Answer Key

     

1. B

2. A

3. C

4. C

5. B and D

6. A

7. D

8. C

9. B

10. C

11. B

12. A

13. C

14. C

15. B

16. A

17. A

18. B

19. A

20. C

21. D

22. B

23. B

24. A

25. B and D

26. B, C, and D

27. A

28. B

29. D

30. B

31. B

32. C

33. C

34. D

35. B

36. C

37. A and D

38. B and C

39. C

40. A

41. B

42. A

43. B

44. B

45. B

Question 1

Answer B is correct. Windows 95 operating systems cannot read NTFS partitions. Answer A is incorrect because NTFS permissions do not apply; the disk is unreadable from the Windows 95 operating system. Answer C is incorrect because Windows 95 cannot be installed on a dynamic disk. Answer D is incorrect because Windows 95 must be installed on a basic disk, so booting into Windows 95 is not possible if the disk has been converted.

Question 2

Answer A is correct. If the taskbar is locked, the user cannot resize the Quick Launch toolbar. To begin, unlock the taskbar by right-clicking a blank area on the Start menu; then select the Lock Taskbar option. Selecting this option sets the toggle option so the check mark beside it is removed. At this point, resize the Quick Launch toolbar so all the icons are visible. Answer B is incorrect because the user did not indicate that there are unused icons. Answer C is incorrect because you cannot resize the Quick Launch toolbar until the taskbar has been unlocked. Answer D is incorrect because there is no Autosize feature in the Taskbar Properties dialog box.

Question 3

Answer C is correct. To customize the Start menu for all users who log in to the computer, you must right-click the Start button and click Open All Users. Answers A and B are incorrect because you cannot add submenus from the Taskbar and Start Menu Properties dialog box. This dialog box is used to configure view properties for both the Start menu and the taskbar. Answer D is incorrect because Barbara does not have the shortcuts required. If Jane's Start Menu folder were copied into Barbara's profile, any shortcuts would be visible with Barbara's login.

Question 4

Answer C is correct. If you are multibooting a computer, an application must be installed under each operating system. If not, the application will be available only under the operating system on which the application was installed. Answer A is incorrect because the installation was not performed to both operating systems. Answer B is incorrect because Windows 95 cannot view NTFS drives . Installing Office XP on an NTFS drive would not be possible. Answer D is incorrect because NTFS permissions would not be applicable with Windows 95.

Question 5

Answers B and D are correct. You can hide the system files and folders using the Folder Options window, which you can access from the Control Panel or from the Windows Explorer window through the Tools menu. When you select the option Do Not Show Hidden Files and Folders, program and system files are not displayed. Answers A and C are incorrect because they are not valid options.

Question 6

Answer A is correct. File extensions are associated with certain programs. When a file is opened from Windows Explorer, the program automatically launches based on the file extension. More than likely, the file association has been changed so WordPad launches instead of Microsoft Word. Answer B is incorrect because this would prevent the user from opening the files in Microsoft Word. Answer C is incorrect because the compatibility mode is used when older software is run on new operating systems. Answer D is incorrect because the Word shortcut will not prevent users from opening word processing files with WordPerfect.

Question 7

Answer D is correct. The user can change the default date using the Regional and Language Options applet within the Control Panel. Answer A is incorrect because the dates would revert to the default setting from the Regional and Language Options window. Answer B is incorrect because the date format is not available from the Folder Options applet. Answer C is incorrect because the user does not need to reinstall Windows XP. During the installation, the user would be able to set the default date settings; however, the same window is available for modification after installation. She would need to reinstall all applications and back up all local data. This option would cause more problems than it would solve.

Question 8

Answer C is correct. If the application will not run under the Windows XP operating system, you should install the application using the Program Compatibility Wizard. Answer A is incorrect because Windows XP can run older programs after the compatibility settings have been configured. Answer B is incorrect because multibooting the computer is not necessary. Answer D is also incorrect. You might need to contact the vendor for updated software; however, you should try running the Compatibility Wizard first to avoid purchasing updated software.

Question 9

Answer B is correct. The home page is the Web page displayed each time the Web browser is opened or when the Home button is selected. Answer A is incorrect because security zones are used to group Web sites for the purpose of applying security settings. Answer C is incorrect because a cookie is a small text file that may store information such as your preferences for an Internet site or personal information such as your email address. Answer D is incorrect because a proxy server retrieves Web content on behalf of computers on the private network and blocks unwanted Internet traffic from reaching the intranet.

Question 10

Answer C is correct. The user indicated that she logged on to her system using the local administrator logon and does not have access to network resources, which includes the Internet. Answers A and B are incorrect because the user does not have access to these servers; she used the local administrator account to log in. Answer D is incorrect because the user does not have access to an Internet connection to test whether the address is valid.

Question 11

Answer B is correct. Outlook Express can be configured to remember the password for an email account so the user is not prompted to type it in when Outlook Express checks for email. The user can configure this setting in the properties window for the email account by selecting the Servers tab and clicking the Remember Password option. Answer A is incorrect because a security zone is used to apply security settings. Answer C is incorrect because this option is selected if the outgoing mail server requires authentication. Answer D is incorrect because this option is used to configure Outlook Express to automatically log on the user to Windows Messenger.

Question 12

Answer A is correct. Outlook allows you to archive data to a file called Archive.pst, which places the user's oldest data into the file. The Archive.pst file removes items from the Inbox and therefore does not count toward mailbox size. Answer B is incorrect because it will clear only the items that have been deleted. It will also cause loss of data. Answer C is incorrect because moving individual items to the C drive will not allow the user to view data from the Outlook Express window. Answer D is incorrect because moving messages to Custom folders within the Inbox will still count toward mailbox size .

