all Windows XP Professional computers in your domain.

You create an .msi file that deploys the software application, then you deploy the software using a group policy object. You assign the software to computers. During the deployment, users report that the installation is aborting with random errors midway through the installation process.

You want the software to install successfully. What should you do?

nmlkj Redeploy the Windows Installer package. Publish the package rather than assigning it.

nmlkji Repackage and re-deploy the application's .msi file.

nmlkj Redeploy the application using a .zap file.

nmlkj Start Windows Installer on all computers.

Hacked by Piratez 70-270

Page 225: 70 270 q & a

Because this error appears to be happening on all computers, it is most likely that the source of the problem is the installation package itself. Repackage the application, and redeploy it. The Windows Installer service was running on the computers or the software installation would not have begun. A .zap file is simply a file that references a Setup.exe file on the network. Because you are using a Windows Installer .msi file, you do not need a .zap file. Publishing the package rather than assigning it will not likely make a difference.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #292]

Explanation:

You can use the msiexec command to install a Windows Installer package (.msi file). Use the /i switch to specify the package file. To apply transforms, append TRANSFORMS = along with a list of transform files (.mst files).

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #300]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. A user named Michelle in the marketing department needs to install a software application on her computer only. She has a Windows Installer package (.msi) file named App.msi and a transform (.mst) file named Custom.mst that provides some desired customizations. Both files are located in the root folder of her computer’s D: drive.

You want to install the software application including the customizations. What should you do?

nmlkji Run the msiexec /i D:/App.msi TRANSFORMS = D:/Custom.mst command.

nmlkj Run the msiexec /p D:/Custom.mst /a D:/App.msi command.

nmlkj Run the D:/Custom.mst /a D:/App.msi command.

nmlkj Run the wininst /i D:/App.msi TRANSFORMS = D:/Custom.mst command.

nmlkj Run the wininst /p D:/Custom.mst /a D:/App.msi command.

nmlkj Run the D:/App.msi TRANSFORMS = D:/Custom.mst command.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. All user accounts are located in a single OU called Company Users. A user administrator has been delegated control over the Company Users OU to perform maintenance on user accounts, such as modifying information and unlocking accounts. Because each department has different requirements for computers, each department is represented by a separate OU. This OU holds computers, groups, and printers used within the department.

You have been provided with a new version of a custom application used by the sales department. The package is

Hacked by Piratez 70-270

Page 226: 70 270 q & a

Explanation:

Because computers need this software application, you need to edit the Computer Configuration node of a GPO and assign the software (you cannot publish software to computers). Because computers in the Sales OU need this software, you should link the GPO to the Sales OU.

Assigning or publishing the package to the Users within the Sales OU would not suffice, as there are no user accounts in the Sales OU. Assigning or publishing the package to the Company Users OU would apply the package to all users regardless of which department they are a member of.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #310]

a Windows Installer package provided by the vendor that has already been tested to function on the Windows XP Professional systems without known problems.

You need to deploy this package to computers in the sales department using the least amount of administrative effort. What should you do?

nmlkjPlace the package on a network file share. Create a new GPO that publishes the package using the Software Installation option in the User Configuration node. Link the GPO to the Sales OU.

nmlkjiPlace the package on a network file share. Create a new GPO that assigns the package using the Software Installation option in the Computer Configuration node. Link the GPO to the Sales OU.

nmlkjPlace the package on a network file share. Create a new GPO that publishes the package using the Software Installation option in the Computer Configuration node. Link the GPO to the Company Users OU.

nmlkjPlace the package on a network file share. Create a new GPO that assigns the package using the Software Installation option in the User Configuration node. Link the GPO to the Sales OU.

nmlkjPlace the package on a network file share. Create a new GPO that publishes the package using the Software Installation option in the User Configuration node. Link the GPO to the Company Users OU.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. All user accounts are located in a single OU called Company Users. A user administrator has been delegated control over the Company Users OU to perform maintenance on user accounts, such as modifying information and unlocking accounts. Because each department has different requirements for computers, each department is represented by a separate OU. This OU holds computers, groups, and printers used within the department.

You have been provided with a new version of a custom application used by the sales department. The package is a Windows Installer package provided by the vendor that has already been tested to function on the Windows XP Professional systems without known problems. You want to deploy this package to users in the sales department.

You put the .msi file in a network file share and verify appropriate permissions for sales users. You then create a new GPO that assigns the software package using the Software Installation option in the User Configuration node. You link the GPO to the Sales OU. None of the users in the sales department are receiving the software package.

You want all users in the sales department to receive the software application. You do not want other users in the company to receive the application. What should you do?

Hacked by Piratez 70-270

Page 227: 70 270 q & a

Explanation:

Because users need this software application, you need to edit the User Configuration node rather than the Computer Configuration node. You should then link the GPO to an OU that contains the user accounts that need the desired software. To prevent other users from receiving the software, put only users who need the software in the OU. Another solution is to modify the permissions to the GPO so only users who need the software have permission to apply the GPO. Publishing rather than assigning the software would not fix the problem noted in this scenario. The gpupdate command will have no effect until the software is deployed correctly.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #319]

Explanation:

Assigning software to a user puts a shortcut on the user's Start menu. When the shortcut is clicked, it is automatically installed. The software is currently being published rather than assigned.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

nmlkj Publish the software rather than assigning it.

nmlkji Put all sales users in their own OU. Link the GPO to that OU.

nmlkj Link the GPO to the Company Users OU.

nmlkj Run the gpupdate command on all sales computers.

nmlkj Configure the Computer Configuration node of the GPO rather than the User Configuration node.

You are the network administrator of an Active Directory domain. All workstations in the domain run Windows XP Professional. The domain has an OU named Sales. All users in the Sales OU use an application named ContactTrack. You want all Sales users to have a shortcut to the ContactTrack application in their Start menu. The first time they click the shortcut, you want the ContactTrack application to be installed.

You create a GPO named Deploy Software, configure it to publish the ContractTrack application to users, and link the GPO to the Sales OU. Soon you discover that the shortcut does not appear in any user's Start menu.

You want to fix the problem. What should you do?

nmlkjAdd users in the Sales OU to the Deploy Software GPO's access control list, and grant them Read and Apply Group Policy permissions.

nmlkj Link the GPO to the domain rather than to the Sales OU.

nmlkjConfigure the Computer Configuration node rather than the User Configuration node of the Deploy Software GPO.

nmlkjConfigure the Deploy Software GPO to refer to a network share where the ContactTrack installation files are located.

nmlkji Configure the Deploy Software GPO to assign rather than publish the ContractTrack software.

Hacked by Piratez 70-270

Page 228: 70 270 q & a

TestOut for Windows XP Administration, Section 8.1

[503 #328]

Explanation:

Assigning software to a user puts a shortcut on the user's Start menu. When the shortcut is clicked, the software is automatically installed. Assigning software to a computer automatically installs the software when the computer starts up.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #337]

You are the network administrator of an Active Directory domain. All workstations in the domain run Windows XP Professional. The domain has an OU named Sales. All users in the Sales OU use an application named ContactTrack. You want to install this application to all computers in the Sales OU.

You create a GPO named Deploy Software, configure it to assign the ContractTrack application to users, and link the GPO to the Sales OU. Although the shortcut appears in the Start menu for Sales users, the application is not installed until users click the shortcut.

You want the GPO to install the application completely. What should you do?

nmlkj Configure the Deploy Software GPO to publish rather than assign the ContractTrack software.

nmlkjiConfigure the Computer Configuration node rather than the User Configuration node of the Deploy Software GPO.

nmlkjConfigure the Deploy Software GPO to refer to a network share where the ContactTrack installation files are located.

nmlkj Link the GPO to the domain rather than to the Sales OU.

nmlkjAdd users in the Sales OU to the Deploy Software GPO's access control list, and grant them Read and Apply Group Policy permissions.

You are the network administrator of an Active Directory domain. All workstations in the domain run Windows XP Professional. The domain has an OU named Sales. All users in the Sales OU use an application named ContactTrack. You want this application to be available in the Add or Remove Programs applet of all computers in the Sales OU. You do not want a shortcut to the program to appear on users' Start menu.

You create a GPO named Deploy Software, configure it to assign the ContractTrack application to users, and link the GPO to the Sales OU. However, after you do so, the shortcut appears in the Start menu for all Sales users.

You want to prevent the shortcut from appearing on users’ Start menus. What should you do?

nmlkjAdd users in the Sales OU to the Deploy Software GPO's access control list, and grant them Read and Apply Group Policy permissions.

nmlkj Link the GPO to the domain rather than to the Sales OU.

nmlkjConfigure the Deploy Software GPO to refer to a network share where the ContactTrack installation files are located.

Hacked by Piratez 70-270

Page 229: 70 270 q & a

Explanation:

Assigning software to a user puts a shortcut on the user's Start menu. When the shortcut is clicked, it is automatically installed. To prevent the shortcut from appearing on the Start Menu and force users to install the software using the Add/Remove Programs applet, you should publish the software rather than assigning it.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #346]

Explanation:

The problem is with the single computer, because all other computers are working correctly. Therefore, you should not change the installer files or server settings.

Objective(s):

503. Manage applications by using Windows Installer packages.

Reference(s):

TestOut for Windows XP Administration, Section 8.1

[503 #356]

nmlkj Deny all sales users the Write permission to the Start Menu folder.

nmlkji Configure the Deploy Software GPO to publish rather than assign the ContractTrack software.

nmlkjConfigure the Computer Configuration node rather than the User Configuration node of the Deploy Software GPO.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. You need to deploy a Microsoft Office XP service release to all Windows XP Professional computers in the company’s domain.

You create a group policy object that assigns the update to all computers. You apply the group policy object to the domain. The service release is applied successfully to all computers except one.

You need to make sure the service release is applied to all computers. What should you do?

nmlkji Restart Windows Installer on the computer that failed to install the service release.

nmlkj Redeploy the Windows Installer package. Publish the package rather than assigning it.

nmlkj Repackage and redeploy the Windows Installer package.

nmlkj Redeploy the service release using a .zap file.

Hacked by Piratez 70-270

Page 230: 70 270 q & a

600

Implementing, Managing, and

Troubleshooting Network

Protocols and Services

Page 231: 70 270 q & a

Hacked by Piratez 70-270

Exhibit 1

Exhibit 2

Click the Exhibits button and use the exhibits to answer the following question.

Exhibits

You are the network administrator for your company's Los Angeles network. This network is connected to two other locations, San Francisco and Portland, as shown in Exhibit 1. All networks use the default subnet mask.

The user at Host A cannot contact any hosts in the San Francisco or Portland locations. A ping test to the LAX1 router (192.168.1.1) succeeds. Ping tests to all other routers fail. No other users have reported a problem. On Host A, you use the route print command. The output is shown in Exhibit 2.

You need to let Host A communicate with hosts in San Francisco and Portland. What should you do?

nmlkj Change the default gateway for Host A to 127.0.0.1.

nmlkj Change the subnet mask for Host A.

nmlkji Configure a default gateway for Host A.

nmlkj Remove entries in Host A's route table for LAN adapters that do not exist.

Page 232: 70 270 q & a

Explanation:

Host A does not have a default gateway (also called a default route) configured. The default gateway would be indicated by a route to network 0.0.0.0 using a mask of 0.0.0.0. The gateway address for this route would be set to the LAX1 router address (192.168.1.1).

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #260]

Click the Exhibit button and use the exhibit to answer the following question.

Exhibit

You administer the network shown in the exhibit. The network consists of a single subnet connected to the Internet. Earlier in the day, the router connecting the network to the Internet failed. You replaced the router and configured it exactly the same as the previous router.

The user of computer Host A can no longer browse the Internet. The user can still contact hosts on the private network. A ping test to the router (172.16.11.5) fails.

You need to let Host A use the Internet. What should you do?

nmlkj Reconfigure the DNS server setting.

nmlkji Clear the ARP cache.

nmlkj Reconfigure the default gateway.

nmlkj Clear the DNS cache.

nmlkj Reregister the DNS host name for Host A.

nmlkj Replace the network card.

Hacked by Piratez 70-270

Page 233: 70 270 q & a

Exhibit

Explanation:

Clearing the ARP cache will likely correct this problem. The Address Resolution Protocol is used to find the physical (MAC) address for a given IP address. Because the router has been replaced, the MAC address associated with IP address 172.16.11.5 has also changed. Host A "remembers" the old MAC address for address 172.16.11.5.

Other hosts might not be having the same problem because they might have rebooted after the upgrade, or did not have that information in their cache. Hosts also remove entries that have not been used in the past few minutes from their ARP cache.

Changing the default gateway would fix the problem if the IP address had been modified on either the router or the host. However, the IP address is the same and it is unlikely that any changes had been made to the host.

Modifying DNS settings will not fix the problem. Because the ping test to the default router failed, you know that the problem is not related to DNS. You must establish basic communication before performing name resolution.

Ironically, replacing the network card would solve the problem because you would reboot the workstation to complete the repair. However, it would be an unnecessary action. You should realize that the network card is not the problem because Host A can still communicate with other hosts on the private network.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #272]

Click the Exhibit button and use the exhibit to answer the following question.

Exhibit

You are the network administrator for your company's Los Angeles network. This network is connected to two other locations, San Francisco and Portland, as shown in the exhibit. All networks use the default subnet mask.

Users report that communication with remote sites seems sluggish. Some users report intermittent errors that seem to have no pattern. You suspect that there might be a failing link or network congestion that results in packet loss between sites.

You want to identify possible network delay and packet loss problems. What should you do?

nmlkj On Host A, tracert to Host B.

nmlkj On Host A ping Host B

Hacked by Piratez 70-270

Page 234: 70 270 q & a

Exhibit

Explanation:

Use pathping to trace the path to a remote host and gather statistics regarding network delay and packet loss. The ping command simply reports if the test failed or succeeded. The tracert command is only a partial solution because it reports each hop in the path and round trip times between each router but does not report packet loss statistics. The nbtstat command is used to troubleshoot NetBIOS name resolution. The netdiag command is used to analyze local host configuration and connectivity.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #285]

nmlkj On Host A, ping Host B.

nmlkj On Host A, run nbtstat.

nmlkji On Host A, pathping to Host B.

nmlkj On HostA, run netdiag.

Click the Exhibit button and use the exhibit to answer the following question.

Exhibit

You administer your company's network shown in the exhibit. You have just added a new host to the network (Host A). You need to manually configure the TCP/IP properties for Host A. At SRV1, you run ipconfig and discover that the subnet mask is 255.255.255.224.

Hacked by Piratez 70-270

Page 235: 70 270 q & a

Exhibit

Explanation:

The only possible addresses in this list are 192.168.1.15 and 192.168.1.5. 192.168.1.11 is already in use by another host. 192.168.1.31 is the broadcast address for the subnet and should not be assigned to a specific host.

To answer this question, you must first identify the subnet address and the range of IP addresses on the subnet. To find the subnet address:

1. Convert the subnet mask to binary. Focus on the octet that is different than 255 or 0. In this example, 224 converts to 11100000 binary.

2. Convert a known IP address on the subnet to binary. Focus on the last octet masked by the subnet mask. In this example, you know the IP address for SRV1 is 192.168.1.11. The last octet converts to 1011 binary. Add 0's to the front to complete the octet (00001011).

3. Compare the binary forms of the IP address and masks. In this example you are comparing 11100000 with 00001011 4. For every bit in the mask that is a 0, convert the corresponding bit in the IP address to 0. For every bit in the mask

that is a 1, leave the value in the IP address alone. In this example, you are left with 00000000. 5. Convert the octet you are working with to decimal. Change this value in the IP address. If there are any octets to the

right of the one you are working with, set them to 0 as well. In this example, you have the subnet address of 192.168.1.0.

Now that you have the subnet address, you have to find the range of addresses on the subnet.

1. Convert the subnet mask to binary. Focus on the octet that is different than 255 or 0. In this example, 224 converts to 11100000 binary.

2. Identify the right-most 1 bit. Convert all other 1's to 0's. In this example, this leaves you with 100000. 3. Convert this value to decimal. This is the increment value. In this example, the increment value is 32. 4. Add the increment value to the subnet address to find the next subnet address. In this example, the next subnet

address is 192.168.1.32. All addresses between 192.168.1.0 and 192.168.1.31 belong to the first subnet. 5. Remove the subnet address (192.168.1.0) and the broadcast address (192.168.1.31) from the range. You cannot

assign these addresses to hosts. This leaves you with possible host addresses between 192.168.1.1 and 192.168.1.30.

6. Remove any addresses already assigned to other hosts. You should not assign the same address to two hosts.

Objective(s):

Assuming there are no other hosts on the network other than those shown in the exhibit, which of the following are valid IP addresses for Host A? (Choose all that apply.)

gfedcb 192.168.1.15

gfedc 192.168.1.60

gfedc 192.168.1.31

gfedcb 192.168.1.5

gfedc 192.168.1.124

gfedc 192.168.1.11

Hacked by Piratez 70-270

Page 236: 70 270 q & a

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #297]

netdiag4

Explanation:

The only possible address in this list is 192.168.4.195. 192.168.4.161 is already in use by another host. 192.168.1.255 is the broadcast address, and 192.168.4.128 is the subnet address. None of the other addresses are within the range of valid addresses for the subnet.

To answer this question, you must first identify the subnet address and the range of IP addresses on the subnet. To find the subnet address:

1. Convert the subnet mask to binary. Focus on the octet that is different than 255 or 0. In this example, 128 converts to 10000000 binary.

2. Convert a known IP address on the subnet to binary. Focus on the last octet masked by the subnet mask. In this example, you know the IP address for the default gateway (the near side of the router) is 192.168.4.161. The last octet converts to 10100001 binary. Add 0's to the front to complete the octet (if necessary).

3. Compare the binary forms of the IP address and masks. In this example you are comparing 10000000 with 10100001

Click the Exhibit button and use the graphic to answer the following question.

Exhibit

You administer your company's network that is shown in the exhibit. You just added a new host to the network (Host A). You need to manually configure the TCP/IP properties for Host A. At SRV1, you run ipconfig and discover that the subnet mask is 255.255.255.128. Assuming there are no other hosts on the network other than those shown, which of the following IP addresses can you assign to Host A? (Choose all that apply.)

gfedc 192.168.4.128

gfedc 192.168.4.60

gfedc 192.168.4.255

gfedcb 192.168.4.195

gfedc 192.168.4.161

gfedc 192.168.4.124

gfedc 192.168.4.1

Hacked by Piratez 70-270

Page 237: 70 270 q & a

4. For every bit in the mask that is a 0, convert the corresponding bit in the IP address to 0. For every bit in the mask that is a 1, leave the value in the IP address alone. In this example, you are left with 10000000.

5. Convert the octet you are working with to decimal. Change this value in the IP address. If there are any octets to the right of the one you are working with, set them to 0 as well. In this example, you have the subnet address of 192.168.4.128.

Now that you have the subnet address, you have to find the range of addresses on the subnet.

1. Convert the subnet mask to binary. Focus on the octet that is different than 255 or 0. In this example, 128 converts to 10000000 binary.

2. Identify the right-most 1 bit. Convert all other 1's to 0's. In this example, this leaves you with 10000000. 3. Convert this value to decimal. This is the increment value. In this example, the increment value is 128. 4. Add the increment value to the subnet address to find the next subnet address. In this example, the next subnet

address is 192.168.5.0. All addresses between 192.168.4.128 and 192.168.4.255 belong to the subnet. 5. Remove the subnet address (192.168.4.128) and the broadcast address (192.168.4.255) from the range. You cannot

assign these addresses to hosts. This leaves you with possible host addresses between 192.168.4.129 and 192.168.4.254.

6. Remove any addresses already assigned to other hosts. You should not assign the same address to two hosts.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #310]

Exhibit 1

Click the Exhibits button and use the graphics to answer the following question.

Exhibits

You are the network administrator for your company's network shown in Exhibit 1. SRV2 is a domain controller that hosts an Active Directory integrated DNS zone for the network. SRV1 is an application server that is a domain member. Both subnets use the default subnet mask. All hosts and servers have been manually configured with TCP/IP parameters.

You add Host B to the network and configure its TCP/IP properties. You perform a series of ping tests and find that Host B cannot communicate with any host on either subnet. You run ipconfig /all to verify the TCP/IP configuration of Host B. The output is shown in Exhibit 2.

You need to enable Host B to communicate with all other hosts on the network. What should you do?

nmlkji Reconfigure the IP address to 192.168.2.15.

nmlkj Change the default gateway to 192.168.1.1.

nmlkj Change the DNS server address to 192.168.2.12.

nmlkj Clear the ARP cache.

nmlkj Change the subnet mask to 255.255.0.0.

Hacked by Piratez 70-270

Page 238: 70 270 q & a

Exhibit 2

Explanation:

The address for Host B is on subnet 192.168.1.0 instead of subnet 192.168.2.0. You need to change the address to an address on the correct subnet (such as address 192.168.2.15).

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #343]

Click the Exhibits button and use the graphics to answer the following question.

Exhibits

You are the network administrator for your company's network shown in Exhibit 1. SRV2 is a domain controller that hosts an Active Directory integrated DNS zone for the network. SRV1 is an application server that is a domain

Hacked by Piratez 70-270

Page 239: 70 270 q & a

Exhibit 1

Exhibit 2

Explanation:

Host A is on subnet 192.168.1.0. Therefore, the subnet mask should be 255.255.255.0. The ipconfig output shows that

member. Both subnets use the default subnet mask. All hosts and servers have been manually configured with TCP/IP parameters.

You add Host A to the network and configure its TCP/IP properties. You perform a series of ping tests and find that Host A cannot communicate with any host on either network. You run ipconfig /all to verify the TCP/IP configuration of Host A. The output is shown in Exhibit 2.

You need to enable Host A to communicate with all other hosts on the network. What should you do?

nmlkji Change the subnet mask to 255.255.255.0.

nmlkj Change the DNS server address to 192.168.1.1.

nmlkj Reconfigure the IP address to 192.168.2.15.

nmlkj Change the default gateway to 192.168.2.12.

nmlkj Clear the ARP cache.

