xp test001 chapters 9-12 study reformat

24
XP_Test001_Chapters 9-12_Study True/False Indicate whether the sentence or statement is true or false. ____ 1. The MSIexec.exe, or Windows Installer Package (.msi), is written specifically for the Windows XP GUI and cannot be called from the command line. ____ 2. Some legacy applications that are incompatible with the basic structure of Windows XP Professional can be supported if you create an emulated environment that the application will find suitable by using “shim technology” to insert code between the application and the operating system. ____ 3. Using the Group Policy feature in Active Directory, administrators may specify software packages that will self-install on Windows XP systems depending on the specific user or computer credentials presented on login. ____ 4. During a Windows XP upgrade, where Windows XP is installed over an approved existing Microsoft operating system, existing applications will be audited and compared against a list of known incompatibles. Windows Setup will stop and warn the user of these known incompatibilities before completing the setup process. ____ 5. A significant security flaw has just been revealed in a Microsoft Office application, and the TechNet bulletin informing you of the flaw points you toward a patch that you download immediately. The Office application was originally installed using a GPO that assigned it to users who needed the application. The most expeditious way to distribute this patch is to configure another GPO to install it.

Upload: bradley-d-thompson

Post on 21-Nov-2014

138 views

Category:

Documents


26 download

TRANSCRIPT

Page 1: XP Test001 Chapters 9-12 Study Reformat

XP_Test001_Chapters 9-12_Study

True/FalseIndicate whether the sentence or statement is true or false.

____ 1. The MSIexec.exe, or Windows Installer Package (.msi), is written specifically for the Windows XP GUI and cannot be called from the command line.

____ 2. Some legacy applications that are incompatible with the basic structure of Windows XP Professional can be supported if you create an emulated environment that the application will find suitable by using “shim technology” to insert code between the application and the operating system.

____ 3. Using the Group Policy feature in Active Directory, administrators may specify software packages that will self-install on Windows XP systems depending on the specific user or computer credentials presented on login.

____ 4. During a Windows XP upgrade, where Windows XP is installed over an approved existing Microsoft operating system, existing applications will be audited and compared against a list of known incompatibles. Windows Setup will stop and warn the user of these known incompatibilities before completing the setup process.

____ 5. A significant security flaw has just been revealed in a Microsoft Office application, and the TechNet bulletin informing you of the flaw points you toward a patch that you download immediately. The Office application was originally installed using a GPO that assigned it to users who needed the application. The most expeditious way to distribute this patch is to configure another GPO to install it.

____ 6. You are a new hire in the Contoso Corporation IT department, and on your third day you attend the monthly departmental meeting. The topic of discussion is Contoso’s recent implementation of Group Policy to roll out application distribution via Publishing and Assignment. Everyone in attendance agrees that this method has turned out to be an efficient and time-saving technique for distributing and patching applications. However, Casey, the engineer in charge of this Group Policy implementation, expresses disappointment that she must build a different MSI installer package for each department’s software implementation. You ask Casey for some details of the problem, and she explains that, for example, all Contoso employees use some form of the Microsoft Office Suite. However, the Accounting Department has no use for Publisher or Visio, the Graphics Department has no use for Excel, the Sales Department does not want to use Access, and the Shipping Department does not need PowerPoint. You diplomatically suggest to Casey that there is, in fact, a mechanism for customizing this type of installation without having to construct a different MSI installer package for every permutation of the Office Suite. By constructing a transform package for each department instead, a single MSI for Office can be modified depending by the settings contained within – each department’s users and/or computers could get only the Office applications they want or need. Is your statement true or false?

____ 7. The IP protocol is classified as a connection-oriented protocol because it requires an acknowledgement that a connection is established before sending data, and requires an acknowledgement of data received.

____ 8. Wireless Ethernet networks use an SSID (Service Set Identifier) in order to distinguish one wireless network from another.

____ 9. Windows XP Professional workstations cannot communicate with servers running the Novell Netware operating system.

Page 2: XP Test001 Chapters 9-12 Study Reformat

____ 10. The Dial-Up Networking Component of Windows XP Professional is used exclusively for modem communications and results in unnecessary system overhead when loaded on a system that does not require modem-based communications.

____ 11. A PPPoE (Point-to-Point Protocol Over Ethernet) connection is required when using a broadband connection that requires username and password information to gain access to the ISP (Internet Service Provider).

____ 12. Using Windows XP Remote Assistance feature, a user can gain control over her office desktop from home, without assistance from anyone at her office computer.

