Exam Prep Questions

     
Question 1

A user calls to report that he is unable to open an attachment within Outlook Express. You determine that Outlook Express has blocked the attachment. What should you do to allow the user to download attachments with a specific file extension?

  • A. From the Options dialog box within Outlook Express, click the Security tab and deselect the option Do Not Allow Attachments to Be Saved or Opened That Could Potentially Be a Virus.

  • B. Using the Folder Options applet within the Control Panel, locate the file extension and deselect the option Confirm After Download.

  • C. From the Options dialog box within Outlook Express, click the Read tab and deselect the option Read All Messages in Plain Text.

  • D. From the Options dialog box within Outlook Express, click the Security tab and change the security zone to Internet zone.

A1:

Answer B is correct. When Outlook Express is configured to block attachments, it will not allow a user to open any attachments that may contain viruses. To enable a user to open attachments with a specific file extension, open the Folder Options applet, locate the file extension from the File Types tab, and deselect the option Confirm After Download. Answer A is incorrect. Deselecting this option means Outlook Express will not block any attachments that may compromise security. Answer C is incorrect. Configuring Outlook Express to read all messages in plain text ensures that any HTML messages that contain code will not be run. Answer D is also incorrect. If you change the security zone to Internet zone, security may be compromised because active content contained in email messages may be run.

Question 2

You are the desktop support technician for a small company. A user calls to report that her computer is suddenly slow to respond. Upon investigation, you discover that several applications are no longer behaving correctly. What should you do?

  • A. Reinstall the applications that are not functioning as they should.

  • B. Reinstall the operating system and all applications.

  • C. Scan the computer with antivirus software.

  • D. Apply the latest critical updates.

A2:

Answer C is correct. If a computer experiences a sudden decrease in performance and applications are not functioning as they should, these symptoms may be an indication that it has a computer virus. The first thing you should do before reinstalling the operating system or the applications is scan for any viruses. Therefore, answers A and B are incorrect. Before applying any critical updates, you should determine the cause of the problem. Therefore, answer D is incorrect.

Question 3

You have configured a computer running Windows XP Professional as shown in the following figure.

graphics/09inf01.jpg

Which of the following statements is true regarding the configuration of the computer?

  • A. Updates will be installed every day at 3 a.m.

  • B. You will receive notification when updates are downloaded and again when they are installed.

  • C. You will receive notification when updates are downloaded but not when they are installed.

  • D. You will not receive notification when updates are downloaded but will be notified when they are installed.

A3:

Answer B is correct. Based on the configuration of the computer, you will receive notification before updates are downloaded from the Windows Update Web site. You will receive notification again when the updates are ready to be installed. Therefore, answers A, C, and D are incorrect.

Question 4

A recent virus outbreak on your network has forced you to take additional security precautions . You tracked the virus to an email attachment from an unknown source. All users currently use Outlook Express as their email client. You want Outlook Express to block any email attachments that may be harmful . What should you do?

  • A. From the Options dialog box within Outlook Express, select the Security tab and configure Outlook Express to block attachments that may be harmful.

  • B. Open the Folder Options applet within the Control Panel and configure Windows to block harmful attachments.

  • C. From the Options dialog box within Outlook Express, select the Read tab and configure Outlook Express to block attachments that may be harmful.

  • D. From the Internet Options dialog box within Internet Explorer, select the Security tab and configure Outlook Express to block attachments that may be harmful.

A4:

Answer A is correct. Outlook Express can be configured to block email attachments that may be harmful to a computer. You can configure this option by opening the Options dialog box within Outlook Express and selecting the Security tab. Therefore, answers B, C, and D are incorrect.

Question 5

What type of malicious software does not typically replicate itself?

  • A. Worm

  • B. Virus

  • C. Macro virus

  • D. Trojan horse

A5:

Answer D is correct. A Trojan horse does not typically replicate itself. A Trojan horse appears to be a legitimate program such as a game. When the program is run, a hidden function within the program normally compromises the security of the computer. Therefore, answers A, B, and C are incorrect.