Hacked by Piratez 70-270

Page 240: 70 270 q & a

Host A has been configured with the wrong subnet mask (255.255.0.0 instead of 255.255.255.0). Change the subnet mask.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #356]

Exhibit 1

Exhibit 2

Click the Exhibits button and use the graphics to answer the following question.

Exhibits

You are the network administrator for your company's network shown in Exhibit 1. SRV2 is a domain controller that hosts an Active Directory integrated DNS zone for the network. SRV1 is an application server that is a domain member. Both subnets use the default subnet mask. All hosts and servers have been manually configured with TCP/IP parameters.

The user of Host A reports problems connecting to SRV1. You ping to SRV1's IP address. The test succeeds. You use ipconfig /all to verify the TCP/IP configuration of Host A. The output is shown in Exhibit 2.

You need to let the user of Host A contact SRV1. What should you do?

nmlkji Change the DNS server address to 192.168.2.6.

nmlkj Change the default gateway to 192.168.2.12.

nmlkj Reconfigure the IP address to 192.168.2.15.

nmlkj Change the subnet mask to 255.255.0.0.

nmlkj Clear the ARP cache.

Hacked by Piratez 70-270

Page 241: 70 270 q & a

Explanation:

Host A has the wrong address configured for the DNS server. Host A can communicate with SRV1 using the IP address. The user's problem likely occurred when he tried to contact the server using its name.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #369]

You are the network administrator for a branch office of your company. One day you get a call from a user complaining that a certain server is inaccessible. The server is located on the other side of a WAN link that connects the branch office to the main network.

At your workstation, you successfully connect to the target server. You go to the user's workstation and continue troubleshooting. You perform a series of ping tests to try to narrow the scope of the problem. You ping the destination server and fail. You ping another host on the same network as the destination server and fail. You ping a host on another remote network and fail. You ping another host on the local network and fail. Finally, you ping the local loopback address and succeed.

You need to narrow the scope of the problem. Based on the results of the tests performed so far, which of the following are possible causes of the problem? (Choose all that apply.)

gfedcb The workstation's network cable or network connection is bad.

gfedc TCP/IP has not been properly configured on the workstation.

gfedc The ARP cache has stale entries.

gfedc The default gateway value has been set incorrectly.

gfedcb The workstation's IP address and/or mask has been incorrectly configured.

Hacked by Piratez 70-270

Page 242: 70 270 q & a

Explanation:

The workstation is unable to contact any other host. This indicates a bad physical connection, or a misconfiguration of the IP address or mask. Hosts must have addresses that are recognized by other hosts before communication can take place.

A successful ping to the localhost address indicates that TCP/IP has been properly configured. If the default gateway were set incorrectly, the workstation should still be able to communicate with other hosts on the network. Stale ARP cache entries would prevent communication to specific hosts, but it is unlikely that the cache would contain entries for all hosts on the local network.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #382]

Explanation:

The problem is isolated to a single destination device. The problem could be caused by the device being unavailable or misconfigured, a bad network card connected at the destination device, or a stale ARP cache entry at the remote router. (The router must identify the MAC address of the destination device before it can forward the message to the destination device.)

You know that the problem is not with the default gateway router configuration because messages sent to other hosts on the destination network are delivered correctly. A HOSTS file entry would affect being able to contact the destination device by name, but would have no effect when using the IP address. Stale entries in the ARP cache on the source workstation would only affect communication with hosts within the local subnet. Because the destination device is on a different network, the workstation does not need to know its MAC address. Rather, it sends the message to the default gateway router. The workstation must discover the MAC address for the default gateway.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

You are the network administrator for a branch office of your company. One day a user complains that a certain server is inaccessible. The server is located on the other side of a WAN link that connects the branch office to the main network.

You perform a series of ping tests to try to narrow the scope of the problem. You ping the destination server and fail. You ping another host on the same network as the destination server and succeed. You ping a host on another remote network and succeed. Finally, you ping the destination server from another workstation and fail.

You need to narrow the scope of the problem. Based on the results of the tests performed so far, which of the following are possible causes of the problem? (Choose all that apply.)

gfedc The default gateway router connected to the local network does not have a route to the destination host.

gfedc The default gateway on the source workstation is set incorrectly.

gfedcb The router connected to the destination network has a stale ARP cache entry for the destination device.

gfedcb The destination computer is unavailable.

gfedc An entry in the HOSTS file points to the wrong destination device.

gfedc The source workstation has a stale ARP cache entry for the destination device.

Hacked by Piratez 70-270

Page 243: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #391]

Explanation:

The most likely cause of the problem is a misconfiguration or unavailability of the default gateway router. The problem exists for all hosts on the local network, so it is not likely related to problems with any single workstation. The problem is likely not caused by the DHCP server because the ping test directly to the default gateway failed.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #401]

You are a network administrator for your company. You just finished installing a new workstation on the network. The workstation is configured to receive its IP address and other TCP/IP configuration from a DHCP server. You perform a series of ping tests to verify network connectivity.

You ping the local loopback address and succeed. You ping various hosts on the same network and succeed. You ping various hosts on remote networks and fail. You ping the same remote hosts from other workstations on the network and fail. You ping the default gateway from several workstations on the network and fail.

You need to narrow the scope of the problem. Based on the results of the tests performed so far, which of the following are possible causes of the problem? (Choose all that apply.)

gfedcb The default gateway router is unavailable or is misconfigured.

gfedc The DHCP server has incorrectly set the default gateway address.

gfedc TCP/IP is incorrectly configured on the workstation.

gfedc The new workstation has a stale ARP entry for the default gateway.

You administer your company's network shown below. You just added Host B to the network. You need to manually configure the TCP/IP properties for Host B. All hosts use manually-configured IP addresses and default subnet masks. SRV1 is the DNS server for the entire network. How should you configure Host B? (To answer, drag a value to each TCP/IP parameter.)

192.168.1.0 192.168.2.0 255.0.0.0 192.168.2.115 IP Address

192.168.1.1 192.168.2.6 255.255.0.0 255.255.255.0 Subnet Mask

192.168.1.11 192.168.2.12 255.255.255.0 192.168.2.12 Default Gatewa

192.168.1.115 192.168.2.115 255.255.255.255 192.168.1.11 DNS Server

Hacked by Piratez 70-270

Page 244: 70 270 q & a

Explanation:

Host B is on subnet 192.168.2.0. You can identify the subnet address by looking at the IP addresses assigned to each host on the network. The router connected to the subnet has an IP address of 192.168.2.12. Using the default mask of 255.255.255.0, the subnet address is 192.168.2.0. Host B must be assigned an address on this subnet. The only option is 192.168.2.115. The other addresses in the list, 192.168.2.6 and 192.168.2.12, are used by other hosts on the network.

For the default gateway, use the router that connects the subnet to the rest of the network. The default gateway address must identify the interface that is on the same subnet as the host. For Host B, use 192.168.2.12 as the default gateway.

Configure 192.168.1.11 for the DNS server. The DNS server does not have to be on the same subnet as the host.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #409]

Explanation:

Host A is on subnet 192.168.2.0. You can identify the subnet address by looking at the IP addresses assigned to each host

You are the network administrator for your company. Your company has a small network connected to the Internet as shown below. All hosts use manually configured IP addresses and the default subnet mask. You install a new host on the network (Host A). How should you configure Host A? (To answer, drag a value to each TCP/IP parameter.)

66.11.177.12 192.168.1.254 255.0.0.0

66.11.177.13 192.168.2.1 255.255.0.0 192.168.2.15 IP Address

192.168.1.1 192.168.2.15 255.255.255.0 255.255.255.0 Subnet Mask

192.168.1.15 255.255.255.255 192.168.2.1 Default Gatewa

Hacked by Piratez 70-270

Page 245: 70 270 q & a

on the network. The router connected to the subnet has an IP address of 192.168.2.1. Using the default mask of 255.255.255.0, the subnet address is 192.168.2.0. Host A must be assigned an address on this subnet. The only option is 192.168.2.15. The other address in the list, 192.168.2.1, is used by the router.

For the default gateway, use the router that connects the subnet to the rest of the network. The default gateway address must identify the interface that is on the same subnet as the host. For Host A, use 192.168.2.1 as the default gateway.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #433]

Explanation:

To configure a Windows XP computer to use a WINS server first and then to use broadcasts for NetBIOS name resolution, simply add the WINS server address(es) to the TCP/IP properties. Without any WINS servers listed, the computer will use only broadcasts for name resolution.

You can edit the registry to modify the node type of the computer. However, the computer will not use a WINS server without WINS server addresses listed in its TCP/IP properties. Adding the WINS server addresses automatically changes the node type. Editing the registry is an unnecessary step.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #454]

You are the network administrator for your company. The network has three subnets and uses manually-configured, static IP addressing. Network servers provide DNS and WINS services for name resolution. Windows XP Professional, Windows 2000 Professional, Windows NT 4.0 Workstation, Windows ME, and Windows 98 client computers exist on the network.

You install a new Windows XP Professional computer on the network and assign it an IP address, subnet mask, and default gateway. You want the new computer to use a WINS server for NetBIOS name resolution, and to use broadcasts if the WINS server is unavailable. What should you do? (Choose all that apply.)

gfedc Edit the registry to change the NetBIOS node type to hybrid.

gfedcb Add the WINS server address(es) to the TCP/IP properties.

gfedc Nothing. By default, the workstation will try to locate a WINS server. If unsuccessful, it will use broadcasts.

gfedc Edit the LMHOSTS.SAM file to change the node type to hybrid.

gfedc Add the WINS server address(es) to the LMHOSTS.SAM file on the local system.

Click the Exhibits button and use the graphics to answer the following question.

Exhibits

Hacked by Piratez 70-270

Page 246: 70 270 q & a

Exhibit 1

Exhibit 2

Exhibits

You are the network administrator for your company's network shown in Exhibit 1. SRV2 is a domain controller that hosts an Active Directory integrated DNS zone for the network. All servers and clients on the network have been manually configured with IP addresses and other TCP/IP parameters.

The user at Host B reports that SRV1 is inaccessible. You ping the server IP address (192.168.1.11) and succeed. However, when you ping using the host name, you receive an "Unknown host" error. You ping the DNS server address (192.168.2.6) and succeed. Finally, you perform an nslookup request for SRV1. The output of the command is shown in Exhibit 2.

You want to let the user of Host B access SRV1. What should you do?

nmlkj On Host B, run arp -d *.

nmlkji On Host B, modify the DNS server address.

nmlkj On Host B, create a HOSTS file entry pointing to SRV1.

nmlkj On Host B, run ipconfig /flushdns.

nmlkj On SRV1, run ipconfig /registerdns.

nmlkj On SRV2, run ipconfig /flushdns.

Hacked by Piratez 70-270

Page 247: 70 270 q & a

Explanation:

Host B has been configured with the wrong DNS server address. When you use the nslookup command, the request is being submitted to 192.168.2.8 instead of 192.168.2.6. The lookup request is being sent either to a host that does not exist, or to a host that is not running the DNS service.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #472]

Click the Exhibits button and use the graphics to answer the following question.

Exhibits

You are the network administrator for your company's network shown in Exhibit 1. SRV2 is a domain controller that hosts a DHCP server and an Active Directory integrated DNS zone for the network. All other servers and clients on the network receive their IP address information through DHCP. Dynamic DNS updates have been enabled for the zone.

The user at Host A reports that SRV1 is inaccessible. You ping the server IP address (192.168.1.11) and succeed. You ping SRV1 using its host name. The command produces the output shown in Exhibit 2. You try unsuccessfully to reproduce the problem from another workstation.

You need to let the user at Host A access SRV1. What should you do?

nmlkj On SRV1, run ipconfig /registerdns.

nmlkj Manually configure the A record for SRV1 in the DNS database.

nmlkji On Host A run ipconfig /flushdns

Hacked by Piratez 70-270

Page 248: 70 270 q & a

Exhibit 1

Exhibit 2

Explanation:

The output for the ping command to SRV1 shows that the workstation is trying to reach SRV1 at 192.168.1.12 instead of 192.168.1.11. The workstation has the wrong address for SRV1. The problem is with the DNS cache on the workstation. Run ipconfig /flushdns to clear the DNS cache. This problem could have been caused by DHCP reassigning SRV1's IP address to another host, and Host A has not yet updated its DNS cache. A way to prevent this problem is to reserve SRV1's address in DHCP.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running ipconfig /flushdns to clear the DNS cache. Therefore, using the Repair option would also fix the problem in this scenario.

You know that the problem is not with the DNS database, because other workstations are not having the problem. Reregistering the host, allowing only secure updates, or manually configuring host records would not solve the problem.

Objective(s):

nmlkji On Host A, run ipconfig /flushdns.

nmlkj On SRV1, run ipconfig /release.

nmlkj Configure the Active Directory integrated DNS zone to accept only secure dynamic updates.

Hacked by Piratez 70-270

Page 249: 70 270 q & a

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #486]

Explanation:

Because no other workstations seem to be having the problem, the cause is likely with the workstation configuration. Run nbtstat -R to clear the NetBIOS name cache. This forces the workstation to contact the WINS server for the correct address information.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running nbtstat -R, so using the Repair option would also fix the problem in this scenario.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #499]

You are the network administrator for a multi-subnet network. Windows 2000 servers provide DNS, WINS, and DHCP services for network clients. All network servers run Windows 2000 Server. All client computers run either Windows XP Professional or Windows 98.

A user of a Windows XP Professional computer reports that a shared folder on a Windows 98 computer is inaccessible. From the Windows XP Professional computer, you ping the Windows 98 computer's IP address (192.168.11.4) and succeed. You ping the Windows 98 computer by NetBIOS name but fail. However, you notice that the workstation is trying to contact host 192.168.11.155. You try unsuccessfully to reproduce the problem from another workstation.

You need to let the user of the Windows XP Professional computer access the shared folder on the Windows 98 computer. What should you do?

nmlkj On the WINS server, manually create a static entry for the Windows 98 computer.

nmlkji On the Windows XP Professional computer, run nbtstat -R.

nmlkj On the WINS server, clear the NetBIOS cache.

nmlkj On the Windows 98 computer, run nbtstat -RR.

You are the desktop administrator for a branch office of your company. Your company's network consists of a main office and a branch office connected through WAN links. Your company uses Windows XP Professional as its client operating system. All client computers are members of a single Active Directory domain and receive their IP addresses through DHCP.

A company vice-president who normally works at the main office visits your branch office. The VP connects a laptop computer to your site's network but cannot access any local network resources. The VP says that the resources are accessible when the laptop is connected to the main office's network. You run ipconfig on the laptop and receive the following output:

i ifi ffi

Hacked by Piratez 70-270

Page 250: 70 270 q & a

Explanation:

If a DHCP server is unavailable, a Windows XP Professional computer automatically assigns itself an IP address using a process known as Automatic Private IP Addressing (APIPA). APIPA uses addresses on subnet 169.254.0.0. To fix this problem, make sure a DHCP server is available and renew the computer's IP address to receive a valid address from the DHCP server.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running ipconfig /renew, so using the Repair option would fix the problem in this scenario.

You might also want to disable Automatic Private IP Addressing so that a computer will not automatically assign its own IP address if the DHCP server fails. However, this is not a required part of the solution and can actually prevent a laptop computer from connecting to another network that uses automatically assigned IP addresses (such as a simple home network). To disable Automatic Private IP Addressing, add the IPAutoconfigurationEnabled value to the following registry key.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\GUID_of_the_adapter

IPAutoconfigurationEnabled has the data type REG_WORD. Set the value to 0 to disable Automatic Private IP Addressing.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #515]

Connection-specific DNS Suffix . :IP Address. . . . . . . . . . . . : 169.254.22.74 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . :

You want to let the vice-president connect to resources on your network. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Configure the DHCP server to assign clients the NoPrivateIP value.

gfedc Set the laptop's IPAutoconfigurationEnabled registry value to 0.

gfedcb Make sure a DHCP server is accessible.

gfedc Set the PrivateIP registry value to 0.

gfedcb Run ipconfig /renew on the laptop.

gfedc Open TCP/IP Properties and deselect Private IP allowed

gfedc Configure an alternate TCP/IP configuration.

You are the network administrator for your company. The network consists of 15 Windows 2000 Server computers and 300 Windows XP Professional computers. Your company has two Active Directory domains: westsim.com and westsim.co.jp. The company's intranet site is on a Windows 2000 Server computer named Server1. Server1 is a member of the westsim.com domain and is running Internet Information Services (IIS) and Microsoft Proxy Server 2.0.

You want to configure the Windows XP Professional computers in the westsim.co.jp domain to access the intranet site. You want users to be able to connect to the intranet site by using the URL http://server1/ rather than its fully qualified domain name. What should you do?

Hacked by Piratez 70-270

Page 251: 70 270 q & a

Explanation:

To access Server1 from outside its domain, a client computer needs to resolve the name to an IP address. If the client is using DNS, it needs the fully qualified domain name, which consists of the host name appended to the domain name (for example, server1.westsim.com). When you use the Domain Suffix Search Order option, it will try to resolve the name Server1 with DNS. When it fails, it will append the listed domain names to the server name and try to resolve the server name again. This means that when a user types in Server1 only, DNS will successfully resolve it to Server1.westsim.com.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #540]

Explanation:

Depending on the remote access server's configuration, when you dial in the server might assign your computer an IP address on the remote server's subnet. If so, and if a default gateway address is not delivered otherwise, you must configure your computer with the default gateway of the remote server's subnet before you will be able to access other subnets.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #548]

nmlkj Add westsim.co.jp to the exceptions list in the proxy server settings on the computers.

nmlkj Add westsim.co.jp to the Domain Suffix Search Order on the computers.

nmlkj Configure the proxy server settings on the computers to bypass the proxy server for intranet addresses.

nmlkji Add westsim.com to the Domain Suffix Search Order on the computers.

You are a help desk technician for your company. Your company recently installed a Windows 2000 remote access server that allows dial-up connections to your company's network.

An employee attempts to dial in to the company's network from home. The employee can access resources on the subnet where the remote access server is located, but cannot access resources on other subnets.

You need to configure the employee's dial-up connection to allow access to resources on other subnets. What should you do?

nmlkj Disable data encryption.

nmlkji Change the default gateway.

nmlkj Use SLIP instead of PPP.

nmlkj Configure the connection to allow only secured passwords.

Hacked by Piratez 70-270

Page 252: 70 270 q & a

Explanation:

Windows Internet Name Service (WINS) maps NetBIOS names to IP addresses. WINS servers maintain databases of static and dynamic resource name-to-IP-address mappings. You could also use LMHOSTS files to map NetBIOS names to IP addresses, but the administrative overhead would be much greater.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #556]

You are the network administrator for your company. Your network currently has a mixture of Windows XP Professional, Windows 95 and Windows 98 clients. The clients are distributed between three different subnets.

You plan to migrate your Windows 95 and Windows 98 clients to Windows XP Professional. However, the migration probably will not happen for at least another year. In the meantime, you would like to allow all of the clients to be able to connect to all of the other clients and share data and printers. However, you want to minimize the amount of administration that must take place when a new computer is added to the network or when a computer's IP address is changed.

You want to let client computers interact using user-friendly NetBIOS names. What should you do?

nmlkj Configure all of the client computers to use Automatic Private IP Addressing (APIPA).

nmlkj Implement HOSTS files on all of the client computers.

nmlkj Create a DNS server for the network and configure all of the client computers to use the DNS server.

nmlkj Implement LMHOSTS files on all of the client computers.

nmlkj Create a DHCP server for the network and configure all of the client computers to use the DHCP server.

nmlkj Configure all of the client computers to support multicasting.

nmlkji Create a WINS server for the network and configure all of the client computers to use the WINS server.

You are the desktop administrator for a branch office of your company. Your company's network consists of a main office and a branch office connected through WAN links. Your company uses Windows XP Professional as its client operating system. All client computers are members of a single Active Directory domain. Client computers at the main office receive their IP addresses through DHCP. Client computers at your branch office are manually configured with static IP addresses.

A company vice-president who normally works at the main office visits your branch office. The VP connects a laptop computer to your site's network but cannot access any local network resources. The VP says that the resources are accessible when the laptop is connected to the main office's network. You run ipconfig on the laptop and receive the following output:

Connection-specific DNS Suffix . : IP Address. . . . . . . . . . . . : 192.168.1.57 Subnet Mask . . . . . . . . . . . : 255.255.0.0 Default Gateway . . . . . . . . . :192.168.1.1

Your branch office's subnet is 192.168.4.0. You want to let the vice-president connect to resources at your branch office. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Set the PrivateIP registry value to 0.

Hacked by Piratez 70-270

Page 253: 70 270 q & a

Explanation:

If a DHCP server is unavailable, a Windows XP Professional computer automatically assigns itself an IP address using a process known as Automatic Private IP Addressing (APIPA) unless you manually configure an alternate TCP/IP address. If a computer sometimes connects to a network that uses DHCP and sometimes connects to a network that uses static IP addressing, configure an alternate TCP/IP address for connecting to the network with static IP addressing.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #578]

Explanation:

If a DHCP server is unavailable, a Windows XP Professional computer automatically assigns itself an IP address using a process known as Automatic Private IP Addressing (APIPA) unless you configure an alternate TCP/IP address. If a computer sometimes connects to a network that uses DHCP and sometimes connects to a network that uses static IP addressing, configure an alternate TCP/IP address for connecting to the network with static IP addressing.

You cannot create multiple Local Area Connections except by installing additional network cards. A script might work to change the TCP/IP configuration, but it is not an efficient solution.

d g y

gfedcb Configure an alternate TCP/IP configuration.

gfedc Set the laptop's IPAutoconfigurationEnabled registry value to 0.

gfedc Configure the DHCP server to assign clients the NoPrivateIP value.

gfedcb Restart the computer.

gfedc Open TCP/IP Properties and deselect Private IP allowed

gfedc Make sure a DHCP server is accessible.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its client operating system. All client computers are members of a single Active Directory domain. Client computers receive their IP addresses through DHCP.