____ 13. The connection type used over the Internet as a medium for secure connections to a corporate network is known as a VPN, or Virtual Private Network.

____ 14. Contoso Corporation has implemented its plan to allow more employees to work from home on a test basis. A small percentage of Contoso’s management staff, 25 individuals, is working a four-day office, one-day home schedule. Contoso is unwilling to invest a substantial amount of money in new laptop computers to accommodate a more mobile staff until the test period is over and upper management is convinced the program will provide benefits. The management staff participating in the test is, for the most part, desk-bound and working from desktop machines, which run Windows XP Professional. Contoso has a fully implemented VPN solution that allows employees to connect securely to the internal corporate network. At a planning meeting a senior manager suggests licensing 25 copies of a well-known remote desktop application, stating that this would be less expensive than buying 25 new laptops for the test program. Zeke, a member of the IT staff, immediately interjects that this is an unnecessary expenditure. He explains that the Remote Desktop feature standard in Windows XP Professional will allow these employees to connect from their home computers to their work desktops and work from home just as if they were sitting in the office, with no additional expenditures required. Is Zeke’s statement true or false?

____ 15. The IP address format is expressed using four octets of hexadecimal numbers.

____ 16. Beginning with the leftmost bits, an IP address gets progressively more specific.

____ 17. Windows XP can, in certain cases, automatically modify exceptions to Windows Firewall, as when a user enables File and Print Sharing for Microsoft Networks.

____ 18. A host on your network with an IP address of 84.161.11.3/12 is trying to contact another host on your network with an IP address of 84.173.200.10/12. There is no router between the hosts. Network communication cannot take place under these conditions.

____ 19. Because Windows Firewall is based on packet-filtering technology and examines each and every packet entering or leaving the computer on which it is running, it makes an extremely effective tool in preventing virus attacks.

Page 3: XP Test001 Chapters 9-12 Study Reformat

____ 20. Kim is the manager of a small health and fitness firm employing seven people. Each user has a Windows XP Professional desktop equipped with Service Pack 2. Kim’s office enjoys an always-on broadband DSL connection that assists employees in their research and workout design but concerns Kim because of the security risks an always-on connection presents. Kim is especially concerned as the small office is not yet in a position to afford a server, or an Active Directory domain infrastructure. She relies on a workgroup structure with files stored and shared across all seven desktop units, and is especially concerned about keeping File and Print sharing available on the local network. In discussing her security concerns with Ed, a network engineer, she is told that she actually has all the tools she needs at her disposal in Windows Firewall. Ed informs Kim that she has the flexibility to use the Windows Firewall to limit the scope of access to the ports used by File and Printer Sharing on a very granular level — she can allow access but limit it to just her own local subnet or even to a highly restrictive list of individual IPs that she can designate. Is Ed’s statement true or false?

____ 21. Proxy server settings within Internet Explorer are “tunable,” that is, they can be configured to individual networks and are not simply “on” or “off.”

____ 22. Internet Explorer can optionally block the downloading of both signed and unsigned ActiveX controls.

____ 23. If a Web site is not specifically designated as falling into a particular Security Zone, it is treated by Internet Explorer as a Restricted Site Zone for safety reasons.

____ 24. Individual settings for Web content zones can be managed by clicking the Custom Level button for that zone.

____ 25. Web sites can be added to any of the six standard Web Content Zones provided with Internet Explorer.

____ 26. The feature of Internet Explorer that maintains user information to automate completion of Web forms is called the Profile Assistant.

____ 27. A Session cookie is stored on your hard disk and can be recalled by the Web site that created it until it reaches a preset expiration date.

____ 28. P3P (Platform for Privacy Preferences) is an open standard that allows users to specify their privacy preferences and apply them to their Web communications.

____ 29. Offline Web Browsing files, which are created when a site is visited, are stored in the Internet Explorer Temporary Internet Files folder and cleared whenever that folder is purged.

Multiple ChoiceIdentify the letter of the choice that best completes the statement or answers the question.

____ 30. Group Policy greatly simplifies the task of managing Windows XP Computers in an Active Directory environment. Which of the following management tasks was NOT presented as a capability of Group Policy in the Chapter 9 Group Policy overview?a. Control of software configuration settingsb. Management of registry settingsc. Configuration of securityd. Installation of software updatese. Installation of BIOS upgrades

Page 4: XP Test001 Chapters 9-12 Study Reformat

____ 31. When troubleshooting application compatibility issues, which of the following steps should be taken to troubleshoot and attempt to resolve the problem? (Choose all answers that are correct.)a. Verify that no mistakes were made during application installation.b. Reinstall the application and retest.c. Check the vendor’s Web site for application updates.d. Install the application using an administrator account.e. All of the above.