Question 6

You are the desktop support technician for a consulting company that has 10 computers running Windows XP. You are responsible for ensuring all computers have the latest critical updates. You do not want to manually download and install the updates. You also do not want updates installed between the business hours of 8 a.m. and 6 p.m. What should you do?

  • A. Windows XP does not support this feature. You must connect to the Windows Update site and manually download and then install all critical updates.

  • B. Install the Microsoft Baseline Security Analyzer and scan each computer. Connect to the Windows Update site and download the necessary critical updates.

  • C. Open the System applet within the Control Panel and configure Automatic Updates to download updates automatically and install them at 12 a.m.

  • D. Nothing more needs to be done. Windows XP will, by default, automatically download and install critical updates every day at 3 a.m.

A6:

Answer C is correct. You can configure Automatic Updates using the System applet within the Control Panel. Configure Automatic Updates to download automatically and set the schedule anytime between 6 p.m. and 8 a.m. Therefore, answers A and D are incorrect. Answer B is incorrect because MBSA is used to scan a computer to detect holes in the configuration, such as missing updates or misconfigurations.

Question 7

You are the desktop support technician for a small insurance company. Each computer runs Windows XP. Antivirus software is installed on each computer. A firewall has been configured, and the Automatic Updates feature is enabled on all computers. Updates are downloaded and installed at midnight each day. A month later users complain that their systems are slow. Upon investigation, you discover all the computers are infected with a virus you read about two weeks earlier. You took all the necessary security precautions. What is most likely the reason for the virus outbreak on your network?

  • A. You did not install the necessary critical updates.

  • B. Outlook Express is not configured to display email in plain text only.

  • C. Outlook Express is not configured to block unsafe attachments.

  • D. You did not update the signature files for the antivirus software.

A7:

Answer D is correct. After a new virus is discovered , vendors who produce antivirus software update their database with fixes to remove the virus. If you have antivirus software installed, you have to keep the signature files up to date to protect your computer from recent viruses. The signature files have more than likely not been updated. Therefore, answers A, B, and C are incorrect.

Question 8

You are securing your network against security attacks. You have enabled the Internet Connection Firewall on the computer with a shared Internet connection. All the computers have been configured for Automatic Updates. What else should you do to physically protect the computers from virus attacks?

  • A. Install antivirus software on all computers.

  • B. Run the Microsoft Baseline Security Analyzer.

  • C. Visit the Windows Update site and download any critical updates.

  • D. Inform users of the implications of opening attachments from unknown sources.

A8:

Answer A is correct. Microsoft recommends these three steps to securing a computer against virus attacks: use a firewall, install the latest critical updates, and use up-to-date antivirus software. Therefore, you need to install antivirus software on all computers. Answer B is incorrect because MBSA will scan a computer and identify holes in the security. It does not actually protect a computer from viruses. Answer C is incorrect because all computers are enabled to use Automatic Updates. Answer D is incorrect. Although users should be educated about viruses, this knowledge will not physically secure the computers against viruses.

Question 9

A user calls to report that some of the email messages he received in Outlook Express are not being displayed correctly. Some messages are received with distorted text, and others contain only an attachment. What could be causing the problem?

  • A. Outlook Express is blocking the attachments.

  • B. The email messages contain viruses.

  • C. Outlook Express is configured to display all messages in plain text.

  • D. The security zone is set to Internet zone.

A9:

Answer C is correct. If Outlook Express is configured to display all email messages in plain text, any HTML messages may not be displayed properly. Configuring Outlook Express to display all messages in plain text increases security because any functions with the email will not run. Answers A, B, and D are incorrect because these options would not cause the message to be displayed improperly.

Question 10

Which of the following type of security attack attempts to disguise itself as a legitimate program?

  • A. Virus

  • B. Macro virus

  • C. Worm

  • D. Trojan horse

A10:

Answer D is correct. A Trojan horse is a type of security attack that attempts to disguise itself as a legitimate program. The program contains some type of hidden function designed to compromise the security of the computer. Therefore, answers A, B, and C are incorrect.



MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net