A company vice-president takes a laptop computer home to do some work. The VP has a home network that uses static IP addresses. When the laptop is configured to use DHCP, it operates fine on the company network, but cannot connect to the VP's home network. When the laptop is configured with static IP addresses, the laptop operates fine on the VP's home network, but cannot connect to the company network.

You want to configure the laptop to connect to both the company network and the VP's home network. What should you do?

nmlkji Configure two TCP/IP configurations in the Local Area Connection's TCP/IP properties.

nmlkjCreate a second Local Area Connection. Create two hardware profiles. Disable the Local Area Connection for the home network in one profile. Disable the Local Area Connection for the company network in the other profile.

nmlkjInstruct the VP to change the value of the Obtain an IP address automatically setting in TCP/IP Properties depending on the laptop's location.

nmlkjWrite a script that change the computer's TCP/IP configuration to use DHCP. Write another script that changes the computer's configuration to use a static IP address. Tell the VP to run the appropriate script depending on the laptop's location.

Hacked by Piratez 70-270

Page 254: 70 270 q & a

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.2

[601 #589]

Explanation:

With dynamic DNS, a computer’s IP address and DNS name are automatically registered in the DNS database. In this scenario, the DNS database became out-of-sync with the current IP address of Jim’s computer. You need to run the ipconfig /registerDNS command on Jim’s computer to register the current IP address and DNS name of Jim’s computer with DNS. Sally will then be able to access the web site on Jim’s computer using a DNS name.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running ipconfig /registerDNS, so using the Repair option would also fix the problem in this scenario.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #600]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. The company network has a DHCP server and a DNS server with an Active Directory integrated zone. Client computers, the DHCP server, and the DNS server are all configured to support dynamic DNS.

The company’s DNS server was down last night for maintenance. This morning, Sally, a user in the sales department, cannot access an internal web site on Jim’s Windows XP Professional computer. Jim claims that he has not made any changes to his computer, and Sally says that she could access the web site yesterday.

You need to help Sally access Jim’s web site. What should you do?

nmlkj Reconfigure the DHCP server to support dynamic DNS.

nmlkj Reconfigure the DNS server to support dynamic DNS.

nmlkj Run ipconfig /registerDNS on Sally’s computer.

nmlkji Run ipconfig /registerDNS on Jim’s computer.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. The company network has a DHCP server and a DNS server with an Active Directory integrated zone. Client computers, the DHCP server, and the DNS server are all configured to support dynamic DNS.

Sally, a user in the sales department, cannot access an internal web site on Jim’s Windows XP Professional computer. Jim claims that he has not made any changes to his computer, and Sally says that she could access the web site yesterday.

You need to help Sally access Jim’s web site. What should you do?

Hacked by Piratez 70-270

Page 255: 70 270 q & a

Explanation:

Client computers cache resolved DNS names and IP addresses for a time. If a destination computer’s IP address changes, the client computer will not be able to access the destination computer using a cached name and IP address. To clear the DNS cache, run the ipconfig /flushDNS command on client computer. The client computer will then again resolve the destination computer’s DNS name. One way to prevent this problem is to configure computers that provide network resources to other computers with static IP addresses, or to reserve IP addresses for such computers at the DHCP server.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running ipconfig /flushDNS, so using the Repair option would also fix the problem in this scenario.

Objective(s):

601. Configure and troubleshoot the TCP/IP protocol.

Reference(s):

TestOut for Windows XP Administration, Section 3.3

[601 #608]

Explanation:

Because the network administrator has enabled callback security to a specific telephone number that must be known beforehand, the network administrator needs to configure the remote access server with Jim’s ISDN number. Until doing so, Jim will not be able to connect to the remote access server at all. If the number for each ISDN channel were different, Jim

nmlkj Reconfigure the DHCP server to support dynamic DNS.

nmlkj Reconfigure the DNS server to support dynamic DNS.

nmlkj Run ipconfig /flushDNS on Jim’s computer.

nmlkji Run ipconfig /flushDNS on Sally’s computer.

You are a help desk technician for your company. Your company uses Windows XP Professional as a desktop operating system. Your network has a Windows 2000 remote access server, which lets users connect to the company network from home.

Jim’s home computer is a Windows XP Professional computer that uses an ISDN connection. Both ISDN channels have the same phone number. Jim’s computer is configured to connect to the remote access server using a multilink connection. The remote access server is also configured to accept multilink connections.

Jim contacts the help desk and explains that he cannot connect to the remote access server using a multilink connection. You investigate the problem and discover that your company’s network administrator recently configured the remote access server to enforce callback security. The new company security policy states that users can only access the company network from specific telephone numbers, which must be known beforehand.

You want to help Jim connect using a multilink connection. What should you do?

nmlkj Ask Jim to make sure his ISDN channels use two different phone numbers.

nmlkj Enable the Callback Multilink service on Jim’s computer.

nmlkji Provide the network administrator with Jim’s ISDN phone number.

nmlkj Explain to Jim that multilink is not possible under the current conditions.

Hacked by Piratez 70-270

Page 256: 70 270 q & a

would need to make sure both ISDN channels use the same number before multilink will be possible. This is due to the fact that the remote access server can only be configured to call back to one number.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #260]

Explanation:

Multilink connections only support callback to a single telephone number. Because each V.90 modem uses a different telephone line, multilink is not possible when the RAS server uses callback security. This is due to the fact that the remote access server can only be configured to call back to one number.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #268]

You are a help desk technician for your company. Your company uses Windows XP Professional as a desktop operating system. Your network has a Windows 2000 remote access server, which lets users connect to the company network from home.

Jim’s home computer is a Windows XP Professional computer that uses two V.90 modems connected to separate telephone lines. Jim’s computer is configured to connect to the remote access server using a multilink connection. The remote access server is also configured to accept multilink connections.

Jim contacts the help desk and explains that he cannot connect to the remote access server using a multilink connection. You investigate the problem and discover that your company’s network administrator recently configured the remote access server to enforce callback security. The new company security policy states that users can only access the company network from specific telephone numbers, which must be known beforehand.

You want to help Jim connect using a multilink connection. What should you do?

nmlkj Ask Jim to make sure his V.90 modems both use the same phone number.

nmlkji Explain to Jim that multilink is not possible under the current conditions.

nmlkj Provide the network administrator with both of Jim’s phone numbers.

nmlkj Enable the Callback Multilink service on Jim’s computer.

You are a help desk technician for your company. Your company uses Windows XP Professional as a desktop operating system. Your network has a Windows 2000 remote access server, which lets users connect to the company network from home.

Jim’s home computer is a Windows XP Professional computer that uses an ISDN connection. Jim’s two ISDN channels each use a different phone number. Jim’s computer is configured to connect to the remote access server

Hacked by Piratez 70-270

Page 257: 70 270 q & a

Explanation:

Because the network administrator has enabled callback security to a specific telephone number that must be known beforehand, the network administrator needs to configure the remote access server with Jim’s ISDN number. Jim has already notified the administrator of one ISDN number. Jim needs to make sure both ISDN channels use the same number before multilink will be possible. This is due to the fact that the remote access server can only be configured to call back to one number.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #276]

using a multilink connection. The remote access server is also configured to accept multilink connections.

Jim contacts the help desk and explains that he cannot connect to the remote access server using a multilink connection. You investigate the problem and discover that your company’s network administrator recently configured the remote access server to enforce callback security. The new company security policy states that users can only access the company network from specific telephone numbers, which must be known beforehand. Jim previously gave the network administrator the telephone number to one of his ISDN channels.

You want to help Jim connect using a multilink connection. What should you do?

nmlkj Provide the network administrator with Jim’s other ISDN phone number.

nmlkj Explain to Jim that multilink is not possible under the current conditions.

nmlkji Ask Jim to make sure his ISDN channels use the same phone number.

nmlkj Enable the Callback Multilink service on Jim’s computer.

You are a help desk technician for your company. Your company uses Windows XP Professional as a desktop operating system. Your network has a Windows 2000 remote access server, which lets users connect to the company network from home. The remote access server is also configured to accept multilink connections.

Jim’s home computer is a Windows XP Professional computer that uses two V.90 modems connected to separate telephone lines. Jim contacts the help desk and explains that he wants to connected to the company remote access server using a multilink connection. You walk Jim through the process of creating a dial-up connection named Company Network. You configure the Company Network dial-up connection to dial the company’s remote access server.

You want to configure Jim’s computer to establish a multilink connection with the company remote access server. What should you do?

nmlkj Explain to Jim that multilink is not possible under the current conditions.

nmlkjAsk Jim to edit the properties of the Company Network dial-up connection and enable the Dial all devices option.

nmlkj Provide the network administrator with both of Jim’s phone numbers.

nmlkj Ask Jim to make sure his V.90 modems both use the same phone number.

nmlkjAsk Jim to create another dial-up connection on Jim’s computer. Enable the Negotiate multi-link for single link connections property for both connections.

nmlkjiAsk Jim to edit the properties of the Company Network dial-up connection and configure it to use both of Jim’s V 90 modems

Hacked by Piratez 70-270

Page 258: 70 270 q & a

Explanation:

To enable multilink for a dial-up connection on a computer with multiple modems, edit the properties of the connection. On the General tab, configure it to use multiple modems by checking each modem to use.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #284]

Explanation:

When Internet connection sharing is enabled, Wrk3’s network adapter that is connected to the branch office network is assigned a new static IP address of 192.168.0.1 with a subnet mask of 255.255.255.0. Any existing TCP/IP connections on the computer where you enabled Internet connection sharing are lost and must be re-established. Because other branch office computers use static addresses on a different subnet, they will be inaccessible from Wrk3. To fix this problem, all branch office computers should be configured to use DHCP. They will get their IP addresses from Wrk3, which will function as a limited DHCP server and distribute addresses in the range of 192.168.0.2 to 192.168.0.254.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.6

[602 #294]

Jim s V.90 modems.

You are the network administrator for a branch office of your company. Your branch office network consists of seven Windows XP Professional computers. All computers use static IP addresses on the subnet 192.168.1.0/24. You want all computers at the branch office to share a single Internet connection.

You enable Internet Connection Sharing on one of the Windows XP Professional computers, which is named Wrk3. Now the user of Wrk3 claims that shared resources on other branch office computers are inaccessible. Also, the other computers in the branch office cannot access the Internet through Wrk3.

You want all computers at the branch office to share Wrk3’s Internet connection. You also want to ensure that Wrk3 can access shared resources on other branch office computers after Wrk3’s Internet connection is shared. What should you do?

nmlkj Configure Wrk3 to use DHCP.

nmlkj Run ipconfig /registerdns on all branch office computers.

nmlkji Configure all branch office computers except Wrk3 to use DHCP.

nmlkj Configure Wrk3 to use IP address 192.168.1.1.

nmlkj Configure all seven branch office computers to use DHCP.

Hacked by Piratez 70-270

Page 259: 70 270 q & a

Explanation:

When Internet connection sharing is enabled, Wrk3’s network adapter connected to the branch office network is assigned a new static IP address of 192.168.0.1 with a subnet mask of 255.255.255.0. All branch office computers should be configured to use DHCP. They will get their IP addresses from Wrk3, which will function as a limited DHCP server and distribute addresses in the range of 192.168.0.2 to 192.168.0.254. The computer whose Internet connection is being shared should remain on or should always be the first computer turned on. In this way, the DHCP service will be available to other computers that are turned on afterwards. In this scenario, the user of Wrk3 probably turned the computer on after the other computers in the office were already turned on. The other computers are probably using APIPA, which is causing the other office computers to receive IP addresses on a different subnet than Wrk3. You should renew these computers’ IP addresses so they receive an IP address from Wrk3.

Windows XP also provides a Repair button for LAN or high-speed TCP/IP connections (right-click the connection and select Repair). One task the Repair option performs is running ipconfig /renew, so using the Repair option would also fix the problem in this scenario.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.6

[602 #303]

You are the network administrator for a branch office of your company. Your branch office network consists of seven Windows XP Professional computers. You want all computers at the branch office to share a single Internet connection.

You enable Internet Connection Sharing on one of the Windows XP Professional computers, which is named Wrk3. You also enable DHCP on all branch office computers except Wrk3. You successfully access the Internet from several branch office computers. The next morning, several users complain that they cannot access the Internet. The user of Wrk3 claims that shared resources on other branch office computers are inaccessible.

You want all computers at the branch office to share Wrk3’s Internet connection. You also want to ensure that Wrk3 can access shared resources on other branch office computers. What should you do?

nmlkj Configure all branch office computers except Wrk3 with static IP addresses.

nmlkj Configure Wrk3 to use IP address 192.168.0.1.

nmlkj Configure all seven branch office computers to use DHCP.

nmlkj Configure Wrk3 to use DHCP.

nmlkji Run ipconfig /renew on all branch office computers.

You are the network administrator for a branch office of your company. Your branch office network consists of seven Windows XP Professional computers. All computers use static IP addresses on the subnet 192.168.1.0/24. You want all computers at the branch office to share a single Internet connection.

You enable Internet Connection Sharing on one of the Windows XP Professional computers, which is named Wrk3. You also install a new DHCP server named Srv1, configure Srv1 to distribute IP addresses for subnet 192.168.1.0/24, and configure all branch office computers except Wrk3 to use DHCP. After performing these configurations, the user of Wrk3 claims that shared resources on various branch office computers are inaccessible. Also, several computers in the branch office cannot access the Internet through Wrk3.

You want all computers at the branch office to share Wrk3’s Internet connection. You also want to ensure that Wrk3 can access shared resources on other branch office computers after Wrk3’s Internet connection is shared. What should you do?

Hacked by Piratez 70-270

Page 260: 70 270 q & a

Explanation:

When Internet connection sharing is enabled, Wrk3’s network adapter connected to the branch office network is assigned a new static IP address of 192.168.0.1 with a subnet mask of 255.255.255.0. Any existing TCP/IP connections on the computer where you enabled Internet connection sharing are lost and must be reestablished. Once configured to use Internet connection sharing, Wrk3 begins to function as a limited DHCP server and distributes addresses in the range of 192.168.0.2 to 192.168.0.254. If your network is using another DHCP, you must remove it from the network.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.6

[602 #312]

Explanation:

Run the Network Setup wizard to initially enable Internet Connection Sharing. Afterwards, you can edit Internet Connection Sharing properties from the Advanced tab of your Internet connection.

Objective(s):

602. Connect to computers by using dial-up networking.

nmlkj Configure all seven branch office computers to use DHCP.

nmlkji Uninstall the DHCP service on Srv1.

nmlkj Configure Srv1 to distribute IP addresses for subnet 192.168.0.0/16.

nmlkj Configure Wrk3 to use IP address 192.168.1.1.

nmlkj Run ipconfig /registerdns on all branch office computers.

nmlkj Configure Wrk3 to use DHCP.

You are the network administrator for a branch office of your company. Your branch office network consists of seven Windows XP Professional computers. All computers use static IP addresses on the subnet 192.168.1.0/24. You want all computers at the branch office to share a single Internet connection.

You configure all branch office computers to use DHCP. You also create a dial-up connection to the Internet on a computer named Wrk3. The dial-up connection is called Dial ISP. You want all computers at the branch office to share the Dial ISP connection. When any computer wants to use the Internet, you want the Dial ISP connection to be established automatically. You edit the properties of the Dial ISP connection, but you do not see a Sharing tab.

You want to share the Dial ISP connection. What should you do?

nmlkj Enable simple network sharing.

nmlkjDelete and recreate the dial-up connection. Select Share this connection while creating the dial-up connection.

nmlkji Run the Network Setup wizard.

nmlkj Configure Wrk3 to use a static IP address.

nmlkj Click the Advanced tab.

Hacked by Piratez 70-270

Page 261: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 3.6

[602 #322]

Explanation:

PPTP is the Point-to-Point Tunnel Protocol. PPTP encapsulates PPP frames in TCP/IP packets. PPTP does not require a machine certificate because it does not use IPSec to encrypt communication between the remote access client and the remote access server. Instead, PPTP uses Microsoft Point-to-Point Encryption (MPPE) to encrypt PPP frames. Rather than configuring the VPN connection to use a specific protocol, you can configure it to auto detect whether to use PPTP or L2TP. This is the default setting.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #331]

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. You have created a VPN connection on a user’s laptop computer. The VPN connection connects to the VPN server’s IP address.

You check the laptop’s certificate store and find that the laptop does not have a machine certificate. You want to configure the VPN connection to use an appropriate remote access protocol. What should you do?

nmlkj Configure the VPN connection to use L2TP.

nmlkj Configure the VPN connection to use SLIP.

nmlkj Configure the VPN connection to use PPP.

nmlkj Configure the VPN connection to use NetBEUI.

nmlkji Configure the VPN connection to use PPTP.

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. The VPN server supports all tunneling protocols provided by the Windows 2000 Server routing and remote access service.

You create a VPN connection on a user’s laptop computer and configure the connection to access the VPN server’s IP address. You configure the laptop’s VPN connection to use L2TP. The user takes the laptop home for the evening to test the VPN connection. The next morning, the user reports that the VPN server denied access to the company’s network.

You want to let the user connect to the company VPN server using L2TP. What should you do?

nmlkj Configure the VPN connection to use software compression.

nmlkji Install a machine certificate on the user’s laptop.

nmlkj Configure the type of VPN to be Automatic.

Hacked by Piratez 70-270

Page 262: 70 270 q & a

Explanation:

L2TP uses IPSec to encrypt communication between the remote access client and the remote access server. IPSec requires that a machine certificate be installed on the computer.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #340]

Explanation:

L2TP uses IPSec to encrypt communication between the remote access client and the remote access server. IPSec uses machine certificates installed on the remote access client and remote access server to authenticate each other and establish a secure tunnel.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #348]

nmlkj Set the VPN connection as the default connection.

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. The VPN server supports all tunneling protocols provided by the Windows 2000 Server routing and remote access service.

You create a VPN connection on a user’s laptop computer and configure the connection to access the company’s VPN server’s IP address. You want to make sure the VPN connection verifies the identity of the destination server. What should you do?

nmlkj Configure the VPN connection to use PPTP.

nmlkj Configure the VPN connection to use SLIP.

nmlkj Configure the VPN connection to use NetBEUI.

nmlkj Configure the VPN connection to use PPP.

nmlkji Configure the VPN connection to use L2TP.

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. The VPN server supports all tunneling protocols provided by the Windows 2000 Server routing and remote access service. Accepted authentication protocols include a smart card or other certificate (EAP-TLS) and MS-CHAP v2.

Jim, a user who travels frequently, requests that you configure his laptop so he can connect to the company network through the VPN server. Jim has been issued a smart card. You install a smart card reader in the laptop

t d t VPN ti th l t Y fi th VPN ti t th VPN

Hacked by Piratez 70-270

Page 263: 70 270 q & a

Explanation:

You can configure security settings for a remote access connection using Typical settings or Advanced settings. Advanced settings give you finer control and are the only way to require 3DES (maximum strength) encryption. The Require data encryption (disconnect if none) typical setting does not require maximum strength encryption. To configure the connection to authenticate using a smart card, choose the Use Extensible Authentication Protocol (EAP) advanced setting rather than choosing the Allow these protocols advanced setting and selecting from the list of PPP-supported authentication protocols. After enabling EAP, make sure Smart Card or other Certificate (encryption enabled) is selected as the authentication protocol.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #357]

computer and create a VPN connection on the laptop. You configure the VPN connection to access the VPN server’s IP address. The company security policy requires that 3DES encryption be used for all connections to the company network. This is the strongest encryption protocol supported by the VPN server. Client computers should disconnect if the VPN server does not offer 3DES encryption.

You want to configure the VPN connection to use Jim’s smart card and to require 3DES encryption. What should you do? (Choose three. Each correct choice is part of the solution.)

gfedc Configure the VPN connection to use Typical settings.

gfedc Select the Require secure password typical setting for validating identity.

gfedc Select the Use smart card typical setting for validating identity.

gfedc Enable the Require data encryption (disconnect if none) typical setting.

gfedcb Configure the VPN connection to use Advanced settings.

gfedc Enable the Require encryption (disconnect if server declines) advanced setting.

gfedcb Enable the Maximum strength encryption (disconnect if server declines) advanced setting.

gfedcSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose MD5-Challenge.

gfedcbSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose Smart Card or other Certificate (encryption enabled).

gfedc Select the Allow these protocols advanced setting and enable MS-CHAP v2.

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. The VPN server supports all tunneling protocols provided by the Windows 2000 Server routing and remote access service. Accepted authentication protocols include a smart card or other certificate (EAP-TLS) and MS-CHAP v2.

Jim, a user who travels frequently, requests that you configure his laptop so he can connect to the company network through the VPN server. Jim has been issued a smart card. You install a smart card reader in the laptop computer and create a VPN connection on the laptop. You configure the VPN connection to access the VPN server’s IP address. The company security policy requires that encryption be used for all connections to the company network. The VPN server supports DES encryption, but nothing stronger. Client computers should disconnect if the VPN server does not offer encryption.

You want to configure the VPN connection to use Jim’s smart card and to require encryption. What should you do? (Choose three. Each correct choice is part of the solution.)

dc

Hacked by Piratez 70-270

Page 264: 70 270 q & a

Explanation:

You can configure security settings for a remote access connection using Typical settings or Advanced settings. Advanced settings give you finer control and are the only way to require 3DES (maximum strength) encryption. Although you could configure data encryption for this scenario using the Require encryption (disconnect if server declines) advanced setting, that option is not listed as a choice in the question. Therefore, you should use Typical settings, which accomplish the same objective and are quicker to use. Select the Use smart card typical setting for validating identity and enable the Require data encryption (disconnect if none) typical setting.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #371]

gfedcb Configure the VPN connection to use Typical settings.

gfedc Select the Require secure password typical setting for validating identity.

gfedcb Select the Use smart card typical setting for validating identity.

gfedcb Enable the Require data encryption (disconnect if none) typical setting.

gfedc Configure the VPN connection to use Advanced settings.

gfedc Enable the Maximum strength encryption (disconnect if server declines) advanced setting.

gfedcSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose MD5-Challenge.

gfedcSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose Smart Card or other Certificate (encryption enabled).

gfedc Select the Allow these protocols advanced setting and enable MS-CHAP v2.