____ 32. Knowing that you are a computer “expert,” your good friend has asked you to look at a problem he is having on his brand-new computer. He has replaced a Pentium III 733 running Windows 98 with a Pentium IV 2.8 GHz running Windows XP Professional. Your friend is an avid gamer, and takes great pride in the fact that his new computer is fully equipped with a fast processor, high-end video card, lots of memory, and large, fast hard drives. After setting up the new system and familiarizing himself with its basics, he loaded one of his favorite old games, something he has been playing for over five years. The game will install, but not run, on his new machine. Disappointed, he consulted the game manufacturer’s Web site, but could not find any recent patches or information about running the game on the XP operating system. He has removed and reinstalled the game twice, always with local administrator credentials. He is not using the Fast User Switching feature, and has tried multiple variations of Windows 95, Windows 98, and Windows 2000 compatibility modes. You verify all the steps he has taken to run the game, and note that clicking on the icon to launch the game results in a display of the opening movie and credits, then a quick blank screen as the game itself should launch and then a return to the Windows desktop. Based on the above description, what is the most likely cause of the game’s failure to run?a. The game needs updated patches to be compatible with Windows XP.b. The game will not install on the NTFS file system.c. The game cannot run with the large amount of system resources (memory, drive

space) present on the new computer.d. The game is making direct calls to the video and/or audio hardware.e. The game requires a software key before it will operate.

____ 33. Which of the following is the networking protocol required for communication with Microsoft Active Directory?a. NetBEUIb. NetBIOSc. IPX/SPXd. File and Print Sharing for Microsoft Networkse. TCP/IP

____ 34. The OSI (Opens Systems Interconnection) Reference Model divides network communication into how many discreet layers. These layers are defined in the DARPA (Defense Advanced Research Projects Agency) / DOD (Department of Defense) model?a. 3b. 4c. 7d. 6e. 9

Page 5: XP Test001 Chapters 9-12 Study Reformat

____ 35. Which of the following is NOT a correct description of the capabilities and features of the TCP/IP protocol suite?a. It is a routable networking protocol.b. It is a protocol supported by most operating systems.c. It provides a medium for connecting dissimilar systems.d. It forms the backbone of the Internet for purposes of routing and addressing.e. It consists of multiple subcomponents and follows the logic of the seven-layer OSI

networking model.____ 36. You are looking at a Windows XP computer built and configured as a file server by your department. It

was delivered to the Records Department, where the department manager used his local administrative rights to complete the final configuration by copying the network settings from the Windows NT 4.0 computer being replaced. The manager has called you because he is convinced that he must have done something wrong; he has verified network hardware functionality, verified connectivity, performed and passed a loopback test, can connect to all the other servers and workstations on the same subnet, can contact this server from other servers and workstations on the same subnet, but cannot reach the Internet or any other computers in the company. He cannot resolve machine names to IP addresses and cannot ping known IP addresses on the Internet or off his own subnet. He cannot contact his own DNS servers by name or ping them by their known IP addresses. Which of the following choices would explain the cause of the problem?a. Incorrect network card driverb. IP address on incorrect subnetc. Subnet mask incorrectly setd. Default gateway incorrectly sete. DNS server settings incorrectly set

____ 37. The Windows Firewall that ships with Service Pack 2 is a host-based stateful packet inspecting firewall, which means that it…a. interrogates the host system for compatible hardware and integrates with any

hardware-based firewall it finds.b. proxys the network address of the host system.c. does not accept inbound traffic that is not in response to the initial outbound traffic

generated by the host system.d. blocks all incoming communication that is not specifically allowed by the user.e. checks incoming and outgoing TCP/UDP packets until a connection is brokered

and identities are verified, then allows packets to flow without inspection on that specific connection until it is broken.

____ 38. You have configured security logging in the Windows Firewall. You believe there is a current security event and want to look at the logs quickly while the event is in progress. Which of the following is the correct default location of the Windows Firewall packet filter log?a. \%SYSTEMDRIVE%\WINNT\Logfiles\firewall.logb. \%SYSTEMDRIVE%\Windows\Logfiles\firewall.logc. \%SYSTEMDRIVE%\I386\Logfiles\firewall.logd. \%SYSTEMDRIVE%\Windows\pfirewall.loge. \%SYSTEMDRIVE%\Windows\System32\logfiles\pflog.log

Page 6: XP Test001 Chapters 9-12 Study Reformat

____ 39. Convert the IP address 192.168.27.33 to its binary equivalent. The correct binary representation is:a. 11100010.10101001.00011011.00100101b. 11000001.10101000.00011010.0011100c. 11000000.10101000.00011011.00100001d. 11000000.10101010.00001110.00101010e. 10111100.10111000.00000011.01001000

____ 40. Your supervisor has sent you to assist in the setup of your company’s new remote offices. You are asked to submit a preliminary design for the network layout. The office will need a lab environment with a class B address range accommodating at least 120 hosts, and three separate class C subnets accommodating at least 12, 26, and 40 hosts respectively. Which of the following choices meets these requirements?a. A 126.168.1.1/25, 192.168.1.1/28, 192.168.2.1/26, and 192.168.3.1/26 network

design.b. A 188.233.12.1/26, 191.10.8.1/28, 191.10.9.1/27, and 191.10.10.1/27 network

design.c. A 192.168.1.1/26, 192.168.2.1/26, 192.168.3.1/28, and 192.168.3.1/28 network

design.d. A 131.3.10.1/25, 192.100.1.1/28, 192.100.2.1/27, and 192.100.3.1/26 network

design.e. A 127.212.1.1/25, 192.168.1.1/28, 192.168.2.1/26, and 192.168.3.1/26 network

design.____ 41. You have volunteered to assist a small local charity in protecting its computer network, which was

recently hacked. The network consists of five computers running Windows XP Professional, each connected via modem to the Internet. After removing all malware from the systems and installing Service Pack 2 to provide additional protection, what can you do to best reduce the attack surface presented to the Internet, without expending any funds?a. Institute a strong password policy.b. Remove Administrative privileges from all users.c. Turn off the Messenger Service.d. Institute Internet Connection Sharing through one single desktop system.e. Upgrade to a broadband connection.

____ 42. Choose the correct progression pattern used to convert binary octets to decimal numbers.a. 255 – 128 – 64 – 32 – 16 – 8 – 4 – 2 – 1b. 128 – 64 – 32 – 16 – 8 – 4 – 2 – 1c. 128 – 96 – 64 – 32 – 8 – 4 – 2 – 1d. 256 – 128 – 64 – 32 – 16 – 8 – 4 – 2e. 128 – 72 – 48 – 32 – 24 – 12 – 6 – 3 – 1

Page 7: XP Test001 Chapters 9-12 Study Reformat

____ 43. Derek is the system administrator for a small manufacturing firm with 20 employees. Each employee has a Windows XP Professional desktop system running Service Pack 2. It is the policy of Derek’s employer to restrict employee Internet access, feeling that it has an adverse affect on productivity and represents a security risk. The company uses intranet hosts, an Exchange Server for mail, and a SharePoint server for collaborative solutions. The Exchange server is connected to the Internet, the SharePoint server is only for internal corporate use. Derek’s employer wants to be assured that employee desktops are protected from Internet hazards, but Derek has been reluctant to lock down browser access via Windows Firewall because browser access is necessary to access the SharePoint server all employees share. Can Derek use Windows Firewall to provide security in this situation, and if so, how?a. No, Windows Firewall will be too restrictive to assist in this situation; restricting

Web browsing will restrict access to the SharePoint Server.b. Yes, Derek can define a Windows Firewall exception that will allow him to restrict

browser access to the Internet while still allowing access to the corporate intranet.c. Yes, Derek can configure a Windows Firewall exception for Windows File and

Print Sharing that will allow local access to the SharePoint resource through the browser.

d. Yes, Derek can activate Security Logging on the firewall. The Windows Firewall can be configured to send Derek an immediate Administrative Alert if any computer on the network detects an inbound probe from the Internet.

e. No, Windows Firewall will not allow the sophisticated range of adjustment required by this situation. It can only Block or Unblock any given type of communication on an absolute, on-or-off basis. The only exception is the Ask me later option, which allows the user to defer this decision temporarily.

____ 44. Internet Explorer can be used to connect to which of the following resources?a. Web sitesb. .NET server applicationsc. File Transfer Protocol serversd. Web folderse. All of the above

CompletionComplete each sentence or statement.

45. The Windows Installer Service was created as a solution to the installation issues facing ____________________ customers.

46. Group Policy allows you to manage the ____________________ of computers and user settings in an Active Directory environment.

47. The end-users of legacy applications have access to a tool called the _________________________ Wizard, which allows them to manage their own application compatibility settings.