You are the desktop administrator for your company. Your company provides multiple Windows 2000 and Windows NT 4.0 remote access servers to let traveling users connect to the corporate network over a dial-up connection. All users call the same telephone number to access the corporate network. Incoming calls are distributed evenly to several modems installed on the remote access servers. Each remote access server is configured to support Microsoft authentication protocols only. The remote access servers also support DES data encryption, but nothing stronger.

Jim, a user who travels frequently, requests that you configure his laptop so he can connect to the company network over a dial-up connection. You create a dial-up connection on the laptop and configure it to dial the company remote access number. The company security policy requires that encryption be used for all connections to the company network. Client computers should disconnect if the remote access server does not offer encryption.

You want to configure the dial-up connection to use the most secure authentication protocol or protocols supported by the remote access servers and to require data encryption. Because Jim will log on to his laptop using cached credentials, you also want his domain user name and password to be used automatically when connecting to the remote access servers. What should you do? (Choose four. Each correct choice is part of the solution.)

gfedcb Configure the dial-up connection to use Typical settings.

gfedcb Select the Require secure password typical setting for validating identity.

gfedc Select the Use smart card typical setting for validating identity.

gfedcb Enable the Require data encryption (disconnect if none) typical setting.

gfedc Configure the dial-up connection to use Advanced settings.

gfedc Enable the Maximum strength encryption (disconnect if server declines) advanced setting

Hacked by Piratez 70-270

Page 265: 70 270 q & a

Explanation:

You can configure security settings for a remote access connection using Typical settings or Advanced settings. Advanced settings give you finer control and are the only way to require 3DES (maximum strength) encryption. Although you could configure data encryption for this scenario using the Require encryption (disconnect if server declines) advanced setting, that option is not listed as a choice in the question. Therefore, you should use Typical settings, which accomplish the same objective and are quicker to use. Select the Require secure password typical setting for validating identity (this will enable CHAP, MS-CHAP, and MS-CHAP v2 as acceptable authentication protocols). Also enable the Require data encryption (disconnect if none) typical setting (this will unselect CHAP as an acceptable authentication protocol and will require DES data encryption). Also enable the Automatically use my Windows logon name and password (and domain if any) option so Jim will not need to reenter his logon name and password when establishing the remote access connection.

You might also need to be aware that Windows NT 4.0 without service pack 4 does not support MS-CHAP v2 for dial-up connections although it does support MS-CHAP v2 for VPN connections. In this scenario, this is not an issue because the Require secure password typical setting enables MS-CHAP as well as MS-CHAP v2.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #384]

gfedc Enable the Maximum strength encryption (disconnect if server declines) advanced setting.

gfedcSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose MD5-Challenge.

gfedcSelect the Allow these protocols advanced setting and enable MS-CHAP and MS-CHAP v2 (disable all other authentication protocols).

gfedcSelect the Allow these protocols advanced setting and enable MS-CHAP v2 (disable all other authentication protocols).

gfedcb Enable the Automatically use my Windows logon name and password (and domain if any) option.

You are the desktop administrator for your company. Your company provides multiple Windows 2000 remote access servers to let traveling users connect to the corporate network over a dial-up connection. Only Microsoft authentication protocols are enabled on the remote access servers. All users call the same telephone number to access the corporate network. Incoming calls are distributed evenly to several modems installed on the remote access servers. Each remote access server is configured to support the most secure Microsoft authentication protocol only.

Jim, a user who travels frequently, requests that you configure his laptop so he can connect to the company network over a dial-up connection. You create a dial-up connection on the laptop and configure it to dial the company remote access number. The company security policy requires that 3DES encryption be used for all connections to the company network. This is the strongest data encryption supported by the remote access servers. Client computers should disconnect if the remote access server does not offer 3DES encryption. Client computers must also verify the identity of the remote access server when establishing a remote access connection.

You want to configure Jim’s dial-up connection to meet the company security policy. Because Jim will log on to his laptop using cached credentials, you also want his domain user name and password to be used automatically when connecting to the remote access servers. What should you do? (Choose four. Each correct choice is part of the solution.)

gfedc Configure the dial-up connection to use Typical settings.

gfedc Select the Require secure password typical setting for validating identity.

gfedc Select the Use smart card typical setting for validating identity.

gfedc Enable the Require data encryption (disconnect if none) typical setting

Hacked by Piratez 70-270

Page 266: 70 270 q & a

Explanation:

You can configure security settings for a remote access connection using Typical settings or Advanced settings. Advanced settings give you finer control and are the only way to require 3DES (maximum strength) encryption. The Require data encryption (disconnect if none) typical setting does not require maximum strength encryption, nor does the equivalent Require encryption (disconnect if server declines) advanced setting. Use PPP-supported authentication protocols rather than Extensible Authentication Protocol (EAP) to configure authentication for the dial-up connection. The MS-CHAP v2 authentication protocol supports mutual authentication, which lets the client computer verify the remote access server’s identity. To ensure that MS-CHAP v2 is used, deselect all other authentication protocols.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.4

[602 #398]

Explanation:

Most Internet service providers do not support the Require secure password option, which limits authentication to CHAP, MS-CHAP, and MS-CHAP v2. Because you are simply connecting to the Internet when using the dial-up connection (you are not connecting to the company’s VPN server), it is not against company policy to use an unsecured password. Data

gfedc Enable the Require data encryption (disconnect if none) typical setting.

gfedcb Configure the dial-up connection to use Advanced settings.

gfedc Enable the Require encryption (disconnect if server declines) advanced setting.

gfedcb Enable the Maximum strength encryption (disconnect if server declines) advanced setting.

gfedcSelect the Use Extensible Authentication Protocol (EAP) advanced setting and choose MD5-Challenge.

gfedcSelect the Allow these protocols advanced setting and enable MS-CHAP and MS-CHAP v2 (disable all other authentication protocols).

gfedcbSelect the Allow these protocols advanced setting and enable MS-CHAP v2 (disable all other authentication protocols).

gfedcb Enable the Automatically use my Windows logon name and password (and domain if any) option.

You are the desktop administrator for your company. Your company provides a VPN server to let traveling users connect to the corporate network over the Internet. The VPN server supports all tunneling protocols provided by the Windows 2000 Server routing and remote access service.

Jim, a user who travels frequently, requests that you configure his laptop so he can connect to the company network through the VPN server. You begin by creating a dial-up connection to an Internet service provider. The company security policy requires that 3DES encryption be used for all connections to the company network. This is the strongest encryption protocol supported by the VPN server. Client computers should disconnect if the VPN server does not offer 3DES encryption. Company policy also prohibits sending unsecured user names and passwords over the network when logging on to the VPN server.

You want to configure the dial-up connection to the Internet service provider. What should you do?

nmlkj Enable the Require data encryption (disconnect if none) setting.

nmlkj Select the Use smart card setting for validating identity.

nmlkji Select the Allow unsecured password setting for validating identity.

nmlkj Select the Require secure password setting for validating identity.

Hacked by Piratez 70-270

Page 267: 70 270 q & a

encryption is also not required. However, when configuring the VPN connection, you will need to require a secure password and maximum strength data encryption.

Objective(s):

602. Connect to computers by using dial-up networking.

Reference(s):

TestOut for Windows XP Administration, Section 3.5

[602 #413]

Explanation:

Because this web site uses a non-default TCP port, users must append the port number (in this case, 7589) to the host name or IP address when accessing the site. If the web site is configured to use a default document, nothing further is required. However, you could also append the name of a default document.

Objective(s):

603. Connect to resources by using Internet Explorer.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #260]

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop computers. An employee named Sally is attempting to connect to an intranet web site named internal.widgets.com. Sally enters the web site in the address bar in Internet Explorer, but receives an error message.

You realize that the internal.widgets.com web site operates over the non-default TCP port 7589. You need to ensure that Sally can connect to the internal.widgets.com web site. What should you do?

nmlkj Instruct Sally to type http:7589//internal.widgets.com in the address bar of Internet Explorer.

nmlkji Instruct Sally to type http://internal.widgets.com:7589 in the address bar of Internet Explorer.

nmlkj Instruct Sally to type https:7589//internal.widgets.com in the address bar of Internet Explorer.

nmlkj Instruct Sally to type https://internal.widgets.com:7589 in the address bar of Internet Explorer.

nmlkj Instruct Sally to run the ipconfig /flushdns command on her computer.

nmlkj Instruct Sally to run the ipconfig /registerdns command on her computer.

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop computers. An employee named Sally is attempting to connect to an intranet web site named internal.widgets.com. Sally enters the web site in the address bar in Internet Explorer, but receives an error message.

You realize that the internal.widgets.com web site is a secure web site. You need to ensure that Sally can connect to the internal.widgets.com web site. What should you do?

nmlkj Instruct Sally to run the ipconfig /flushdns command on her computer.

Hacked by Piratez 70-270

Page 268: 70 270 q & a

Explanation:

Secure resources require you to begin the URL using https rather than http.

Objective(s):

603. Connect to resources by using Internet Explorer.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #270]

Explanation:

To access a site or directory as a web folder, use one of the following methods:

1. In Internet Explorer, click File, then select Open. Type the URL, and check the Open as Web Folder option. 2. Open My Network Places and run the Add New Network place wizard.

Microsoft Office 2000 or later applications (and other applications that support HTTP 1.1 and WebDAV) can also access web folders.

Objective(s):

603. Connect to resources by using Internet Explorer.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #279]

nmlkj Instruct Sally to open My Network Places and run the Add Network Place wizard.

nmlkj Instruct Sally to type http://internal.widgets.com/secure in the address bar of Internet Explorer.

nmlkjInstruct Sally to select Open from the File menu in Internet Explorer, type the web site address, and select Open as Web Folder.

nmlkji Instruct Sally to type https://internal.widgets.com in the address bar of Internet Explorer.

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop computers. An employee named Sally is attempting to use WebDAV to access the home directory of the internal.widgets.com web site.

You need to help Sally access the internal.widgets.com web site as a web folder. What should you do?

nmlkjInstruct Sally to select Open from the File menu in Internet Explorer, type the web site address, and select OK.

nmlkji Instruct Sally to open My Network Places and run the Add Network Place wizard.

nmlkj Instruct Sally to type https://internal.widgets.com in the address bar of Internet Explorer.

nmlkj Instruct Sally to select Run from the Start menu, type the web site address, and select OK.

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop

Hacked by Piratez 70-270

Page 269: 70 270 q & a

Explanation:

To access a site or directory as a web folder, use one of the following methods:

1. In Internet Explorer, click File, then select Open. Type the URL, and check the Open as Web Folder option. 2. Open My Network Places and run the Add New Network place wizard.

Microsoft Office 2000 or later applications (and other applications that support HTTP 1.1 and WebDAV) can also access web folders.

Objective(s):

603. Connect to resources by using Internet Explorer.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #287]

Explanation:

To view documents from a shared folder from within Internet Explorer, use the file:// prefix followed by the server name, shared folder name, and path and file name of the document. The http:// prefix is used to view web-based documents. The https:// prefix is used to view web-based documents over a secure channel. The ftp:// prefix is used to transfer files between locations.

Objective(s):

603. Connect to resources by using Internet Explorer.

p y p y p y pcomputers. An employee named Sally is attempting to use WebDAV to access the home directory of the internal.widgets.com web site.

You need to help Sally access the internal.widgets.com web site as a web folder. What should you do?

nmlkj Instruct Sally to select Run from the Start menu, type the web site address, and select OK.

nmlkj Instruct Sally to browse My Network Places to the web site.

nmlkj Instruct Sally to type https://internal.widgets.com in the address bar of Internet Explorer.

nmlkjiInstruct Sally to select Open from the File menu in Internet Explorer, type the web site address, and select Open as Web Folder.

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop computers. An employee named Sally is attempting to use Internet Explorer to open a document named Holidays.doc. Holidays.doc is located in a shared folder called Docs on a Windows 2000 server named Srv1.

You want to help Sally access the Holidays.doc file using Internet Explorer. What should you do?

nmlkj Instruct Sally to type https://srv1/docs/holidays.doc in the address bar in Internet Explorer.

nmlkj Instruct Sally to type http://srv1/docs/holidays.doc in the address bar in Internet Explorer.

nmlkji Instruct Sally to type file://srv1/docs/holidays.doc in the address bar in Internet Explorer.

nmlkj Instruct Sally to type ftp://srv1/docs/holidays.doc in the address bar in Internet Explorer.

Hacked by Piratez 70-270

Page 270: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #295]

Explanation:

Some FTP sites might require you to log on by submitting your user name and password in the URL. Use the format ftp://username:password@server. You might also append a path to a specific folder after the server name.

Objective(s):

603. Connect to resources by using Internet Explorer.

Reference(s):

TestOut for Windows XP Administration, Section 7.1

[603 #303]

You are a help desk technician for your company. Your company uses Windows XP Professional on all desktop computers. An employee named Sally is attempting to establish an FTP session with a server named ftp.widgets.com. Sally enters ftp://ftp.widgets.com in the address bar in Internet Explorer but receives an access denied message. Sally says that she has a user name and password to enter, but she is never prompted to enter it.

You want to help Sally submit her user name and password to the FTP server as part of the URL. What should you do?

nmlkjInstruct Sally to type ftps://ftp.widgets.com?username=username;password=password in the address bar in Internet Explorer.

nmlkji Instruct Sally to type ftp://username:[email protected] in the address bar in Internet Explorer.

nmlkj Instruct Sally to type ftp://ftp.widgets.com/username:password in the address bar in Internet Explorer.

nmlkjInstruct Sally to type ftp://ftp.widgets.com?username=username;password=password in the address bar in Internet Explorer.

nmlkj Instruct Sally to type ftp://ftp.widgets.com@username:password in the address bar in Internet Explorer.

You are the help desk administrator for your company. Rodney, a user in the research and development department, uses a Windows XP Professional computer. Rodney’s computer hosts an intranet web site for other developers. The web site uses the default TCP port and other default settings.

Rodney’s computer has been suffering from slow performance. You think the slowness is due to many people accessing Rodney’s web site. You want to track how many users are currently logged on anonymously to Rodney’s web site. You want to accomplish this task in the easiest manner possible. What should you do?

nmlkj Enable IIS Logging.

nmlkj Use Network Monitor.

nmlkji Use Performance Monitor.

nmlkj Enable Auditing.

Hacked by Piratez 70-270

Page 271: 70 270 q & a

Explanation:

Performance Monitor lets you track various counters for the Web Service and other performance objects related to IIS. In this case, you should use Performance Monitor to track Total Anonymous Users. IIS logging writes an entry to a log file when a web resource is accessed. Extended attributes written to the log file concern the identity of the user, computer, and type of web browser accessing the web resource; the identity of the web site and TCP port over which transfer takes place; methods for accessing the web resource; and the number of bytes sent and received during the request and the time required to do so. Process accounting can also be enabled, which logs information regarding CPU usage. Network Monitor is used to capture and analyze frames of network traffic. Auditing is a Windows XP feature similar in principle to IIS logging, but is for Windows XP resources such as files or printers. Success or failure of events is noted in the event log.

Objective(s):

604. Configure, manage, and implement Internet Information Services (IIS).

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[604 #280]

Explanation:

Using the content expiration functionality in IIS is easier than configuring a custom Content-Expiration header, which requires configuring appropriate date formats. When the web page is updated, content expiration should be set to expire the following Saturday. If you configure content to expire every seven days, clients that do not receive the page until late in the week might keep the content past the time when the page is updated. If you set the content to expire immediately, clients will not cache the content at all.

Objective(s):

604. Configure, manage, and implement Internet Information Services (IIS).

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[604 #313]

You are the help desk administrator for your company. Rodney, a user in the research and development department, uses a Windows XP Professional computer. Rodney’s computer hosts a web site for other developers. The web site uses the default TCP port and other default settings.

Rodney updates a web page on his site every Saturday evening to provide current information. Some clients are not receiving the updated pages. To minimize load on Rodney’s computer, you want clients to cache copies of the page. But you also want to ensure that clients always display an up-to-date version of this page. What should you do?

nmlkj Configure custom HTTP headers for the web site to include a Content-Expiration header.

nmlkj Instruct Rodney to set content expiration for the web page to expire every seven days.

nmlkj Instruct Rodney to set content expiration for the web page to expire immediately.

nmlkjiInstruct Rodney to set content expiration for the web page to expire the following Saturday each time he updates the page.

You are the desktop administrator for your company. Michelle, a user in the marketing department, wants to create an internal web site for the marketing department. You install a new Windows XP Professional computer

Hacked by Piratez 70-270

Page 272: 70 270 q & a

Explanation:

IIS is not installed by default on a Windows XP Professional computer. Use the Add or Remove Programs control panel applet to configure Windows Components and add IIS.

Objective(s):

604. Configure, manage, and implement Internet Information Services (IIS).

Reference(s):

TestOut for Windows XP Administration, Section 5.5

[604 #321]

Explanation:

A Windows XP Professional computer can only have a single web site. A default web site is created automatically, and its home directory is %systemdrive%\inetpub\wwwroot\ (not %systemdrive%\iis\www\). You can create a web site quickly by copying files to this directory. You cannot copy and paste files directly to the web site in the IIS snap-in. You do not need to enable web sharing using Folder Options (in fact, that is not even an option).

Objective(s):

604. Configure, manage, and implement Internet Information Services (IIS).

[604 #330]

using the default settings. You want to configure the new computer to use Internet Information Services (IIS). What should you do?

nmlkj Start the IIS service. IIS is always installed.

nmlkji Open the Add or Remove Programs control panel.

nmlkj Open the Internet Information Services pre-configured MMC console file.

nmlkj Boot to the Windows XP installation CD.

nmlkj Insert the Windows XP installation CD and use the options on the Autorun screen.

You are the desktop administrator for your company. Michelle, a user in the marketing department, wants to create an internal web site for the marketing department. You install a new Windows XP Professional computer using the default settings. You also install and configure IIS and the web service.

Michelle authors the web site files that she wants to publish. She is now ready to publish the files to the default web site.

You need to help Michelle publish her files to the default web site. What should you do?

nmlkj Copy the web site's files to %systemdrive%/iis/www/.

nmlkji Copy the web site's files to %systemdrive%/inetpub/wwwroot/.

nmlkj Select the folder that contains the files. Select Tools>Folder Options, and enable web sharing.

nmlkj Open the IIS snap-in. Double-click the default web site and paste the files.

Hacked by Piratez 70-270

Page 273: 70 270 q & a

Explanation:

Remote Desktop only supports a single user. A terminal server (with appropriate licensing) is required for the situation stated in the scenario.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #260]

You are a desktop administrator for your company. You want to make applications on a Windows XP computer available to several users throughout your company, especially users who do not have Windows XP computers.

You enable Remote Desktop and verify that all users have appropriate permissions. You also create a Terminal Services client software installation disk from a Windows 2000 Server computer, and install Terminal Services client software on all non-Windows XP computers. Users report that they cannot connect to the Windows XP computer using a remote desktop connection. The connection is temporary at best. Most users who achieve a connection are quickly disconnected.

You want to let users access the required applications. What should you do?

nmlkj Install Remote Desktop Connection on client computers using the Windows XP Professional installation CD.

nmlkjInstall IIS, the web service, and Remote Desktop Web Connection software on the computer using the default settings. Instruct users to connect to the computer using Internet Explorer.

nmlkjInstruct Michelle to create a Terminal Services Client installation disk and install an updated Terminal Services Client on client computers.

nmlkjiInstall a terminal server with appropriate licensing. Install applications on the terminal server. Instruct users to use the terminal server.

You are a desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle wants to access the applications on her work computer from her Windows 98 computer at home.

You explain to Michelle how to install Remote Desktop Connection on her home computer and connect to her work computer through a VPN connection. The next day, Michelle tells you that she followed your instructions exactly, but she could not connect to her work computer from her home computer.

You want to help Michelle connect to her work computer from her home computer using a remote desktop session. What should you do?

nmlkj Install and configure the Terminal Services Licensing service on Michelle’s work computer.

nmlkjCreate a user on Michelle’s work computer that uses Michelle’s user profile name on her home computer. Add the user account to the Remote Desktop Users group and instruct Michelle to use the new account to establish a remote desktop session.

nmlkjInstall IIS, the web service, and Remote Desktop Web Connection software on Michelle’s work computer using the default settings. Instruct Michelle to connect to her work computer using Internet Explorer.

nmlkjInstruct Michelle to create a Terminal Services Client installation disk and install the Terminal Services Client on her home computer.

nmlkji Edit the System properties of Michelle’s work computer and enable Remote Desktop.

Hacked by Piratez 70-270

Page 274: 70 270 q & a

Explanation:

A default installation of Windows XP does not enable the Remote Desktop feature. You must open the System applet in the Control Panel, click on the Remote tab, and select the Allow users to remotely connect to this computer check box. Windows 95, Windows 98, Windows NT 4.0, Windows 2000, and Windows XP computers can all use the Remote Desktop Connection client software, which can be installed from the Windows XP installation CD. Beginning with Windows XP, Remote Desktop Connection is used in place of Terminal Services. The Terminal Services client can also be used, but is only necessary on Windows NT 3.51 computers or 16-bit computers. Fast User Switching and Terminal Services Licensing are not required for Remote Desktop.

Objective(s):

606. Configure, manage, and troubleshoot an Internet Connection Firewall (ICF).

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #268]

Explanation:

Windows 95, Windows 98, Windows NT 4.0, Windows 2000, and Windows XP computers can all use the Remote Desktop Connection client software, which can be installed from the Windows XP installation CD. Beginning with Windows XP, Remote Desktop Connection is used in place of Terminal Services. The Terminal Services client can also be used, but this is only necessary on Windows NT 3.51 computers or 16-bit computers. Terminal Services Licensing is not required for Remote Desktop. Because there is no indication that IIS, the web service, and Remote Desktop Web Connection have been installed, Internet Explorer cannot be used to establish a remote desktop connection.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

k y p p p p

nmlkj Enable Fast User Switching on Michelle’s work computer.