48. Windows Installer runs as a system ____________________ with elevated privileges and receives instructions from Msiexec.exe.

Page 8: XP Test001 Chapters 9-12 Study Reformat

49. Damien is an electrical engineer newly hired by the Contoso Corporation. On his first day at the job he is assigned a new desktop computer running Windows XP Professional. Damien is instructed to log on with his supplied credentials and check the Add Or Remove Programs, where he should find Microsoft Office System 2003 and Microsoft Visio 2003 available for installation. These applications have been ____________________ to Damien through Active Directory using a GPO.

50. Darleen is an accountant newly hired by the Contoso Corporation. On her first day she is assigned a new desktop computer running Windows XP Professional. Darleen is instructed to log on with her supplied credentials and check her Desktop, where she should find an icon for Microsoft Office System 2003. Darleen clicks on the icon and Office System 2003 installation begins. This application has been ____________________ to Darleen through Active Directory using a GPO.

51. The Ping tool, a vital troubleshooting tool used to determine whether a particular IP device on a network is functional, uses the ____________________ protocol to send specialized packets.

52. Each IP address consists of a ____________________ ID and a ____________________ ID.

53. ____________________ is an IEEE standard that defines protocols and configurations for wireless communication.

54. ____________________ allows client systems to browse the Internet using the public address of a computer running Internet Connection Sharing (ICS).

55. A ____________________, a single binary digit, is the smallest unit of storage in the binary system.

56. A ____________________ is a database of known networks and the best route for finding each of them.

57. The process of inspecting packet headers to determine whether they are allowed to enter the network or not is known as ____________________.

58. In order to allow access to a Windows XP Professional system protected by Windows Firewall from an outside location, you must designate a firewall ____________________ for that type of access.

59. When investigating suspected or known security events of any kind, much useful information can be gathered by analyzing the ____________________ files produced by programs such as Windows Firewall or Microsoft Internet information Services.

60. Internet Explorer can be configured remotely using ____________________.

61. While visiting the corporate offices on routine maintenance, you are called aside by the vice president of finance. He frequently browses to multiple financial institution sites and complains that he is constantly being assailed by the message “This page contains both secure and non-secure items. Do you want to display the non-secure items?” He states that he would be most appreciative if you could make that message go away forever. You do this for him by reconfiguring the URL action to enable Display ____________________ Content in the Internet Zone.

62. The act of placing scripts or tags into content on a legitimate Web site that calls up forms or pages from an attacker’s Web server, tricking victims into entering personal information by making them think they are entering data on the legitimate site, is known as ____________________ scripting.

63. Zone ____________________ is the use of one site to leverage scripts or controls from a site in a less restrictive zone to carry out malicious actions.

64. Web Content Zones are also known as ____________________ Zones

Page 9: XP Test001 Chapters 9-12 Study Reformat

Matching

Listed below are six command-line options for the MSIexec.exe installation tool. Match each high-level switch with its basic functionality.a. /Ib. /fc. /xd. /pe. /qf. /r

____ 65. Repairs a product using the original source____ 66. NOT a valid switch for MSIexec.exe____ 67. Installs of configures a product____ 68. Uninstalls a product____ 69. Sets user interface level____ 70. Applies a patch

Listed below are the seven layers of the OSI model. Match each layer with its description/function.a. Application Layerb. Transport Layerc. Data Link Layerd. Physical Layere. Session Layerf. Presentation Layerg. Network Layer

____ 71. Network hardware and medium. This layer transmits the electrical or optical signals between systems.____ 72. Prepares data for transmission. Among other functions, this layer sequences packets and ensures that lost

packets are retransmitted to prevent data loss within the communication sequence.____ 73. This layer handles communication with the user.____ 74. Provides a channel for communication between computers. This layer’s protocols are responsible for

establishing and breaking down communication sessions.____ 75. Connects the Network Layer to the physical media. This layer consists of device drivers and low-level

protocols.____ 76. Converts the information entered by the user into something meaningful to the application. This layer is

also responsible for making different data formats or character sets compatible.____ 77. Routes the information within individual networks and across networks. This layer maintains a routing

table of possible destinations and directs packets to them.