You are a desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle wants to access the applications on her work computer from her Windows 98 computer at home.

You enable Remote Desktop on Michelle’s computer and verify that Michelle’s user account has appropriate permissions. You explain to Michelle how to create and connect to the company network through a VPN connection. You also open Remote Desktop Connection on Michelle’s Windows XP computer and show her how to establish a remote desktop connection. The next day, Michelle tells you that she followed your instructions exactly, but she could not locate the Remote Desktop Connection feature.

You want to help Michelle connect to her work computer from her home computer using a remote desktop session. What should you do?

nmlkj Instruct Michelle to connect to her work computer using Internet Explorer.

nmlkj Install and configure the Terminal Services Licensing service on Michelle’s work computer.

nmlkjiInstruct Michelle to install Remote Desktop Connection on her home computer using the Windows XP Professional installation CD.

nmlkjInstruct Michelle to create a Terminal Services Client installation disk and install the Terminal Services Client on her home computer.

Hacked by Piratez 70-270

Page 275: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #278]

Explanation:

Windows 95, Windows 98, Windows NT 4.0 and Windows 2000 remote machines can all use the Remote Desktop Connection client software, which can be installed from the Windows XP installation CD. However, to avoid carrying the Windows XP installation CD everywhere, you can install IIS, the web service, and Remote Desktop Web Connection software on a web server. The web server need not be the same computer you are accessing using remote desktop. On a Windows XP computer, use Add or Remove Programs to install IIS, the web service, and Remote Desktop Web Connection. Remote Desktop Web Connection is a sub-component of the web service.

You can then connect to the web server using Internet Explorer 4.0 or greater and download the Remote Desktop Web Connection ActiveX component, which functions as the remote desktop client.

Fast User Switching and Terminal Services Licensing are not required for Remote Desktop. Although copying the Windows XP Professional CD to a shared folder could work, it would be against the Windows XP software license.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #286]

You are a desktop administrator for your company. Your company uses Windows 98, Windows 2000, and Windows XP Professional as desktop operating systems. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle frequently visits branch offices throughout the company and wants to access the applications on her work computer from branch office computers. Each branch office has a VPN connection to the main office. Michelle does not want to worry about carrying client software with her and installing it on the various computers she uses.

You want to help Michelle connect to her computer from various branch office computers. You enable Remote Desktop on Michelle’s computer and verify that Michelle’s user account has appropriate permissions. What else should you do? (Choose two. Each correct choice is part of the solution.)

gfedcInstruct Michelle to only use Windows XP Professional computers at branch offices to establish remote desktop connections to her computer.

gfedcCopy the Windows XP Professional CD to a shared folder. Give the Everyone group full control to the shared folder.

gfedc Enable Fast User Switching on Michelle’s work computer.

gfedcbInstall IIS, the web service, and Remote Desktop Web Connection software on Michelle’s computer using the default settings.

gfedcb Instruct Michelle to connect to her work computer using Internet Explorer.

gfedc Install and configure the Terminal Services Licensing service on Michelle’s work computer.

You are a desktop administrator for your company. Your company uses Windows 2000 Professional and Windows XP Professional as desktop operating systems. Terminal Services client software is available on all Windows 2000 Professional computers Michelle a user in the marketing department has installed numerous applications on her

Hacked by Piratez 70-270

Page 276: 70 270 q & a

Explanation:

You must open port 3389 on firewalls protecting the main office and branch offices before Remote Desktop will be available. This is the port used by terminal services and the remote desktop protocol.

You can use Terminal Services client software available on Windows 2000 computers to connect to a Windows XP computer configured for remote desktop access. Therefore, the Windows XP installation CD should not be needed. Installing Remote Desktop Web Connection software should not be necessary either. Copying the Windows XP Professional CD to a shared folder would be against the Windows XP software license and is also unnecessary.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #296]

Professional computers. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle frequently visits branch offices throughout the company and wants to access the applications on her work computer from branch office computers. The main office and each branch office are connected to the Internet using persistent connections.

You want to help Michelle connect to her computer from various branch office computers. You enable Remote Desktop on Michelle’s computer and verify that Michelle’s user account has appropriate permissions. What else should you do?

nmlkj Verify that port 3387 is open on firewalls protecting the main office and branch offices.

nmlkjInstruct Michelle to only use Windows XP Professional computers at branch offices to establish remote desktop connections to her computer.

nmlkjCopy the Windows XP Professional CD to a shared folder. Give the Everyone group full control to the shared folder.

nmlkji Verify that port 3389 is open on firewalls protecting the main office and branch offices.

nmlkjInstruct Michelle to install Remote Desktop Connection on branch office computers using the Windows XP Professional installation CD.

nmlkjInstall IIS, the web service, and Remote Desktop Web Connection software on Michelle’s computer using the default settings.

You are a desktop administrator for your company. Your company uses Windows 98, Windows 2000, and Windows XP Professional as desktop operating systems. Michelle, a user in the marketing department, frequently visits branch offices throughout the company and wants to access applications on her work computer from branch office computers. Michelle’s computer is named Wrk4. Each branch office has a VPN connection to the main office. Your company’s intranet web site is internal.widgets.com.

You install Remote Desktop Web Connection software on Michelle’s computer. You also enable Remote Desktop on Michelle’s computer and verify that Michelle’s user account has appropriate permissions.

You need to help Michelle connect to her computer from branch office computers. What should you do?

nmlkjInstruct Michelle to enter http://internal.widgets.com/tsclient/ in the Internet Explorer address bar on branch office computers.

nmlkjInstruct Michelle to enter http://wrk4/tsclient/ in the Internet Explorer address bar on branch office computers.

nmlkji Instruct Michelle to enter http://wrk4/tsweb/ in the Internet Explorer address bar on branch office computers

Hacked by Piratez 70-270

Page 277: 70 270 q & a

Explanation:

To avoid carrying the Windows XP installation CD everywhere, you can install IIS, the web service, and Remote Desktop Web Connection software on a web server. The web server need not be the same computer you are accessing using remote desktop (however, in this scenario, there is no indication that Remote Desktop Web Connection is installed on any web server except Wrk4). By default, the web application that installs the Remote Desktop Web Connection ActiveX control is found in the Tsweb folder of the default web site.

Once Remote Desktop Web Connection is enabled on a web server, you can connect to the web server using Internet Explorer 4.0 or greater and download the Remote Desktop Web Connection ActiveX control, which functions as the remote desktop client. To install the Remote Desktop Web Connection ActiveX control from a client computer, access the Tsweb folder using the syntax http://servername/tsweb/.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #306]

Explanation:

Members of the local Administrators group can access a Windows XP computer remotely using the remote desktop feature. However, other users must be members of the Remote Desktop Users group. You can make a user a member of the Remote Desktop Users group using the Local Users and Groups MMC snap-in, or by editing the Remote Desktop settings in the System applet and adding the user account as an authorized remote desktop user.

nmlkji Instruct Michelle to enter http://wrk4/tsweb/ in the Internet Explorer address bar on branch office computers.

nmlkjInstruct Michelle to enter http://internal.widgets.com/tsweb/ in the Internet Explorer address bar on branch office computers.

You are a desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle wants to access the applications on her work computer from her Windows 98 computer at home.

You enable remote desktop on Michelle’s work computer and verify that her user account is a member of the Power Users local group. You also explain to Michelle how to install Remote Desktop Connection on her home computer and connect to her work computer through a VPN connection. The next day, Michelle tells you that she followed your instructions exactly, but she could not connect to her work computer from her home computer.

You want to help Michelle connect to her work computer from her home computer using a remote desktop session. What should you do? (Choose two.)

gfedc Grant the Remote Desktop Users group full control to the Tsweb folder in the default web site.

gfedcb Add Michelle’s user account to the Remote Desktop Users group.

gfedcInstruct Michelle to create a Terminal Services Client installation disk and install the Terminal Services Client on her home computer.

gfedc Instruct Michelle to connect to her work computer using Internet Explorer.

gfedc Enable Fast User Switching on Michelle’s work computer.

gfedcInstall IIS, the web service, and Remote Desktop Web Connection software on Michelle’s work computer using the default settings.

gfedcbEdit the Remote Desktop settings on Michelle’s work computer and add Michelle’s user account as an authorized remote desktop user.

Hacked by Piratez 70-270

Page 278: 70 270 q & a

Although you could use Remote Desktop Web Connection in this scenario, it is not necessary. Not using it is not the cause of the problem. Windows 95, Windows 98, Windows NT 4.0, Windows 2000, and Windows XP computers can all use the Remote Desktop Connection client software, which can be installed from the Windows XP installation CD. Beginning with Windows XP, Remote Desktop Connection is used in place of Terminal Services. The Terminal Services client can also be used, but this is only necessary on Windows NT 3.51 computers or 16-bit computers. Fast User Switching is not required for Remote Desktop.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #314]

Explanation:

User accounts must have a password to be used with remote desktop connections. You have already verified that Michelle’s account has appropriate permissions. The Remote Desktop Users group has appropriate user rights by default (Allow logon through Terminal Services). Fast User Switching is not required for Remote Desktop. Although it is true that a remote desktop user and local user cannot be using the computer at the same time, you will not receive the stated error message. Instead, you will be asked if you want to end the other user’s session.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #325]

You are a desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Michelle, a user in the marketing department, has installed numerous applications on her computer. Michelle wants to access the applications on her work computer from her Windows 98 computer at home.

You enable remote desktop on Michelle’s work computer and verify that her user account has appropriate permissions. You also explain to Michelle how to install Remote Desktop Connection on her home computer and connect to her work computer through a VPN connection. The next day, Michelle tells you that she followed your instructions exactly, but she could not connect to her work computer from her home computer. She received an error that stated “Unable to log you on because of an account restriction.”

You want to help Michelle connect to her work computer from her home computer using a remote desktop session. What should you do?

nmlkj Add Michelle’s user account to the Remote Desktop Users group.

nmlkj Enable Fast User Switching on Michelle’s work computer.

nmlkj Make sure the Remote Desktop Users group has the Log on Locally user right.

nmlkj Edit the System properties of Michelle’s work computer and enable Remote Assistance.

nmlkjEdit the Remote Desktop settings on Michelle’s work computer and add Michelle’s user account as an authorized remote desktop user.

nmlkji Make sure Michelle’s user account has a password.

nmlkj Make sure no other user is using Michelle’s work computer when she tries to access it remotely.

Hacked by Piratez 70-270

Page 279: 70 270 q & a

Explanation:

Michelle needs to remain connected to the ISP after sending the invitation. The IP address she obtained from the ISP is part of the invitation. If she sends the invitation, disconnects, and then re-establishes the connection, she may not receive the same IP address. This will prevent you from connecting to Michelle’s computer. The Remote Desktop Web Connection is not used by Remote Assistance. Adding your user account as an authorized remote desktop user will not impact the use of Remote Assistance. You can only invite yourself to help others if the other computer is configured to allow assistance from other specific users or groups. This method is only used in a domain environment when computers are connected to the same network and have consistent IP addresses and registered domain names.

Objective(s):

605. Configure, manage, and troubleshoot Remote Desktop and Remote Assistance.

Reference(s):

TestOut for Windows XP Administration, Section 3.7

[605 #336]

You are a help desk technician for your company. Michelle travels frequently and often works on a Windows XP Professional laptop computer in her hotel room. Michelle accesses the Internet using a nationwide ISP.

One day, Michelle calls the help desk and asks for help using one of her programs. You ask Michelle to dial into the ISP and send you a Remote Assistance invitation. Michelle sends the invitation, hangs up, and calls you back to make sure you received the invitation. You advise her that you received the invitation and ask her to reconnect to the ISP so you can accept the invitation and assist her.

Michelle follows your instructions. However, after you accept the invitation, you cannot connect to Michelle’s computer. You attempt to call Michelle’s hotel room, but the line is busy. Thirty minutes later, Michelle calls the help desk again wondering if you are ever going to help her.

You want to establish a remote assistance connection to Michelle’s computer. What should you do?

nmlkjInstruct Michelle to install the Remote Desktop Web Connection on her computer using Add or Remove Programs.

nmlkjiInstruct Michelle to send the Remote Assistance invitation again but remain connected to the Internet until instructed otherwise.

nmlkjCreate an invitation on your machine and send it to Michelle. Ask her to accept the invitation using the password you provide.

nmlkjInstruct Michelle to open the System properties of her computer and add your user name as an authorized remote desktop user.

You are a help desk technician for your company. Michelle travels frequently and often works on a Windows XP Professional laptop computer in her hotel room. Michelle accesses the Internet using a nationwide ISP.

One day, Michelle calls the help desk and asks for help using one of her programs. You ask Michelle to dial into the ISP and send you a Remote Assistance invitation. Michelle is concerned because she has some confidential documents on her laptop. She does not want the documents to be opened or copied to your computer.

You want to use Remote Assistance to help Michelle. You also want to assure Michelle that her documents will remain confidential. What should you do? (Choose two. Each correct choice is part of the solution.)

Hacked by Piratez 70-270

Page 280: 70 270 q & a

Hacked by Piratez 70-270

Page 281: 70 270 q & a

700

Configuring, Managing,

and Troubleshooting

Security

Page 282: 70 270 q & a

Hacked by Piratez 70-270

Explanation:

Once a file is encrypted using EFS, only the user who encrypted the file (and other users who that user authorizes) can access the file. A data recovery agent can also be configured for the network and distributed to client computers through group policy. The data recovery agent can decrypt files that have been encrypted. The data recovery agent will not need to take ownership of the file before decrypting the file. Decrypting encrypted files requires a private key (not a public key). Unauthorized users cannot copy encrypted files.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #260]

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Your administrative account is the data recovery agent for your network. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney recently left the company on short notice. Rodney’s manager, Kate, wants you to transfer all of Rodney’s documents to her computer.

You connect Rodney’s laptop to the company network, log on using your administrative account, and share his My Documents folder. You then log on to Kate’s computer using your administrative account and move all of Rodney’s documents to Kate’s My Documents folder on her computer. Later, Kate informs you that she cannot open one of Rodney’s documents. She receives an access denied message. Kate can open all other documents moved from Rodney’s computer.

You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do?

nmlkj Instruct Kate to save the file to a FAT32 partition to remove the encryption.

nmlkjInstruct Kate to share her My Documents folder on the network. Log on using your administrative account and access Kate’s My Documents folder over the network. Take ownership of the encrypted file and clear the Encrypt attribute.

nmlkjLog on using your administrative account and ensure that your Recovery Agent certificate and public key are located on the computer. Clear the Encrypt attribute on the file.

nmlkjiLog on using your administrative account and ensure that your Recovery Agent private key is located on the computer. Clear the Encrypt attribute on the file.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Your administrative account is the data recovery agent for your network. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney stores private company documents on his laptop and is concerned about the documents falling into the wrong hands if his laptop is stolen. Rodney wants you to protect the entire contents of his My Documents folder.

You log on to Rodney’s computer using your administrative account and enable the Encrypt attribute for Rodney’s My Documents folder and apply the change to all subfolders and files. You then return Rodney’s laptop to him. Rodney soon informs you that he cannot access any documents in his My Documents folder. He receives an access denied message.

You want to let Rodney access the documents in his My Documents folder. You also want to ensure that the documents are encrypted. What should you do? (Choose two. Each correct choice is part of the solution.)

Page 283: 70 270 q & a

Explanation:

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. In this case, because you performed the encryption, no other user can access Rodney’s My Documents folder and its subfolders and files. To fix this problem, you need to decrypt Rodney’s My Documents folder and its subfolders and files. Then Rodney needs to log on and encrypt his My Documents folder, including subfolders and files.

Although you can import an EFS certificate and private key, there is no need to do so. Windows XP Professional automatically creates a private and public key pair along with a self-signed EFS certificate if they do not already exist. Windows XP also protects your private keys stored on the computer using encryption based on your password, so there is no need to export your private keys. If you did export your private key, you would not be able to unencrypt files that you previously encrypted until you imported the private key again to your private key store. However, there is no indication in this scenario that any private keys were exported or that Rodney was ever added as an authorized user. Therefore, importing private keys would be unnecessary.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #268]

gfedc Import an EFS certificate and public key for Rodney on his computer.

gfedc Import an EFS certificate and private key for Rodney on his computer.

gfedc Import your EFS recovery agent certificate and private key to Rodney’s computer.

gfedcbLog on to Rodney’s computer using your administrative account. Clear the Encrypt attribute for Rodney’s My Documents folder. Apply the change to all subfolders and files.

gfedcbInstruct Rodney to log on to his computer, enable the Encrypt attribute for his My Documents folder, and apply the change to all subfolders and files.

gfedc Import your EFS certificate and public key to Rodney’s computer.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Your administrative account is the data recovery agent for your network. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney stores private company documents on his laptop and is concerned about the documents falling into the wrong hands if his laptop is stolen. Rodney wants you to protect the entire contents of his My Documents folder.

You log on to Rodney’s computer using your administrative account and enable the Encrypt attribute for Rodney’s My Documents folder and apply the change to all subfolders and files. You then return Rodney’s laptop to him. Rodney soon informs you that he cannot access any documents in his My Documents folder. He receives an access denied message.

You want to let Rodney access the documents in his My Documents folder. You also want to ensure that the documents are encrypted. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcbInstruct Rodney to log on to his computer. Have him set the encrypt attribute to the My Documents folder. Apply the change to all subfolders and files.

gfedcbLog on using your administrative account. Clear the encrypt attribute on Rodney's My Documents folder. Apply the change to all subfolders and files.

Hacked by Piratez 70-270

Page 284: 70 270 q & a

Explanation:

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. In this case, because you performed the encryption, no other user can access Rodney’s My Documents folder and its subfolders and files. To fix this problem, you have two choices:

Add Rodney as an authorized user to every file. You cannot add authorized users to a folder. Remove encryption, then have Rodney encrypt his files. Only Rodney will be able to read the files.

Although you can import an EFS certificate and private key, there is no need to do so. Windows XP Professional automatically creates a private and public key pair along with a self-signed EFS certificate if they do not already exist. Windows XP also protects your private keys stored on the computer using encryption based on your password, so there is no need to export your private keys. If you did export your private key, you would not be able to unencrypt files that you previously encrypted until you imported the private key again to your private key store. However, there is no indication in this scenario that any private keys were exported or that Rodney was ever added as an authorized user. Therefore, importing private keys would be unnecessary.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #278]

Explanation:

gfedc Import an EFS certificate and private key for Rodney on his computer.

gfedcLog on using your administrative account. Add Rodney as an authorized user for Rodney’s My Documents folder. Apply the change to all subfolders and files.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney shares the laptop with his manager, Kate.

Rodney stores private company documents in the C:/Data folder on his laptop. Both Rodney and Kate access the documents when they are using the laptop. Rodney is concerned about the documents falling into the wrong hands if his laptop is stolen. Rodney wants to protect the entire contents of the C:/Data folder.

You want to help Rodney encrypt the contents of the C:/Data folder so that Kate and Rodney are the only authorized users. What should you do?

nmlkjInstruct Rodney to log on to his computer, edit the properties of the C:/Data folder, and remove all NTFS permissions except for his user account and Kate’s user account. Grant his user account and Kate’s user account Full Control to the C:/Data folder.

nmlkjiInstruct Rodney to log on to his computer, edit the properties of the C:/Data folder, and enable the Encrypt attribute. Add Kate as an authorized user for each file in the C:/Data folder.

nmlkjLog on to Rodney’s computer using your administrative account. Remove all NTFS permissions on the C:/Data folder except Rodney’s user account and Kate’s user account. Grant them Full Control to the C:/Data folder.

nmlkjLog on to Rodney’s computer using your administrative account. Edit the properties of the C:/Data folder and enable the Encrypt attribute. Add Rodney and Kate as authorized users for each file in the C:/Data folder.

Hacked by Piratez 70-270

Page 285: 70 270 q & a

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. (You can add additional authorized users to files only, not to folders). If you perform the encryption, you will still be an authorized user. Therefore, Rodney should perform the encryption, then add Kate as an authorized user to each file in the C:\Data folder. Editing NTFS permissions will not affect the encrypted state of the C:\Data folder and thus will not protect the files should the laptop fall into the wrong hands. (Malicious users can possibly use another operating system installation or other tools that do not enforce NTFS permissions to access NTFS secured data.)

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #288]

Explanation:

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. If you perform the encryption, you will still be an authorized user. Therefore, Rodney should perform the encryption.

Some programs save temporary copies of data. Therefore, to ensure that data is never saved in an unencrypted format, the folder where Rodney’s program stores temporary data must also be encrypted. In this case, the program saves temporary data in Rodney’s Local Settings\Temp folder in his user profile folder, so that folder must also be encrypted.

One way to help determine where temporary folders are located is to look at the user and system environment variables. While logged on as the user, open the System applet in the Control Panel. On the Advanced tab, click the Environment Variables button. Look for TEMP, TMP, TMPDIR, and similar variables. User environment variables override system environment variables. Despite this method, you must ultimately understand the program’s behavior because a program can potentially store temporary data anywhere.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume.

Rodney stores a private company document named Stats.dat on his laptop and is concerned about the document falling into the wrong hands if his laptop is stolen. Rodney stores the Stats.dat file in the root of his My Documents folder. You ask Rodney what program he uses to edit Stats.dat. You recognize the program as one that stores temporary files in user Temp folders.

You want to encrypt the Stats.dat file so that Rodney is the only authorized user and so the data in the file is never stored on the laptop in an unencrypted format. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcLog on to Rodney’s computer using your administrative account. Encrypt Rodney’s My Documents folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Stats.dat file and add Rodney as an authorized user.

gfedcbInstruct Rodney to encrypt the Local Settings/Temp folder in his user profile folder, including all subfolders and files.

gfedc Instruct Rodney to encrypt the %SystemRoot%/Temp folder, including all subfolders and files.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the %SystemRoot%/Temp folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Local Settings/Temp folder in Rodney’s user profile folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcb Instruct Rodney to encrypt the Stats.dat file.

Hacked by Piratez 70-270

Page 286: 70 270 q & a

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #296]

Explanation:

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. If you perform the encryption, you will still be an authorized user. Therefore, Rodney should perform the encryption.

Some programs save temporary copies of data. Therefore, to ensure that data is never saved in an unencrypted format, the folder where Rodney’s program stores temporary data must also be encrypted. In this case, the program saves temporary data in the system temp folder (%SystemRoot%\Temp), so that folder must also be encrypted.

One way to help determine where temporary folders are located is to look at the user and system environment variables. While logged on as the user, open the System applet in the Control Panel. On the Advanced tab, click the Environment Variables button. Look for TEMP, TMP, TMPDIR, and similar variables. User environment variables override system environment variables. Despite this method, you must ultimately understand the program’s behavior because a program can potentially store temporary data anywhere. In this case, the program apparently stores the data directly in the %systemroot%\Temp folder rather than consulting the TEMP environment variable.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume.

Rodney stores a private company document named Stats.dat on his laptop and is concerned about the document falling into the wrong hands if his laptop is stolen. Rodney stores the Stats.dat file in the root of his My Documents folder. You ask Rodney what program he uses to edit Stats.dat. You recognize the program as one that stores temporary files in the system’s Temp folder.

You want to encrypt the Stats.dat file so that Rodney is the only authorized user and so the data in the file is never stored on the laptop in an unencrypted format. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Instruct Rodney to encrypt the %SystemRoot%/Temp folder, including all subfolders and files.

gfedcb Instruct Rodney to encrypt the Stats.dat file.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt Rodney’s My Documents folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Stats.dat file and add Rodney as an authorized user.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Local Settings/Temp folder in Rodney’s user profile folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcInstruct Rodney to encrypt the Local Settings/Temp folder in his user profile folder, including all subfolders and files.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the %SystemRoot%/Temp folder, including all subfolders and files. Add Rodney as an authorized user.

Hacked by Piratez 70-270

Page 287: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #308]

Explanation:

Once a file or folder is encrypted using EFS, only the user who encrypted the file or folder (and other users who that user authorizes) can access the file or folder. If you perform the encryption, you will still be an authorized user. Therefore, Rodney should perform the encryption.

Some programs save temporary copies of data. Therefore, to ensure that data is never saved in an unencrypted format, the folder where Rodney’s program stores temporary data must also be encrypted. In this case, the program saves temporary data in the same folder where the file is located. In this case, the file is located in Rodney’s My Documents folder, so that folder must also be encrypted. (To prevent all new documents in Rodney's My Documents folder from being encrypted, he could create instead a folder for documents that should be encrypted, move the file to that folder, and encrypt that folder and all its contents.)

It is important to understand a program’s behavior, because after a file is unencrypted and sent to the program, the program can potentially store the data anywhere as a temporary file.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume.

Rodney stores a private company document named Stats.dat on his laptop and is concerned about the document falling into the wrong hands if his laptop is stolen. Rodney stores the Stats.dat file in the root of his My Documents folder. You ask Rodney what program he uses to edit Stats.dat. You recognize the program as one that stores temporary files in the same folder as the file it is editing.

You want to encrypt the Stats.dat file so that Rodney is the only authorized user and so the data in the file is never stored on the laptop in an unencrypted format. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Instruct Rodney to encrypt the Stats.dat file.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Local Settings/Temp folder in Rodney’s user profile folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcb Instruct Rodney to encrypt his My Documents folder.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the Stats.dat file and add Rodney as an authorized user.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt Rodney’s My Documents folder, including all subfolders and files. Add Rodney as an authorized user.

gfedc Instruct Rodney to encrypt the %SystemRoot%/Temp folder, including all subfolders and files.

gfedcLog on to Rodney’s computer using your administrative account. Encrypt the %SystemRoot%/Temp folder, including all subfolders and files. Add Rodney as an authorized user.

gfedcInstruct Rodney to encrypt the Local Settings/Temp folder in his user profile folder, including all subfolders and files.

Hacked by Piratez 70-270

Page 288: 70 270 q & a

[701 #320]

Explanation:

You cannot encrypt folders or files that are compressed. In this scenario, Rodney should keep the volume compressed to save disk space and uncompress the Stats.doc file and his My Documents folder on an individual basis (uncompressing the volume would uncompress all folders and files on the volume). Once the Stats.doc file and Rodney's My Documents folder is uncompressed, Rodney can encrypt them. (To prevent all new documents in Rodney's My Documents folder from being encrypted, he could instead create a folder for documents that should be encrypted, move the Stats.doc file to that folder, and encrypt that folder and all its contents.)

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #332]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney’s computer is running out of space, so its volume is compressed.

Rodney stores a private company document named Stats.dat on his laptop and is concerned about the document falling into the wrong hands if his laptop is stolen. Rodney stores the Stats.dat file in the root of his My Documents folder. Rodney’s program for editing the Stats.dat file stores temporary data in the same folder where the file being edited is located.

You want to encrypt the Stats.dat file so that Rodney is the only authorized user. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcInstruct Rodney to encrypt the Local Settings/Temp folder in his user profile folder, including all subfolders and files.

gfedcb Instruct Rodney to encrypt the Stats.dat file and his My Documents folder.

gfedcInstruct Rodney to uncompress the Local Settings/Temp folder in his user profile folder, including all subfolders and files.

gfedcb Instruct Rodney to uncompress the Stats.dat file and his My Documents folder.

gfedc Instruct Rodney to uncompress his computer’s NTFS volume and all folders and files on the volume.

gfedc Instruct Rodney to encrypt his computer’s NTFS volume and all folders and files on the volume.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, uses a Windows XP Professional laptop computer with a single NTFS volume. Rodney’s computer is running out of space, so its volume is compressed.

Rodney stores a private company document named Stats.dat on his laptop. Because of his concern about the document falling into the wrong hands if his laptop is stolen, Rodney has encrypted the Stats.dat file. Now, Rodney wants to make a backup copy of the Stats.dat file. The file is 542 KB in size.

You want to help Rodney back up the Stats.dat file. You want the backup copy to remain encrypted. What should you do? (Choose all potential solutions.)

Hacked by Piratez 70-270

Page 289: 70 270 q & a

Explanation:

Encrypted files maintain their encryption when moved or copied to other NTFS volumes or when backed up to tape using Windows Backup. It does not matter whether the destination folder is encrypted or unencrypted. Files lose their compression when moved or copied to non-NTFS volumes (such as a floppy disk or a FAT32 volume). In this case, you are warned that an encrypted file will lose its encryption before the move or copy takes place and you must confirm the move or copy.

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #342]

Explanation:

The cipher command can be used at the command line to encrypt folders and files. The efsinfo command is a resource kit tool that lets you view the authorized users and data recovery agents for an encrypted file. The encrypt command is not a valid command for encrypting folders and files. The System Information program shows you detailed information about a Windows XP Professional computer, but you use the winmsd or msinfo32 commands to open it (not sysinfo). Also, the System Information program does not let you encrypt folders and files.

gfedcbOn Rodney's desktop computer, share a folder on an NTFS partition. Copy the Stats.dat file from the laptop to the shared folder.

gfedcb Install a tape drive to Rodney’s computer and back up the Stats.dat file using Windows Backup.

gfedcb Copy the Stats.dat file to an unencrypted folder on a network server’s NTFS volume.

gfedc Copy the Stats.dat file to a floppy disk.

gfedcb Copy the Stats.dat file to an encrypted folder on a network server’s NTFS volume.

gfedc Format a floppy disk using Windows XP Professional. Copy the Stats.dat file to the floppy disk.

gfedcOn Rodney's desktop computer, share a folder on a FAT32 partition. Copy the Stats.dat file from the laptop to the shared folder.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are members of a single Active Directory domain. Several users in the research department store sensitive company data in their My Documents folders. You want to encrypt the My Documents folder of all users in the research department.

You have previously configured a logon script for users in the research department. You distribute the logon script using group policy. You edit the research department’s logon script to write a statement to the RunOnce registry key. The RunOnce statement will be executed the next time the computer starts.

You need to decide which statement to write to the RunOnce registry key to perform the encryption. What should you do?

nmlkji Write a statement that uses the cipher command.

nmlkj Write a statement that uses the sysinfo command.

nmlkj Write a statement that uses the efsinfo command.

nmlkj Write a statement that uses the encrypt command.

Hacked by Piratez 70-270

Page 290: 70 270 q & a

Objective(s):

701. Configure, manage, and troubleshoot Encrypting File System (EFS).

Reference(s):

TestOut for Windows XP Administration, Section 5.1

[701 #353]

Explanation:

The Security Configuration and Analysis MMC snap-in lets you analyze security by comparing security settings on a computer to settings in a specified template. You can also use the tool to resolve discrepancies and reconfigure security settings for the computer.

To use the Security Configuration and Analysis MMC snap-in, you first create a database that has the settings you want to compare against. You can also open an existing database. Then right-click Security configuration and Analysis and select Analyze Computer Now…. The database settings versus the computer’s current settings will be shown.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #260]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer and only runs applications that are certified for Windows 2000 or above.

To secure Rodney’s computer, you apply the hisecws.inf template. You also implement a regular schedule for checking security settings on his computer to ensure that they have not changed.

The designated time to check security settings on Rodney’s computer arrives. You want to compare his computer’s current security settings with those defined in the hisecws.inf template. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcbCreate a new database that includes the hisecws.inf template settings. Then select the Analyze Computer Now… option.

gfedc Open the MMC and create a custom console that includes the Security Templates snap-in.

gfedcCreate a new database that includes the hisecws.inf template settings. Then select the Configure Computer Now… option.

gfedcOpen the MMC and create a custom console that includes the Group Policy snap-in. Focus the snap-in on the local group policy object.

gfedcb Open the MMC and create a custom console that includes the Security Configuration and Analysis snap-in.

gfedcCreate a new database that includes the hisecws.inf template settings. Then select the Import Template… option.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer and only

Hacked by Piratez 70-270

Page 291: 70 270 q & a

Explanation:

When you use the Security Configuration and Analysis MMC snap-in, you compare the computer’s current security settings against the settings in a database. Because you have already imported the hisecws.inf template settings into the database, you need to clear the database before importing the securews.inf template settings. Otherwise, your comparison will be inaccurate. You can either select the Clear this database before importing option when importing the securews.inf template, or you can create a new database before performing the import.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #270]

p g y y p p yruns applications that are certified for Windows 2000 or above.

You decide to check the security settings on Rodney’s computer. You open the Security Configuration and Analysis snap-in and compare the security settings on Rodney’s computer against the hisecws.inf template settings. You notice a number of discrepancies.

You decide to compare the security settings on Rodney’s computer against the securews.inf template settings. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc Select the Configure Computer Now… option.

gfedcb Select the Clear this database before importing option.

gfedcb Select the Import Template… option. Select the securews.inf template.

gfedcSelect the Export Template… option. Export the database settings to a template using any template name you choose.

gfedc Select the Export Template… option. Export the database settings to a template named hisecws.inf.

gfedc Select the Export Template… option. Export the database settings to a template named securews.inf.

gfedc Select the Import Template… option. Select the hisecws.inf template.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer. Rodney is a member of his computer’s local Users group. Rodney runs some applications that are not certified for Windows 2000 or above.

You are using the Security Analysis and Configuration snap-in to create a security template to apply to Rodney’s computer. You import the compatws.inf template. You now want to import a predefined security template that will secure Rodney’s computer as much as possible without introducing problems for Rodney when he runs applications. What should you do?

nmlkj Import the rootsec.inf template.

nmlkji Import the securews.inf template.

nmlkj Import the securedc.inf template.

nmlkj Import the hisecdc.inf template.

nmlkj Import the setup security.inf template.

nmlkj Import the hisecws inf template

Hacked by Piratez 70-270

Page 292: 70 270 q & a

Explanation:

Several predefined security templates are available. Templates that end in “dc” are designed specifically for domain controllers. Templates that end in “ws” are designed specifically for workstations.

Normally, users who are only members of the local Users group (rather than being Power Users or Administrators) might have some problems running applications that are not certified for Windows 2000 or above. Such problems are due to the way the registry is secured. Rather than making users members of the Power Users group (which gives them extensive privileges), you can apply the compatws.inf security template to relax the permissions for the Users group.

The securews.inf template secures a computer as much as possible without causing application compatibility problems. For example, it requires certain authentication protocols when communicating with other computers on the network and defines stronger password requirements.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #281]

Explanation:

Several predefined security templates are available. Templates that end in “dc” are designed specifically for domain controllers. Templates that end in “ws” are designed specifically for workstations. The hisecws.inf template secures a computer as much as possible. Users who are only members of the local Users group (rather than being Power Users or Administrators) might have some problems running applications that are not certified for Windows 2000 or above. This is due to the way the registry is secured. In this scenario, Rodney uses only certified applications and should not experience problems.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

nmlkj Import the hisecws.inf template.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer. Rodney is a member of his computer’s local Users group. All of Rodney’s applications are certified for Windows 2000 or above.

You want to secure Rodney’s computer as much as possible without introducing problems for Rodney when he runs applications. What should you do?

nmlkj Apply the rootsec.inf template.

nmlkji Apply the hisecws.inf template.

nmlkj Do nothing.

nmlkj Apply the compatws.inf template.

nmlkj Apply the securews.inf template.

nmlkj Apply the hisecdc.inf template.

nmlkj Apply the securedc.inf template.

nmlkj Apply the setup security.inf template.

Hacked by Piratez 70-270

Page 293: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #291]

Explanation:

Normally, users who are only members of the local Users group (rather than being Power Users or Administrators) might have some problems running applications that are not certified for Windows 2000 or above. Such problems are due to the way the registry is secured. Rather than making users members of the Power Users group (which gives them extensive privileges), you can apply the compatws.inf security template to relax the permissions for the Users group.

Several predefined security templates are available. Templates that end in “dc” are designed specifically for domain controllers. Templates that end in “ws” are designed specifically for workstations.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #303]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney is a member of his computer’s local Users group. You install some applications for Rodney that are not certified for Windows 2000 or above.

You want to ensure that Rodney can run these applications without problems. What should you do?

nmlkj Apply the rootsec.inf template.

nmlkj Do nothing.

nmlkj Apply the securedc.inf template.

nmlkji Apply the compatws.inf template.

nmlkj Apply the hisecws.inf template.

nmlkj Apply the hisecdc.inf template.

nmlkj Apply the securews.inf template.

nmlkj Apply the setup security.inf template.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney is a member of his computer’s local Power Users group. You install some applications for Rodney that are not certified for Windows 2000 or above.

You want to ensure that Rodney can run these applications without problems. What should you do?

nmlkj Apply the securedc.inf template.

nmlkj Apply the rootsec.inf template.

nmlkji Do nothing

Hacked by Piratez 70-270

Page 294: 70 270 q & a

Explanation:

In this scenario, Rodney is already a power user so you do not need to do anything to ensure that Rodney can run his applications. Normally, users who are only members of the local Users group (rather than being Power Users or Administrators) might have some problems running applications that are not certified for Windows 2000 or above. Such problems are due to the way the registry is secured. Rather than making users members of the Power Users group (which gives them extensive privileges), you can apply the compatws.inf security template to relax the permissions for the Users group. However, in this scenario, if you apply the compatws.inf template, Rodney will be removed from the Power Users group and perhaps lose access to log on locally to the computer (unless he is also a member of the Users group).

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #315]

Explanation:

In this scenario, Rodney is a power user so you did not need to do anything to ensure that Rodney can run his applications. In fact, because you applied the compatws.inf template, Rodney was removed from the Power Users group and lost access to log on locally to the computer. To let Rodney log on and run the non-certified applications, you need to add Rodney to at least the Users local group. To give him his previous administrative privileges, you need to add Rodney to the Power Users local group again. Adding Rodney to the Administrators local group would give him too many privileges.

Reapplying the compatws.inf template will not accomplish anything. Applying the hisecws.inf template will tighten security,

nmlkji Do nothing.

nmlkj Apply the hisecws.inf template.

nmlkj Apply the compatws.inf template.

nmlkj Apply the setup security.inf template.

nmlkj Apply the securews.inf template.

nmlkj Apply the hisecdc.inf template.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney is a member of his computer’s local Power Users group. Rodney is not a member of any other local groups. You install some applications for Rodney that are not certified for Windows 2000 or above.

You want to ensure that Rodney can run these applications without problems. You apply the compatws.inf security template. You create a test user who is a member of the Users local group and successfully log on and run the non-certified applications. However, when Rodney attempts to log on he receives a message stating that he does not have permission to log on.

You want to let Rodney log on to the computer, run the non-certified applications, and perform other administrative tasks that he previously performed (without giving Rodney additional privileges). What should you do?

nmlkj Add Rodney to the Administrators local group.

nmlkj Add Rodney to the Users local group.

nmlkji Add Rodney to the Power Users local group.

nmlkj Apply the compatws.inf template again.

nmlkj Apply the hisecws.inf template.

Hacked by Piratez 70-270

Page 295: 70 270 q & a

but will still not let Rodney log on by adding him to an appropriate group.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #327]

Explanation:

When you apply the hisecws.inf security template, all users are removed from the Power Users group and only the Domain Administrators group and the local Administrator account are left as members of the Administrators local group.

In this scenario, Rodney was removed from the Power Users group and lost access to log on locally to the computer. To let Rodney log on again, you need to add him to at least the Users local group. To give him his previous administrative privileges, you need to add Rodney to the Power Users local group again. Adding Rodney to the Administrators local group would give him too many privileges.

Reapplying the hisecws.inf template or applying other templates will not accomplish anything towards adding Rodney to a group who has permission to log on locally.

Several predefined security templates are available. Templates that end in “dc” are designed specifically for domain controllers. Templates that end in “ws” are designed specifically for workstations.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer. Rodney is a member of his computer’s local Power Users group. Rodney is not a member of any other local groups. Rodney only runs applications that are certified for Windows 2000 or above.

You want to secure Rodney’s computer as much as possible. You apply the hisecws.inf security template. You create a test user who is a member of the Users local group and successfully log on and run Rodney’s applications. However, when Rodney attempts to log on he receives a message stating that he does not have permission to log on.

You want to let Rodney log on to the computer, run his applications, and perform other administrative tasks that he previously performed (without giving Rodney additional privileges). What should you do?

nmlkj Apply the compatws.inf template.

nmlkj Add Rodney to the Users local group.

nmlkj Apply the securews.inf template.

nmlkj Add Rodney to the Administrators local group.

nmlkj Apply the hisecws.inf template again.

nmlkji Add Rodney to the Power Users local group.

Hacked by Piratez 70-270

Page 296: 70 270 q & a

[702 #336]

Explanation:

When you apply the hisecws.inf security template, only the Domain Administrators group and the local Administrator account are left as members of the Administrators local group. Also, all users are removed from the Power Users group.

In this scenario, Rodney was removed from the Administrators group and lost access to log on locally to the computer. To let Rodney log on again, you need to add him to at least the Users local group. To give him his previous administrative privileges, you need to add Rodney to the Administrators local group again. Adding Rodney to the Power Users local group would not restore all his privileges.

Reapplying the hisecws.inf template or applying other templates will not accomplish anything towards adding Rodney to a group who has permission to log on locally.

Several predefined security templates are available. Templates that end in “dc” are designed specifically for domain controllers. Templates that end in “ws” are designed specifically for workstations.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #346]

You are the domain administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores confidential data on his computer. Rodney is a member of his computer’s local Administrators group. Rodney is not a member of any other local groups. Rodney only runs applications that are certified for Windows 2000 or above.

You want to secure Rodney’s computer as much as possible. You apply the hisecws.inf security template. You log off and successfully log back on, then run some of Rodney’s applications. However, when Rodney attempts to log on, he receives a message stating that he does not have permission to log on.

You want to let Rodney log on to the computer, run his applications, and perform other administrative tasks that he previously performed. What should you do?

nmlkji Add Rodney to the Administrators local group.

nmlkj Add Rodney to the Users local group.

nmlkj Apply the hisecws.inf template again.

nmlkj Apply the securews.inf template.

nmlkj Add Rodney to the Power Users local group.

nmlkj Apply the compatws.inf template.

You are the network administrator for your company. You upgrade all computers in the research department from Windows NT Workstation 4.0 to Windows XP Professional. All computers are configured with the default security settings and are joined to a single Active Directory domain. All research department computer accounts are located in the Research OU.

A user named Rodney reports that he can no longer run an application on his upgraded Windows XP Professional computer. Prior to the upgrade, Rodney was able to run the application. Rodney’s user account is a member of his computer’s local Users group. Other users in the research department are experiencing the same problem.

Hacked by Piratez 70-270

Page 297: 70 270 q & a

Explanation:

You can distribute security templates by importing them into a group policy object and distributing them to computers. Alternately, you can use the secedit command with the /configure switch to apply security templates. You can use other switches to analyze the computer (compare current settings against a template) or to validate the syntax of a template. In Windows XP, the gpupdate command replaces the /refreshpolicy switch. You would want to use the /target:computer switch rather than the /target:user switch to apply security changes immediately to applicable computers, or you can omit the switch to refresh both computer and user group policy. (In this question, the correct switch was not listed as a possible answer.)

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #356]

p g p p p g p

You want to apply the compatws.inf security template to all computers in the research department. What should you do? (Choose two possible solutions. Note that path indicates the full path to the file in the solutions below.)

gfedcInstruct all users in the research department to run the secedit /refreshpolicy machine_policy command.

gfedcCreate a script that contains the secedit /analyze /cfg path/compatws.inf /db path/compatws.sdb command. Make sure the script is run on all computers in the research department.

gfedcbCreate a script that contains the secedit /configure /cfg path/compatws.inf /db path/compatws.sdb command. Make sure the script is run on all computers in the research department.

gfedcb Import the compatws.inf security template into a group policy object linked to the Research OU.

gfedc Instruct all users in the research department to run the gpupdate /target:user command.

gfedcCreate a script that contains the secedit /validate path/compatws.inf command. Make sure the script is run on all computers in the research department.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Rodney, a user in the research department, stores sensitive data on his computer and only runs applications that are certified for Windows 2000 or above. To secure his computer, you want to apply the hisecws.inf template. You open Local Security Policy as shown in the exhibit below.