Page 10: XP Test001 Chapters 9-12 Study Reformat

Listed below are five specific IP addresses. Match each address with its network class or specific description/function as applicable.a. 122.12.3.212b. 127.0.0.1c. 180.252.12.11d. 192.168.7.12e. 169.254.200.17

____ 78. Loopback Address____ 79. Class A Address____ 80. Class C Address____ 81. Automatic Private IP Address____ 82. Class B Address

Listed below are five specific security threats. Match each threat with the malicious action it is known for.a. Botb. Spywarec. Trojan horsed. Worme. Virus

____ 83. Records Web browsing habits, monitors e-mail communications, records keystrokes____ 84. Scans IP addresses looking for specific vulnerabilities to infect____ 85. Loads backdoor programs onto systems____ 86. Infects computers and coordinates all-out assaults on e-commerce sites____ 87. Code that replicates by being copied or initiating its copying to another program, computer boot sector,

or document without permission of the user

Listed below are five of the user-configurable option levels that control Internet Explorer’s behavior in managing cookies. Match each position listed on the privacy slider with its proper description.a. Highb. Medium Highc. Mediumd. Lowe. Accept All Cookies

____ 88. Blocks cookies from third-party Web sites that do not have a compact policy. Cookies from third-party Web sites that use your personal information without your implicit consent are deleted from your computer when you close Internet Explorer.

____ 89. Saves all cookies on your computer. Existing cookies on your computer can be read by the Web sites that created them.

____ 90. Blocks any cookies from Web sites that do not have a computer-readable privacy statement called a compact policy. Cookies from first-party Web sites that use your personal information without your explicit permission are blocked.

Page 11: XP Test001 Chapters 9-12 Study Reformat

____ 91. Blocks cookies from third-party Web sites that do not have a compact policy or that use your personal information without your implicit permission. Cookies from first-party sites that use your personal information without your implicit permission are deleted from your computer when you close Internet Explorer.

____ 92. Blocks cookies from third-party Web sites that do not have a compact policy or that use your personal information without your explicit permission. Cookies from first-party sites that use your personal information without your implicit permission are also blocked.

Short Answer

93. You receive a call during your Help Desk shift requesting assistance from a user who can’t get Microsoft Word to launch. The user reports that she visited a Web site that offered to install a custom application that combined multi-language dictionary and search functions integrated into the Word application. The installation was launched through the browser session when the user responded “yes” to allow the install. Immediately after the installation completed the user was unable to launch Word or open any Word documents. The initial installation of Word was done by a packaged MSI installation routine published to the user through Active Directory. What is the most expeditious way to repair the broken application?

94. Constance manages the hardware inventory of Contoso Corporation, which makes use of Active Directory technology to manage its domain. Contoso employs a number of consultants who spend about 50 percent of their time in-house and 50 percent of their time at customer sites. It is Contoso policy to assign specific desktops to consultants, while pooling the domain’s laptops and dispensing them only when consultants take an off-site assignment. In order to ensure stability when consultants are offsite, laptops are re-imaged with a Ghost Image of the Windows XP Professional operating system as soon as they are turned in by the returning consultant. Constance wants to be sure that all laptops that have been re-imaged are immediately available for reassignment, and contain all the basic software (Office, anti-virus) that every Contoso employee uses on a regular basis. How can Constance best use Active Directory’s Group Policy features to meet this goal and reduce her workload?

95. Colin manages the software inventory of Contoso Corporation to insure compliance with licensing requirements. Contoso uses Active Directory Group Policy to install and maintain all application and utility software. It is Contoso policy to turn over its desktop and laptop hardware inventory every three years. A large portion of this hardware inventory is donated to charities and other worthy causes. At the end of a three-year use cycle, operating systems are normally replaced or purchased with the replacement computer. However, application or utility software might be utilized on a much longer cycle or refreshed through an upgrade process rather than outright purchase. Colin wants to be sure that all retired machines that are removed from the Contoso domain have any application software licensed to Contoso removed before being passed to the new owner. How can Colin best use Active Directory’s Group Policy features to meet this goal and reduce his workload?

Page 12: XP Test001 Chapters 9-12 Study Reformat

96. You have answered a Help Desk call from a user in the Contoso Human Resources department, who is running Windows XP Professional on her powerful new desktop and has Power User rights on the local machine. She is trying to verify the employment dates and salary range for an ex-employee of Contoso, who left the company prior to a switch in the HR department to a more modern HR software package. In order to retrieve the requested information from the old database, the user has loaded a backup copy of the database and a copy of the old HR application. Now she finds that any attempt to run the old application crashes immediately and generates two error messages, reporting insufficient disk and memory resources. The user is incredulous, as the new computer is at least five times more powerful than the one she used to run this application on. You verify that the system has over 500 Megabytes of free memory and 30 Gigabytes of free disk space. What is the issue?