You want to import the hisecws.inf template. Identify the node you should select by clicking it.

Hacked by Piratez 70-270

Page 298: 70 270 q & a

Explanation:

Select the Security Settings node to import a predefined or a custom security template. You can either right-click the node and select Import Policy…, or you can select the node and select Import Policy… from the Action menu.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #367]

Explanation:

Security templates are applied to computers, although they affect a user's ability to log on and use the computer. To import a predefined or a custom security template, select the Security Settings node under Computer Configuration. You can either right-click the node and select Import Policy…, or you can select the node and select Import Policy… from the Action menu.

Objective(s):

You are the desktop administrator for your company. Rodney, a user in the research department, stores sensitive data on his Windows XP computer. To secure his computer, you want to apply the hisecws.inf template. You create a custom group policy console focused on the local computer. You want to import the hisecws.inf template. Identify the node you should select by clicking it.

Hacked by Piratez 70-270

Page 299: 70 270 q & a

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #379]

Explanation:

The Security Configuration and Analysis MMC snap-in lets you analyze security by comparing security settings on a computer to settings in a specified template. You can also use the tool to resolve discrepancies and reconfigure security settings for the computer.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #385]

You are the desktop administrator for your company. Rodney, a user in the research department, stores sensitive data on his Windows XP computer. To secure his computer, you apply the hisecws.inf template. Later, you want to compare his computer's current security settings against the hisecws.inf template. You create a custom console. Click the snap-in you should add to complete your desired task.

You are the desktop administrator for your company. Rodney, a user in the research department, stores sensitive data on his Windows XP computer. You want to create a custom template based on the hisecws.inf template, which you will apply to all computers in the research department. You do not want to create a security database on your computer. You create a custom console. Click the snap-in you should add to complete your desired task.

Hacked by Piratez 70-270

Page 300: 70 270 q & a

Explanation:

The Security Templates MMC snap-in lets you create and modify templates, perhaps based on predefined templates such as hisecws.inf. Although you can export a template based on the current database settings when using the Security Analysis and Configuration snap-in, you do not want to analyze the configuration of your computer or create a database on your computer. Therefore, you should use the Security Templates snap-in instead.

Objective(s):

702. Configure, manage, and troubleshoot security configuration and local security policy.

Reference(s):

TestOut for Windows XP Administration, Section 9.3

[702 #390]

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Some users occasionally log on to their computers using a local account.

You are configuring security settings that will be distributed to all computers on your network. Passwords should be at least 8 characters long and must not contain any part of the user account name. You want to force users to change their passwords between every 30 and 60 days. You do not want users to reuse their last 20 passwords.

You want to create a policy that meets these requirements. What should you do? (Choose all that apply.)

gfedc Set Minimum password age to 60.

gfedcb Set Enforce password history to 20.

gfedc Set Minimum password length to 20.

gfedc Set Enforce password history to 8.

gfedc Disable Passwords must meet complexity requirement.

dc

Hacked by Piratez 70-270

Page 301: 70 270 q & a

Explanation:

Password policy controls password requirements. Password policy on a Windows XP Professional computer is configured by configuring the local security policy or by distributing settings using a Group Policy object (if the computer is a member of an Active Directory domain). Settings include:

Enforce password history--Remembers the specified number of passwords used for a user account and prevents users from reusing passwords.

Maximum password age--Forces users to change their password after the specified number of days have passed. The default is 42. A 0 indicates that passwords will not expire.

Minimum password age--Prevents users from changing their passwords until the specified number of days have passed. The value must be less than the value of the maximum password age. The default is 0, which indicates that the password can be changed immediately. Do not use 0 if you are enforcing password history. If you do, a user can immediately change his or her password back to the old password.

Minimum password length--Determines the minimum number of characters a user's password must contain. The default is 0, which indicates that no password is required.

Password must meet complexity requirements--When enabled, passwords must be at least 6 characters in length, may not contain any part of the user account name, and must use characters from at least three of the following four groups: English uppercase letters, English lowercase letters, Base 10 digits (0 through 9), and non-alphanumeric characters (such as !, $, #, or %). If the Minimum password length setting exceeds 6 characters, that requirement overrides the 6-character minimum established by the complexity requirement.

Store password using reversible encryption for all users--When enabled, Windows XP stores a reversibly encrypted password to let users use CHAP authentication to connect to the computer using remote access, or to support authenticated web connections using Digest Authentication. Practically speaking, this setting stores passwords in plain text because the password’s encryption can be easily reversed.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.1

[703 #260]

gfedcb Set Maximum password age to 60.

gfedcb Set Minimum password age to 30.

gfedcb Enable Passwords must meet complexity requirement.

gfedcb Set Minimum password length to 8.

gfedc Set Maximum password age to 30.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Some users occasionally log on to their computers using a local account.

You are configuring security settings that will be distributed to all computers on your network. If a user tries to log on to a computer and fails five times, you want the system to lock them out until you unlock the account.

You want to create a policy that meets these requirements. What should you do? (Choose all that apply.)

gfedc Set Reset account lockout counter after to 1.

Hacked by Piratez 70-270

Page 302: 70 270 q & a

Explanation:

Account lockout policy settings (not Password Policy or Audit Policy settings) are used to prevent an unauthorized user from repeatedly trying to break into the computer. Account lockout policy on a Windows XP Professional computer is configured by configuring the local security policy or by distributing settings using a Group Policy object (if the computer is a member of an Active Directory domain). Settings include:

Account lockout threshold--Determines how many failed login attempts can occur before Windows XP locks out the account.

Account lockout duration--Determines the amount of time a lockout is effective. The default is 30 minutes if an account lockout threshold is configured. In a high-security network, use a value of 0 so that the administrator must manually unlock the account.

Reset account lockout counter after--Determines the amount of time Windows XP should wait before resetting the failed attempts counter to zero. The default is 30 minutes if an account lockout threshold is configured. The minimum value is 1 minute. In this scenario, there are no requirements indicating that this value should be changed from the default value.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.1

[703 #274]

gfedc Set Account lockout duration to 99999.

gfedc Set Reset account lockout counter after to 0.

gfedc Configure Password Policy settings.

gfedc Set Account lockout duration to 5.

gfedc Set Reset account lockout counter after to 5.

gfedc Configure Audit Policy settings.

gfedcb Set Account lockout duration to 0.

gfedc Set Reset account lockout counter after to 99999.

gfedc Set Account lockout threshold to 0.

gfedcb Set Account lockout threshold to 5.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Several computers store sensitive information.

You are configuring security settings that will be distributed to all computers on your network. You want to identify attempts to break into a computer by having the computer that denies the authentication attempt note the failed attempt in its Security database.

You want to create a policy that meets these requirements. What should you do?

nmlkji Select Failure for Audit account logon events.

nmlkj Select Success for Audit account logon events.

nmlkj Select Failure for Audit logon events.

nmlkj Select Success for Audit logon events.

Hacked by Piratez 70-270

Page 303: 70 270 q & a

Explanation:

Audit policy settings are used to define which events will be noted in a computer’s Security log when they occur. Audit policy on a Windows XP Professional computer is configured by configuring the local security policy or by distributing settings using a Group Policy object (if the computer is a member of an Active Directory domain). Each setting can be enabled to audit successful events, failed events, or both. When configuring audit policy for a Windows XP computer, you will generally be concerned with the following types of events:

Account logon events occur when a computer authenticates (or fails to authenticate) an account from its database. In other words, these events are generated where the logon is authenticated. (In this scenario, you want to audit when a computer denies authentication, so this is what needs to be audited.)

Logon events occur when a user uses a computer to log on. In other words, these events are generated where the logon is performed.

Account management events occur when user or group objects are created, deleted, or edited in a computer’s database.

System events occur when a computer restarts, shuts down, or when an event that affects system security or the security log occurs.

Object access events occur when a user accesses any object with its own access control list (such as a file, folder, registry key, or printer). In addition to enabling auditing of these types of events, you must also edit the properties of the specific objects you want to audit and define what type of access to the object you will audit.

Policy change events occur when a computer’s audit policies, user rights assignments, or trust policies change.

Privilege use events occur when a user exercises a user right defined in the computer’s user rights assignments. A few user rights do not generate auditing events, such as backing up or restoring files.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #289]

g

nmlkj Select Failure for Audit object access.

nmlkj Select Success for Audit object access.

nmlkj Select Failure for Audit system events.

nmlkj Select Success for Audit system events.

nmlkj Select Failure for Audit account management.

nmlkj Select Success for Audit account management.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Several computers store sensitive information.

You are configuring security settings that will be distributed to all computers on your network. You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions.

You want to create a policy that meets these requirements. What should you do?

nmlkj Select Failure for Audit account logon events.

Hacked by Piratez 70-270

Page 304: 70 270 q & a

Explanation:

Audit policy settings are used to define which events will be noted in a computer’s Security log when they occur. Audit policy on a Windows XP Professional computer is configured by configuring the local security policy or by distributing settings using a Group Policy object (if the computer is a member of an Active Directory domain). Each setting can be enabled to audit successful events, failed events, or both. When configuring audit policy for a Windows XP computer, you will generally be concerned with the following types of events:

Account logon events occur when a computer authenticates (or fails to authenticate) an account from its database. In other words, these events are generated where the logon is authenticated.

Logon events occur when a user uses a computer to log on. In other words, these events are generated where the logon is performed.

Account management events occur when user or group objects are created, deleted, or edited in a computer’s database.

System events occur when a computer restarts or shuts down a computer, or when an event that affects system security or the security log occurs.

Object access events occur when a user accesses any object with its own access control list (such as a file, folder, registry key, or printer). In addition to enabling auditing of these types of events, you must also edit the properties of the specific objects you want to audit and define what type of access to the object you will audit.

Policy change events occur when a computer’s audit policies, user rights assignments, or trust policies change.

Privilege use events occur when a user exercises a user right defined in the computer’s user rights assignments. A few user rights do not generate auditing events, such as backing up or restoring files.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #303]

mk a u e ud t accou t ogo e e ts

nmlkj Select Success for Audit account logon events.

nmlkj Select Failure for Audit logon events.

nmlkj Select Success for Audit logon events.

nmlkji Select Failure for Audit object access.

nmlkj Select Success for Audit object access.

nmlkj Select Failure for Audit system events.

nmlkj Select Success for Audit system events.

nmlkj Select Failure for Audit account management.

nmlkj Select Success for Audit account management.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Several computers store sensitive information.

You are configuring security settings that will be distributed to all computers on your network. You want to identify denied attempts to change a user’s group membership in a computer’s local database.

You want to create a policy that meets these requirements. What should you do?

Hacked by Piratez 70-270

Page 305: 70 270 q & a

Explanation:

Audit policy settings are used to define which events will be noted in a computer’s Security log when they occur. Audit policy on a Windows XP Professional computer is configured by configuring the local security policy or by distributing settings using a Group Policy object (if the computer is a member of an Active Directory domain). Each setting can be enabled to audit successful events, failed events, or both. When configuring audit policy for a Windows XP computer, you will generally be concerned with the following types of events:

Account logon events occur when a computer authenticates (or fails to authenticate) an account from its database. In other words, these events are generated where the logon is authenticated.

Logon events occur when a user uses a computer to log on. In other words, these events are generated where the logon is performed.

Account management events occur when user or group objects are created, deleted, or edited in a computer’s database.

System events occur when a computer restarts or shuts down a computer, or when an event that affects system security or the security log occurs.

Object access events occur when a user accesses any object with its own access control list (such as a file, folder, registry key, or printer). In addition to enabling auditing of these types of events, you must also edit the properties of the specific objects you want to audit and define what type of access to the object you will audit.

Policy change events occur when a computer’s audit policies, user rights assignments, or trust policies change.

Privilege use events occur when a user exercises a user right defined in the computer’s user rights assignments. A few user rights do not generate auditing events, such as backing up or restoring files.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #317]

nmlkj Select Failure for Audit account logon events.

nmlkj Select Success for Audit account logon events.

nmlkj Select Failure for Audit logon events.

nmlkj Select Success for Audit logon events.

nmlkj Select Failure for Audit object access.

nmlkj Select Success for Audit object access.

nmlkj Select Failure for Audit system events.

nmlkj Select Success for Audit system events.

nmlkji Select Failure for Audit account management.

nmlkj Select Success for Audit account management.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on his computer. Several other users have local accounts on the same machine. Each morning, Rodney wants to know if anyone has logged on or attempted to log on during the night.

Hacked by Piratez 70-270

Page 306: 70 270 q & a

Explanation:

If domain policy settings are defined, they will override local policy settings. You can confirm that this is the problem by using the gpresult tool, perhaps in verbose mode. If you configure the Security log to overwrite events, events written to the log will be replaced by other events when the maximum log size is reached.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.1

[703 #331]

Explanation:

The best way to deny users the right to log on locally is to create a local group containing prohibited users and add it to the Deny logon locally user right. You can also ensure that only authorized users are members of groups or individually listed for the Log on locally user right, but in this case, that would take more administrative effort. The Log on locally user right lists users and groups who are authorized to log on locally. The user right does not have a way to explicitly deny a user the right to log on locally.

You enable auditing of successful and failed logons to the computer. The next morning Rodney checks the computer’s Security log and discovers that no logons are recorded, not even his own logon.

You want to make sure successful and failed logons to Rodney’s computer are noted in his computer’s Security log. What should you do?

nmlkj Configure the Security log to overwrite events older than 1 day.

nmlkj Apply the compatws.inf security template.

nmlkj Configure the Security log to overwrite events as needed.

nmlkji Check for conflicting group policies on the domain controller.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on a computer. Rodney shares the computer with other users in the research department.

Rodney wants to prevent six users in the research department from ever logging on to his computer. You want to use the least administrative effort possible. What should you do?

nmlkjOpen the local security policy on a domain controller. Add each authorized user to the Log on locally user right.

nmlkjCreate a domain local group named Prohibited that contains the six users. Open the local security policy on a domain controller. Add the Prohibited group to the Deny logon locally user right.

nmlkjiCreate a local group named Prohibited that contains the six users. Open the local security policy for Rodney’s computer. Add the Prohibited group to the Deny logon locally user right.

nmlkjOpen the local security policy on Rodney’s computer. Add each authorized user to the Log on locally user right.

nmlkj Go to the Properties dialog box for each prohibited user and deny each user the Log on locally permission.

nmlkjCreate a local group named Prohibited that contains the six users. Open the local security policy for Rodney’s computer. Deny the Prohibited group permission to the Log on locally user right.

Hacked by Piratez 70-270

Page 307: 70 270 q & a

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.1

[703 #339]

Explanation:

Windows XP Professional computers have the following built-in local groups. Each group has a set of rights that determine what system tasks a user can perform.

Administrators--Have complete and unrestricted access to the computer (the only built-in group that automatically has all rights).

Backup Operators--Can back up and restore files on the computer (regardless of file permissions). Can also log on to and shut down the computer. Cannot change security settings.

Network Configuration Operators--Can configure networking settings on the computer.

Power Users--Can create user accounts and modify and delete accounts they create. Can create local groups and define their membership. Can also define the membership of the Power Users, Users, and Guests groups. Cannot define the membership of other groups, take ownership of files, back up or restore files, load or unload device drivers, or manage security and auditing logs.

Users--Can perform common tasks (run applications, print to local and network printers, shut down and lock workstations). Cannot create local groups or define their membership. Cannot share folders or create local printers (although they can access shared folders and create network printers).

Remote Desktop Users--Can log on remotely to the computer.

Guests--Lets occasional or one-time users log on to the built-in Guest account with limited rights.

Replicator--Used by the system for directory replication functions. Accounts for computer users should not be members of this group.

Objective(s):

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on a computer. He wants to delegate the task of backing up and restoring the computer to a user named Kate. Kate also needs to create local user accounts on the computer, but she should not be able to manage auditing logs.

You need to add Kate’s user account to the appropriate local groups on Rodney’s computer. What should you do? (Choose all that apply.)

gfedc Add Kate to the Administrators local group.

gfedcb Add Kate to the Power Users local group.

gfedcb Add Kate to the Backup Operators local group.

gfedc Add Kate to the Network Configuration Operators local group.

gfedc Add Kate to the Replicator local group.

Hacked by Piratez 70-270

Page 308: 70 270 q & a

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 1.3

[703 #349]

Explanation:

Windows XP Professional computers have the following built-in local groups. Each group has a set of rights that determine what system tasks a user can perform.

Administrators--Have complete and unrestricted access to the computer (the only built-in group that automatically has all rights).

Backup Operators--Can back up and restore files on the computer (regardless of file permissions). Can also log on to and shut down the computer. Cannot change security settings

Network Configuration Operators--Can configure networking settings on the computer.

Power Users--Can create user accounts and modify and delete accounts they create. Can create local groups and define their membership. Can also define the membership of the Power Users, Users, and Guests groups. Cannot define the membership of other groups, take ownership of files, back up or restore files, load or unload device drivers, or manage security and auditing logs.

Users--Can perform common tasks (run applications, print to local and network printers, shut down and lock workstations). Cannot create local groups or define their membership. Cannot share folders or create local printers (although they can access shared folders and create network printers).

Remote Desktop Users--Can log on remotely to the computer.

Guests--Lets occasional or one-time users log on to the built-in Guest account with limited rights.

Replicator--Used by the system for directory replication functions. Accounts for computer users should not be members of this group.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on a computer. He wants to delegate the task of backing up and restoring the computer to a user named Kate. Kate should not be able to create local user accounts on the computer.

You need to add Kate’s user account to the appropriate local groups on Rodney’s computer. What should you do? (Choose all that apply.)

gfedc Add Kate to the Administrators local group.

gfedcb Add Kate to the Backup Operators local group.

gfedc Add Kate to the Power Users local group.

gfedc Add Kate to the Network Configuration Operators local group.

gfedc Add Kate to the Replicator local group.

Hacked by Piratez 70-270

Page 309: 70 270 q & a

TestOut for Windows XP Administration, Section 1.3

[703 #358]

Explanation:

It is simplest to rename the user account, because the two individuals are performing the same tasks.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 1.2

[703 #367]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, has extensive permissions to certain files on his computer through a local user account.

Recently, Rodney left the company. Kate has been chosen to fulfill Rodney’s position and will be using Rodney’s old computer. Kate needs the same permissions as Rodney previously had. You want to grant Kate the necessary permissions using the least administrative effort possible. What should you do?

nmlkj Copy Rodney’s account and name it Kate. Delete Rodney’s account.

nmlkji Rename Rodney’s user account and reset his password.

nmlkjCreate a new account for Kate. Configure security properties for the necessary files and folders and grant the appropriate access to Kate.

nmlkj Create a new account for Kate. Use Adsiedit to import Rodney’s account information to Kate’s account

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Rodney, a user in the research department, shares a computer with two other users. One day, Rodney notices that some of his documents have been deleted from the computer’s local hard drive. You restore the documents from a recent backup. Rodney now wants you to configure the computer so he can track all users who delete his documents in the future.

You enable auditing of successful object access events in the computer’s local security policy. Rodney then logs on and creates a sample document. To test auditing, you then log on and delete the document. However, when you examine the computer’s Security log, no auditing events are listed.

You want to make sure an event is listed in the Security log whenever one of Rodney’s documents is deleted. What should you do?

nmlkj Configure the local security policy to audit failed system events.

nmlkj Configure the local security policy to audit successful system events.

nmlkjEdit the advanced security properties of the folder containing Rodney’s documents. Configure an auditing entry for the Everyone group. Configure the entry to audit failure of the Delete permission.

nmlkjEdit the advanced security properties of the folder containing Rodney’s documents. Configure an auditing entry for the Everyone group. Configure the entry to audit success of the Modify permission.

nmlkjiEdit the advanced security properties of the folder containing Rodney’s documents. Configure an auditing

f h E C fi h di f h D l i i

Hacked by Piratez 70-270

Page 310: 70 270 q & a

Explanation:

Object access events occur when a user accesses any object with its own access control list (such as a file, folder, registry key, or printer). In addition to enabling auditing of these types of events, you must also edit the properties of the specific objects you want to audit and define what type of access to the object you will audit.

You configure auditing using special permissions (such as Delete) rather than the less advanced permissions (such as Modify, which includes the Delete special permission). In this scenario, you should audit the successful exercise of the permission.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #375]

Explanation:

When the CrashOnAuditFail registry entry is enabled (set to 1), the computer immediately crashes with a STOP error if entries can no longer be written to the Security log.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

nmlkji entry for the Everyone group. Configure the entry to audit success of the Delete permission.

nmlkj Configure the local security policy to audit failed object access events.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on a computer. Other users share the computer. Rodney and other users in the research department who use the computer are members of the computer’s Users local group.

To protect the computer, you apply a predefined security template and enable auditing in the computer’s local group policy object. You verify that access to sensitive files is audited. To ensure that no auditing entries are lost, you configure the Security log to not overwrite events.

One day, Rodney is using the computer when he receives a STOP error. He reboots the computer but can no longer log on. You can successfully log on to his computer using your administrative account.

You want to make sure Rodney and others can successfully log on to the computer. What should you do?

nmlkji Set the CrashOnAuditFail registry entry to 0 and clear the Security log.

nmlkj Set the CrashOnAuditFail registry entry to 1 and clear the Security log.

nmlkjIn the computer’s Startup and Recovery options, configure a complete memory dump to be written for debugging information.

nmlkj Configure the local security policy to no longer audit failed object access events.

nmlkj Configure the local security policy to no longer audit successful account logon events.

nmlkjIn the computer’s Startup and Recovery options, configure a small memory dump to be written for debugging information.

Hacked by Piratez 70-270

Page 311: 70 270 q & a

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #385]

Explanation:

When the CrashOnAuditFail registry entry is enabled (set to 1), the computer immediately crashes with a STOP error if entries can no longer be written to the Security log. You can configure the Security log to overwrite events, which will prevent this error, or you can turn off the CrashOnAuditFail feature (by default, it is disabled). However, you might never detect some events that occur if you allow events in the security log to be overwritten. Therefore, the best solution in this scenario is to save the security log and clear it so more events can be written to it.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.2

[703 #395]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Rodney, a user in the research department, stores sensitive information on a computer. Other users share the computer. Rodney and other users in the research department who use the computer are members of the computer’s Users local group.

To protect the computer, you apply a predefined security template and enable auditing in the computer’s local group policy object. You verify that access to sensitive files is audited. To ensure that no auditing entries are lost, you configure the Security log to not overwrite events.

One day, Rodney is using the computer when he receives a STOP error. He reboots the computer but can no longer log on. You can successfully log on to his computer using your administrative account.

You want to make sure Rodney and others can successfully log on to the computer. You also want to continue to ensure no auditing entries are lost. What should you do?

nmlkj Set the CrashOnAuditFail registry entry to 1.

nmlkjIn the computer’s Startup and Recovery options, configure a small memory dump to be written for debugging information.

nmlkj Configure the local security policy to no longer audit successful account logon events.

nmlkj Set the CrashOnAuditFail registry entry to 0.

nmlkji Save and clear the Security log.

nmlkj Configure the local security policy to no longer audit failed object access events.

nmlkj Configure the Security log to overwrite events when it becomes full.

You are the network administrator for your company. Your company uses Windows XP Professional as its desktop operating system. All computers are joined to a single Active Directory domain. Company security policy states that all computers must be authenticated by an Active Directory-based domain controller using the strongest possible security protocols.

You verify that all applications in use at your company are certified for Windows 2000 and above. Then you apply the hisecws.inf security template to all computers. One evening, you take the company’s domain controllers

Hacked by Piratez 70-270

Page 312: 70 270 q & a

Explanation:

By default, Windows XP Professional computers cache credentials used when logging on. If users log on when a domain controller is unavailable, their logon can then be validated against the credentials cached locally. This gives the users access to the local computer. However, users may not be able to access other servers on the network that require a ticket issued by a domain controller. Setting the number of previous logons cached to 0 prevents the use of a domain user account when the domain controller is unavailable.

Objective(s):

703. Configure, manage, and troubleshoot local user and group accounts.

Reference(s):

TestOut for Windows XP Administration, Section 9.1

[703 #407]

Explanation:

If a computer’s security settings for a zone disable submitting nonencrypted form data, then all submitted form data from sites in that zone (such as when submitting a search request) must be submitted over a secure (HTTPS) connection. In this

down for maintenance. While the domain controllers are down, you notice a user in the research department successfully logging on to a computer using a domain user account.

You need to prevent successful network logons when domain controllers are down. What should you do?

nmlkjDistribute a group policy object that disables the Allow automatic administrative logon setting on all computers in the domain.

nmlkjDistribute a group policy object that sets the Enforce password history setting to 0 on all computers in the domain.

nmlkjiDistribute a group policy object that sets the Interactive logon: Number of previous logons to cache setting to 0 on all computers in the domain.

nmlkjDistribute a group policy object that enables the LDAP client signing requirements setting on all computers in the domain.

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, notifies you that she cannot perform any searches using any Internet search engines.

You perform an Internet search from your computer without experiencing any problems. You then go to Sally’s computer, access a search page on the company’s intranet, and successfully perform a search. You then access an Internet search page from Sally’s computer and perform a search. You receive a message stating, “Your current security settings do not allow you to send HTML forms.”

You want to let Sally perform Internet searches from her computer. What should you do?

nmlkji In the security settings for the Internet zone, enable Submit nonencrypted form data.

nmlkj In the security settings for the Local Intranet zone, enable Submit nonencrypted form data.

nmlkjEdit the sites list for the Local Intranet zone. Disable Require server verification (https:) for all sites in this zone.

nmlkjEdit the sites list for the Internet zone. Disable Require server verification (https:) for all sites in this zone.

Hacked by Piratez 70-270

Page 313: 70 270 q & a

scenario, the Internet zone is configured to disable submitting nonencrypted form data. You need to enable it. The Internet zone automatically includes sites not in any other zone. You cannot edit the site list for the Internet zone.

Because the error does not occur when you are using an intranet site, you do not need to perform any actions related to the Local Intranet zone.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #260]

Explanation:

If a computer’s security settings for a zone disable submitting nonencrypted form data, then all submitted form data from sites in that zone (such as when submitting a search request) must be submitted over a secure (HTTPS) connection. In this scenario, the intranet zone is configured to disable submitting nonencrypted form data. You need to enable it. By default, the intranet zone includes all sites that do not include a dot (.), sites that bypass the proxy server, and resources accessed using UNC paths. You can also add specific sites to the Local Intranet zone’s site list.

You cannot edit the site list for the Internet zone. Also, because the error does not occur when you are using an Internet site, you do not need to perform any actions related to the Internet zone.

The Require server verification (https:) for all sites in this zone setting can be used when configuring a site list for a zone. If this setting is enabled, you can only add sites that begin with “https:” to the zone’s site list. In this scenario, the site can be accessed fine and there is no indication of a problem when configuring a zone’s site list. Instead, the problem occurs when submitting form data.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, notifies you that she cannot use the search page on the company’s intranet site.

You access the search page on the company’s intranet site and successfully perform a search. You then go to Sally’s computer, access a search page on the Internet, and successfully perform a search. You then access the company’s intranet site from Sally’s computer and perform a search. You receive a message stating, “Your current security settings do not allow you to send HTML forms.”

You want to let Sally perform intranet searches from her computer. What should you do?

nmlkj In the security settings for the Internet zone, enable Submit nonencrypted form data.

nmlkji In the security settings for the Local Intranet zone, enable Submit nonencrypted form data.

nmlkjEdit the sites list for the Local Intranet zone. Disable Require server verification (https:) for all sites in this zone.

nmlkjEdit the sites list for the Internet zone. Disable Require server verification (https:) for all sites in this zone.

Hacked by Piratez 70-270

Page 314: 70 270 q & a

[704 #272]

Explanation:

If a computer’s security settings for a zone disable submitting nonencrypted form data, then all submitted form data from sites in that zone (such as when submitting a search request) must be submitted over a secure (HTTPS) connection. In this scenario, the Trusted Sites zone is configured to disable submitting nonencrypted form data. You need to enable it. The Trusted Sites zone includes sites that you specifically add to the zone’s site list.

You cannot edit the site list for the Internet zone. Also, because the error does not occur when accessing other Internet sites, you do not need to perform any actions related to the Internet zone.

The Require server verification (https:) for all sites in this zone setting can be used when configuring a site list for a zone. If this setting is enabled, you can only add sites that begin with “https:” to the zone’s site list. In this scenario, the site can be accessed fine and there is no indication of a problem when configuring a zone’s site list. Instead, the problem occurs when submitting form data.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #284]

You are the desktop administrator for your company. Your company uses Windows XP Professional as its desktop operating system. Sally, a user in the sales department, notifies you that she cannot use the search page of a partner company’s Web site.

You access the search page on the partner company’s Internet site and successfully perform a search. You then go to Sally’s computer, access the partner company’s Web site, and attempt a search. You receive a message stating, “Your current security settings do not allow you to send HTML forms.” You verify that the company’s Web site is listed in the Trusted Sites zone.

You want to let Sally perform searches on the partner company’s Web site from her computer. What should you do?

nmlkj In the security settings for the Internet zone, enable Submit nonencrypted form data.

nmlkji In the security settings for the Trusted Sites zone, enable Submit nonencrypted form data.

nmlkjEdit the sites list for the Trusted Sites zone. Disable Require server verification (https:) for all sites in this zone.

nmlkjEdit the sites list for the Internet zone. Disable Require server verification (https:) for all sites in this zone.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Sally, a user in the sales department, often accesses a Web site of a partner organization to gather information. The Web site lets users create a username and password, which they can use to log on to the site and receive a customized site layout. Sally informs you that she must always enter a username and password when logging into the partner organization’s Web site even though she has checked a box on the Web page labeled Automatically enter my username and password.

You access the same Web site from your computer, create a user name and password, check the Automatically enter my username and password option, and log on. You then reopen Internet Explorer, return to the Web site, and verify that your username and password is automatically entered in the Web page. You watch Sally perform the same tasks on her computer, but her username and password is not automatically entered in the Web page when returning to the Web site.

Hacked by Piratez 70-270

Page 315: 70 270 q & a

Explanation:

Cookies are files containing data that Web sites store on a user’s computer. The Web site can later retrieve the data from the cookie file and use it for purposes such as customizing the user’s experience with the Web site. First party cookies are cookies saved by the Web site you are accessing. Third party cookies are cookies saved by a Web site that you are not currently viewing. Session cookies are cookies that are deleted when you close Internet Explorer. They store data used only during your current session accessing a Web site.

In this scenario, Sally’s privacy settings are configured to block first party cookies. Therefore, her username and password data cannot be saved and retrieved by the partner organization’s Web site. You need to allow first party cookies to be saved. You can either do this by decreasing Sally’s privacy settings to a level that allows first party cookies, or by customizing her privacy settings and allowing first party cookies. You can also override cookie handling on a per-site basis. Unless overridden on a per-site basis, privacy settings only affect the Internet zone. Cookies are always saved for sites in the Intranet zone and Trusted Sites zone. Cookies are never saved for sites in the Restricted Sites zone.

You do not need to edit zones or zone security settings because this scenario relates to saving cookies (privacy settings) rather than security issues such as authenticating to a Web site or downloading ActiveX controls, or secure communication (HTTPS). The Automatic logon with current username and password security option for a zone automatically supplies your Windows XP username and password when you access a resource that is configured to require authenticated access.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #296]

You want to let the partner organization’s Web site save and retrieve username and password data on Sally’s computer. What should you do?

nmlkj Enable the Enable third-party browser extensions (requires restart) advanced option.

nmlkj Configure Sally’s privacy settings to accept third party cookies.

nmlkj Add the partner organization’s Web site to the Trusted Sites zone.

nmlkji Configure Sally’s privacy settings to accept first party cookies.

nmlkj Configure Sally’s privacy settings to always allow session cookies.

nmlkjEdit the Internet zone’s security settings and select the Automatic logon with current username and password option.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Sally, a user in the sales department, wants to access a Web site of a partner organization to gather information. However, when accessing the site she receives a message stating, “Your security settings prohibit the display of unsigned ActiveX controls.”

According to company policy, unsigned ActiveX controls should only be downloaded from a list of sites trusted by the company. To comply with company policy, you have disabled the Download unsigned ActiveX controls security setting for the Internet zone on all company computers.

You verify that the partner organization’s Web site is on the company’s approved sites list. You want to let Sally download unsigned ActiveX controls from the partner organization’s Web site. The Web site is accessed over an insecure (HTTP) connection. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc In the security settings for the Internet zone, enable Download unsigned ActiveX controls.

gfedc I th it tti f th L l I t t bl D l d i d A ti X t l

Hacked by Piratez 70-270

Page 316: 70 270 q & a

Explanation:

In this scenario, downloading of unsigned ActiveX controls is disabled for the Internet zone. You should not enable this setting, or potentially harmful ActiveX controls could be downloaded from Internet sites. If you trust a particular site that uses unsigned ActiveX controls, you can add the site to your Trusted Sites zone and configure the Trusted Sites zone to allow downloading of unsigned ActiveX controls. Because the site in this example does not use a secure connection, you should disable the Require server verification (https:) for all sites in this zone setting for the Trusted Sites zone before adding the site. Otherwise, you will be prevented from adding the site to the zone.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #306]

gfedc In the security settings for the Local Intranet zone, enable Download unsigned ActiveX controls.

gfedcb In the security settings for the Trusted Sites zone, enable Download unsigned ActiveX controls.

gfedcEdit the sites list for the Trusted Sites zone. Enable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcbEdit the sites list for the Trusted Sites zone. Disable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcEdit the sites list for the Internet zone. Enable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcEdit the sites list for the Internet zone. Disable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Sally, a user in the sales department, wants to access a Web site of a partner organization to gather information. However, when accessing the site, she receives a message stating, “Your security settings prohibit the display of unsigned ActiveX controls.”

According to company policy, unsigned ActiveX controls should only be downloaded from a list of sites trusted by the company. Also, all ActiveX controls from such sites must be downloaded over a secure connection. To comply with company policy, you have disabled the Download unsigned ActiveX controls security setting for the Internet zone on all company computers.

You verify that the partner organization’s Web site is on the company’s approved sites list. You want to let Sally download unsigned ActiveX controls from the partner organization’s Web site. The Web site is accessed over a secure (HTTPS) connection. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedc In the security settings for the Internet zone, enable Download unsigned ActiveX controls.

gfedc In the security settings for the intranet zone, enable Download unsigned ActiveX controls.

gfedcb In the security settings for the Trusted Sites zone, enable Download unsigned ActiveX controls.

gfedcbEdit the sites list for the Trusted Sites zone. Enable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcEdit the sites list for the Trusted Sites zone. Disable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcEdit the sites list for the Internet zone. Enable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

gfedcEdit the sites list for the Internet zone. Disable Require server verification (https:) for all sites in this zone. Add the partner organization’s Web site.

Hacked by Piratez 70-270

Page 317: 70 270 q & a

Explanation:

In this scenario, downloading of unsigned ActiveX controls is disabled for the Internet zone. You should not enable this setting, or potentially harmful ActiveX controls could be downloaded from Internet sites. If you trust a particular site that uses unsigned ActiveX controls, you can add the site to your Trusted Sites zone and configure the Trusted Sites zone to allow downloading of unsigned ActiveX controls. Because company policy requires access of trusted sites over secure connections, you should enable the Require server verification (https:) for all sites in this zone setting for the Trusted Sites zone.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #318]

Explanation:

In this scenario, downloading of signed ActiveX controls is currently set to Prompt for the zone that includes the company’s intranet site. Usually, this is the Local Intranet zone. To prevent the Security Warning from appearing, you have two options:

1. Keep the current setting but add the company’s code signing certificate to the Trusted Publishers list. The Security Warning message would then only appear if an ActiveX control signed with another certificate needs to be downloaded. (This is solution required in this scenario and is the most secure solution.)

2. Enable the Download signed ActiveX controls security setting for the Local Intranet zone. This would download every ActiveX control that is signed.

The Internet zone is not applicable in this scenario because the ActiveX control is being downloaded from the Local Intranet

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Your company has installed an Enterprise Root Certificate Authority (CA), and developers of your company’s intranet site sign all ActiveX controls on the intranet site using a private key issued by the company’s Enterprise Root CA.

Sally, a user in the sales department, informs you that when she accessed the company’s intranet site, she received a Security Warning message asking if she wanted to download content from your company’s intranet site and always trust content from your company. Sally explains that she indicated that she always wanted to trust content from your company, and she has never received the Security Warning message again.

You want to prevent other users from receiving the same Security Warning message when accessing the company intranet site. However, you still want users to be warned before downloading a signed ActiveX control that is not signed with the company’s certificate. What should you do? (Choose two. Each correct choice is part of the solution.)

gfedcb Add your company’s code signing certificate to the Trusted Publishers list of every company computer.

gfedcAdd your company’s code signing certificate to the Trusted Root Certification Authorities list of every company computer.

gfedcAdd your company’s self-signed root CA certificate to the Trusted Root Certification Authorities list of every company computer.

gfedcbEnsure that your company intranet site is included in the Local Intranet zone for every company computer. In the security settings for the Local Intranet zone, set the Download signed ActiveX controls to Prompt.

gfedcIn the security settings for the Internet zone of every company computer, set the Download signed ActiveX controls to Enable.

gfedcIn the security settings for the Internet zone of every company computer, set the Download signed ActiveX controls to Prompt.

Hacked by Piratez 70-270

Page 318: 70 270 q & a

zone. Apparently, Sally's computer is already trusting the company's Enterprise Root CA. Otherwise, she would receive a message stating that there is a problem with the company's code-signing certificate and that the root CA is not trusted. To fix that error, you would need to configure Sally's computer to trust the company's Enterprise Root CA by adding the company’s self-signed root CA certificate to the Trusted Root Certification Authorities list.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #330]

Explanation:

In this scenario, the problem is that the computer is not configured to trust the company’s Enterprise Root Certificate Authority which issued the code signing certificate. To fix the problem, import the root CA's certificate to the computer's Trusted Root Certification Authorities list. Do this either directly or using a certificate trust list (CTL) file that includes the root CA's certificate.

To prevent all prompts when downloading Active X controls from the company's intranet site, you might also need to add the company's code-signing certificate to the Trusted Publishers list and configure the Download signed ActiveX controls setting for the Local Intranet zone. However, the symptoms in this scenario suggest an untrusted root CA, so that is the action you should first perform. If other symptoms then arise, you can then fix those problems. There is no need to add the company’s intranet site to the Trusted Sites zone because the Local Intranet zone should be sufficient.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Your company has installed an Enterprise Root Certificate Authority (CA), and developers of your company’s intranet site sign all ActiveX controls on the intranet site using a private key issued by the company’s Enterprise Root CA.

Sally, a user in the sales department, accesses the company’s intranet site and receives a Security Warning message asking if she wants to download content from your company’s intranet site. The Security Warning message indicates that there is a problem with the certificate and that the certificate is from an untrusted source.

You verify that the company’s intranet site is included in the Local Intranet zone of Sally’s computer. You also verify that the company’s code signing certificate is in the Trusted Publishers list and that the Download signed ActiveX controls security setting for the Local Intranet zone is set to Prompt.

You want to prevent Sally and other users from receiving this Security Warning message when accessing the company intranet site. However, you still want users to be warned before downloading a signed ActiveX control that is not signed with the company’s certificate. What should you do?

nmlkjAdd your company’s code signing certificate to the Trusted Root Certification Authorities list of every company computer.

nmlkjAdd your company’s intranet site to the Trusted Sites zone of every company computer. In the security settings for the Local Intranet zone of every company computer, set the Download signed ActiveX controlsto Enable.

nmlkjiAdd your company’s self-signed root CA certificate to the Trusted Root Certification Authorities list of every company computer.

nmlkjAdd your company’s intranet site to the Trusted Sites zone of every company computer. In the security settings for the Local Intranet zone of every company computer, set the Download signed ActiveX controlsto Prompt.

Hacked by Piratez 70-270

Page 319: 70 270 q & a

TestOut for Windows XP Administration, Section 9.4

[704 #342]

Explanation:

In this scenario, the problem is that the computer is not configured to trust the company’s Enterprise Root Certificate Authority who issued the server certificate used to secure the company’s intranet site. You can import the root CA's certificate directly or import a certificate trust list (CTL) file that includes the root CA's certificate.

The Trusted Publishers list is used to add certificates of trusted software publishers for which prompts to download content should be skipped (and the software downloaded automatically). There is no need to add the company’s intranet site to the Trusted Sites zone because the Local Intranet zone should be sufficient. Although users must access the site using the HTTPS prefix, doing so will not prevent the message that Sally encountered.

Objective(s):

704. Configure, manage, and troubleshoot Internet Explorer security settings.

Reference(s):

TestOut for Windows XP Administration, Section 9.4

[704 #354]

You are the desktop administrator for your company. Your company uses Windows XP Professional as a desktop operating system. Your company has installed an Enterprise Root Certificate Authority (CA), and developers of your company’s intranet site have used a certificate issued by the company’s root CA to configure the intranet site to require a secure (SSL) connection.

Sally, a user in the sales department, accesses the company’s intranet site and receives a Security Warning message that says there is a problem with the server’s certificate and that the certificate is from an untrusted source.

You want to prevent Sally and other users from receiving this Security Warning message when accessing the company intranet site. What should you do?

nmlkjiAdd your company’s self-signed root CA certificate to the Trusted Root Certification Authorities list of every company computer.

nmlkj Instruct users to access the company’s intranet site using the HTTPS prefix.

nmlkjIn the site list for the Local Intranet zone of every company computer, ensure that the Require server verification (https:) for every site in this zone setting is enabled.

nmlkj Add your company’s self-signed root CA certificate to the Trusted Publishers list of every company computer.

nmlkj Add your company’s intranet site to the Trusted Sites zone of every company computer.

Hacked by Piratez 70-270

Page 320: 70 270 q & a

Appendix Prohibit access to the Control Panel policy To complete this, you only need to enable one policy in Group Policy. Browse to User Configuration/Administrative Templates/Control Panel and enable the Prohibit access to the Control Panel policy Following are the steps an expert might take to complete this: Open the Local Group Policy Editor

1.Click Start, and then click Run. 2.Type gpedit.msc and then click OK.

Edit Administrative Template Settings 1.Browse to Administrative Templates under either Computer Configuration or User Configuration. Locate the category and policy you want to edit. Tip: Select each policy to view a description of the policy and the options you can configure for it. 2.Double-click the policy you want to edit. 3.Enable or disable the policy. When you enable some policies, additional options will appear in the box below the Enable/Disable options. Configure these additional options as required. 4.Click OK. Task Scheduler Error You are troubleshooting a Windows XP Professional computer. The computer's user has been experimenting with system configuration changes in preparation for a certification exam. Now, the user's scheduled tasks no longer run. The scheduled tasks are configured to run using an administrative user account. You open the Event Viewer and find the following error:

The Task Scheduler service failed to start due to the following

error:

The account specified for this service is different from the

account specified for other services running in the same

process.

Your task is to fix the problem by configuring the Task Scheduler service to log on using the local System account. Also make sure that the Task Scheduler service can interact with the desktop. Then start the Task Scheduler service. DHCP Client service You have configured a Windows XP Professional computer with a static IP address. In an effort to eliminate unneeded services, you have disabled the DHCP Client service on

Page 321: 70 270 q & a

the computer. One day, a user complains that the Windows XP Professional computer cannot be contacted using a hostname. You check the DNS server and find that the hostname for the Windows XP Professional computer has not been registered with DNS. You run the ipconfig /registerdns command at the Windows XP Professional computer, but receive the following error:

The system cannot find the file specified.

You check TechNet and find that dynamic DNS updates require the DHCP Client service, even when the system has a static IP address. Your task is to manually start the DHCP Client service on the Windows XP Professional computer. Also, configure the service to start automatically from this point forward.(Run > Services.msc > DHCP Client service)