97. Which of the following are the components that can comprise a Windows Installer package? (Choose all answers that are correct.)a. Transform (.mst) fileb. Policy (.pol) filec. Windows Installer (.msi) filed. Information (.inf) filee. Patch (.msp) file

98. Which of the following are the levels of application compatibility that comprise the Windows Logo Program? (Choose all answers that are correct.)a. Compatible with Windows XPb. Written for Windows XPc. Designed for Windows XPd. Runs on Windows XPe. Optimized for Windows XP

99. You are supporting a small, six computer network. All systems are running Windows XP Professional. You are communicating with the Internet through a small, six-port home/office router/switch. The router is handing out DHCP addresses in the 192.168.1.100–192.168.1.150 range. Five of the Windows XP systems you support rely on DHCP for their network address. The remaining XP Professional system serves as the network’s file and print server and has a fixed IP of 192.168.1.10. On Tuesday morning, the entire office loses connectivity to the Internet. You troubleshoot the problem to the router and determine that it has failed. You reconfigure one of the five workstations as an ICS (Internet Connection Sharing) host as a temporary solution while awaiting a replacement router, and reboot all six of the office machines. All five of the workstation computers gain immediate access to the Internet, but lose connectivity to the file and print server. The file and print server has lost connectivity to the five workstations and the Internet. What must be done to the file and print server in order to reestablish connectivity with the remainder of the network and the Internet?

Page 13: XP Test001 Chapters 9-12 Study Reformat

100. You are examining a Windows XP Professional laptop because the user complains that she cannot reach the Internet. You verify that the laptop cannot communicate with the Internet and begin to troubleshoot the problem. The network cable is connected and the LEDs at the connection point are flashing, indicating that the required electrical signals are present on the wire. You perform a check of existing settings by issuing the Ipconfig command from a command prompt and notice that the IP address listed is 169.254.1.1. You know that this network connection is on the 192.168.7.x subnet. You check the network card configuration settings and note that the card is set to acquire an address automatically. You substitute a fixed IP address of 192.168.7.105, enter the proper subnet mask and default gateway, and enter the IPs of your primary and secondary DNS servers. You are able to reach the Internet immediately. You return the network card settings to acquire an address automatically and reopen a command prompt. You issue the Ipconfig /renew command, and after a delay find that the IP address remains at 169.254.1.1. What service is at the root of this problem?

101. Megan has just returned from a one-month consulting visit at a client site. During her time at the site, the client’s IT department configured Megan’s laptop to communicate with their Novell Netware Network using the TCP/IP protocol. Back in the home office, Megan contacts you at the Help Desk with the complaint that her laptop is extremely sluggish during printing, file access, and especially logon. It seems to perform just fine when she is accessing the Internet or when she uses it at home, off the network. Given the circumstances described above, what is the most likely cause of the sluggish performance described?

102. You are assisting the Graphics Department Manager with the implementation of Wireless Networking on her new laptop. The laptop has an embedded wireless card which is 802.11b and 802.11g capable. Your office has been equipped with wireless base stations for the past two years, and your manager is thrilled that her new laptop will finally allow her to take advantage of the additional flexibility that wireless communication offers. She became so enamored of the advantages of wireless that she installed a new wireless base station for her home. Now, she is at your desk with her laptop and a complaint about the office’s wireless network performance. She states that at home, Windows XP reports performance of 54 Mbps no matter where she is in her house, even on another floor and opposite side of the building from the wireless base. At your office, however, performance is comparatively sluggish — in fact, she is convinced there is something wrong with the system. She states that even when she stands right next to the office base station with her laptop, she cannot get Windows to report output any better than 11 Mbps. What is the issue?

Page 14: XP Test001 Chapters 9-12 Study Reformat

103. You are configuring three new laptops for members of your sales staff. The three laptops are arrayed across your workbench and plugged into your network through a small switch. They are identical in model and hardware configuration. You have installed a copy of Windows XP Professional Service Pack 2 on each of the laptops, given each a unique name, and added them to your domain. You have just finished running Windows Update on each machine and have transferred a basic utility package used on all corporate machines from your desktop to each new laptop. An assistant is about to undertake the task of pushing each salesman’s individual data from their old machines to these new ones. You e-mail your assistant the machine names and instructions on how to complete her task. After a few minutes, your assistant arrives at your desk and reports that the new laptops must be malfunctioning. She was preparing to push data to the laptops and checked connectivity prior to the move when she noticed that the three laptops were not responding to a ping test. She has come to your desk to ask if you might have turned them off. You look at the laptops and all three are running. You are able to access a share on your desktop and the Internet from all three, and can ping your desktop from each laptop. However, as your assistant reported, you cannot ping any of the laptops from your desktop. What is the problem?

104. Listed below are the five units of binary measurement. Rank each unit according to size, beginning with the smallest and proceeding to the largest unit of measurement.a. byteb. gigabytec. kilobyted. bite. megabyte

105. You are supporting a small group of executives in the Mergers and Acquisitions group of your company. This group is particularly concerned about security because they work with highly sensitive information. The fact that they work with laptops and travel extensively further increases the vulnerability of the information they carry. Much of the sensitive information used by the executives has been centralized on corporate servers for security. The executives now use an in-house browser-based application to check, manipulate and update this information. As the IT support liaison for this group, what can you configure in the Advanced tab, of Internet Options dialog box, to insure that a stolen or lost laptop will contain no confidential information left behind by this application?

Page 15: XP Test001 Chapters 9-12 Study Reformat

106. As Network Operations Manager for Contoso Corporation, you are leading the weekly staff review of Help Desk calls. The staff is reporting an extremely high incidence of calls complaining of poor, sluggish performance from both laptop and workstation users in the domain. Your system engineers have traced the problem to an infestation by a particularly obnoxious spyware package that is using up a large percentage of system resources in the background, unbeknownst to the end user. Investigation reveals that the spyware is installing itself as a BHO via ActiveX controls. Although able to identify the spyware, your staff has so far been unable to identify which Web site(s) are distributing it. A suggestion is made that a temporary solution would be to tighten the controls on Active-X installations domain-wide until the exact cause can be isolated. The standard Contoso desktop and laptop build is Windows XP Service Pack 2, and your domain controllers are all running Windows Server 2003. How could you most efficiently institute such a change?

107. You are working the Contoso Help Desk on a Friday afternoon when a call comes in from a user who is frantically trying to post her project time to the company’s Project Central database. She reports that she always waits until the end of the day to enter her time in case there are any last-minute changes, and the whole process never takes more than five minutes. She suspects that the IT Department is at fault since they were just working on her computer and she has never had a problem before. You check your database for details on what the IT staff has done to her system and note that Service Pack 2 was installed on Wednesday. There have been no complaints from the user until now. You ask her the exact nature of the problem and she reports that she can’t log in to the Project Central server—in the past, she simply clicked on the link in her Favorites list and logged in when prompted. Now, she clicks on the link, sees a brief flash as if she is being sent to the server, hears a strange tone, and is returned right back to the page she was on before clicking the link. You ask her if she sees a thin yellow bar appearing under the address bar of Internet Explorer. “Oh, yes…I do…,” she says, “and there’s a message typed in there, too.” You now know why the user cannot get into Project Central. What is the reason?

108. When you select the Automatically Detect Settings option, the choice of which is always presented during any initial Internet Explorer settings configuration, Windows XP attempts to detect the required settings by using which of the following protocols? (Choose all answers that are correct.)a. WPAD – Web Proxy Auto-Discovery Protocolb. IPX – Internetwork Packet Exchange Protocolc. SPX – Sequenced Packet Exchange Protocold. SLP – Service Location Protocole. BGP – Border Gateway Protocol

109. Which of the following enhanced security and usability features have been added to Internet Explorer with Windows XP Service Pack 2? (Choose all answers that are correct.)a. An integrated pop-up blockerb. Add-On Management Toolc. Add-On Crash Detection Featured. Integration of Microsoft Word as the default HTML editore! All of the above

Page 16: XP Test001 Chapters 9-12 Study Reformat

110. Which of the following Web Content Zones are not visible on the Security tab on Internet Explorer’s Options settings? (Choose all answers that are correct.)a. Restricted Sites Zoneb. Internet Zonec. Local Machine Zoned. Local Intranet Zonee. Locked-Down Local Machine Zone

111. How would a Web Content Zone, which is not available for modification using the Security tab on Internet Explorer’s Options settings, normally be managed? (Choose all answers that are correct.)a. By using Local Computer Policyb. By using a Domain Administrator Account on the Local Machinec. By using the Registry Editord. By using Active Directory Group Policye. By using XML Scripts

112. To make setting multiple options simpler for users and administrators, Microsoft has defined templates that can apply all settings at once to achieve a specific level of security. Which of the following are actual URL action templates? (Choose all answers that are correct.)a. Trustedb. Lowc. Medium-Lowd. Mediume. High