Question 13

Answer C is correct. Outlook Express can be configured to block attachments that can be potentially harmful to a computer. This option can be enabled using the Security tab within the Options window. Therefore, answers A and B are incorrect. Answer D is incorrect because this option is used to prevent viruses from sending email to contacts in your address book.

Question 14

Answer C is correct. If the user does not want to receive any email from a particular sender, the sender's email address can block any future messages from delivery. Answer A is incorrect because it will allow the message to be received and placed into another folder. Answers B and D are incorrect because the messages are received but are moved directly to the Deleted Items folder.

Question 15

Answer B is correct. To display the preview pane, you must enable it using the View menu. Therefore, answers A and C are incorrect. Answer D is incorrect because rules are used to configure how Outlook Express handles incoming email.

Question 16

Answer A is correct. You can use the Export function within Outlook Express to copy all mail messages (as well as the address book) into Microsoft Outlook. Therefore, answers B, C, and D are incorrect.

Question 17

Answer A is correct. To prevent the loss of customized settings, you can create a backup file that contains the user's customized settings, including menu, toolbar, and template modifications. Store the file on the company network and reapply the user's customizations on the new system. Answer B is incorrect because it will copy only a portion of the user's settings to the new system. Answer C is incorrect because some settings may be missed or require many hours to re-create if complex macros are involved, so it is not a viable solution. Answer D is incorrect because it will copy only some of the customized settings from the Windows environment, such as the Favorites and some customized settings for Office applications.

Question 18

Answer B is correct. The Typical Office XP installation does not contain the thesaurus. You must customize the installation to include such features. For power users, you should perform a full installation or configure the additional features to install on first use. Answer A is incorrect because the installation is not damaged. Answers C and D are incorrect because the menus and toolbars have not been customized.

Question 19

Answer A is correct. You can reset the toolbar using the Customize dialog box. If any other changes have been made, they will be fixed by resetting the toolbar. Answer B is incorrect because you need to verify that the user has not applied customizations to the toolbar. Answer C is incorrect because the Undo button is located on the Standard toolbar. Answer D is also incorrect. Although the user can press the Ctrl+Z key combination, it does not solve the issue of the missing Undo button.

Question 20

Answer C is correct. The Office installation should be repaired using the Detect and Repair option from the Help menu. You can also repair the installation from the Add/Remove Programs applet. Answer A is incorrect because removing the Access application will not solve the problem with the current Access installation. Answer B is incorrect because the Get External Data feature is currently installed. Answer D is incorrect because it is not necessary to remove the entire Office installation and reinstall. This step may be necessary if the Detect and Repair feature cannot solve the installation problem. However, you should do so after you try to use the Detect and Repair feature.

Question 21

Answer D is correct. The Office XP installation requires the product to be activated before unlimited usage is permitted. The user can open the Office applications 50 times before activation is required. When the user exceeds this number, the programs will allow her to view files but not create new files or modify existing files. Answer A is incorrect because the product key does not expire. Answer B is incorrect because no known virus disables Office features. Answer C is incorrect because there is no mention that a domain policy has been applied. It is also not possible for a domain policy to disable features within Office.

Question 22

Answer B is correct. The Normal.dot template file stores several customized settings as well as the text. To ensure that no loss of customizations is experienced , you should edit the Normal.dot file to remove the text. Answers A and D are incorrect because the blank template is named Normal.dot. Answer C is incorrect because when the Normal.dot template is re-created, it loses all configuration settings the user has modified.

Question 23

Answer B is correct. The Office XP installation window will appear as features are used for the first time. The feature is automatically installed and immediately available after the installation is complete. Answer A is incorrect because the Office XP installation cannot automatically detect and repair the installation. Answer C is incorrect because the Office installation is intact. Answer D is incorrect because there is no indication that a domain policy has been applied.

Question 24

Answer A is correct. The Personalized menus automatically customize menus and toolbars based on how often you use the commands. When you first start an Office program, only the basic commands appear. As the user accesses features from the menus and toolbars, they adjust so that only the commands and toolbar buttons he uses most often appear. Answer B is incorrect because the feature is called Personalized menus. Answers C and D are incorrect because the buttons used on the toolbar do not affect the menu commands in view in the program menus.

Question 25

Answers B and D are correct. To activate the Formatting toolbar, you can right-click on an active toolbar and select Formatting; or you can click the View menu, select the Toolbars submenu, and then select the Formatting option. Answers A and C are incorrect because they do not open the Formatting toolbar.

Question 26

Answers B, C, and D are correct. To help the user set up her email account to automatically reply using her personal company address, set the Reply Email address on the General tab of the Internet Email Setting dialog box. You can also set the default mail account to the user's personal email address using the Set as Default button in the Email Accounts dialog box. You can access this dialog box by using the Tools menu and selecting Email Accounts. Answer A is incorrect because some configurations do allow automation to occur.

Question 27

Answer A is correct. The user should set up custom mail folders and rules to organize the messages into the new folders. Answer B is incorrect because this approach will deal only with high-priority messages. Not all messages will be received with a high priority, and some messages may require immediate attention based on the sender rather than the high-priority indicator. Answer C is incorrect because the user is trying to organize the incoming messages. Answer D is incorrect because the user is not trying to configure an out of office message.

Question 28

Answer B is correct. The Inbox Repair Tool will try to repair the header of the PST file. Answer A is incorrect because the user did not indicate that he moved the Archive.pst file. Answer C is incorrect because rebooting will not affect the data in Outlook. Answer D is incorrect because the latest patches to the Office XP software will not affect the data.

Question 29

Answer D is correct. The default reminder is located on the Preferences tab in the Options dialog box. Answers A, B, and C are incorrect because they do not contain the default reminder setting.

Question 30

Answer B is correct. The AutoArchive dialog box is available from the Other tab in the Options dialog box. The AutoArchive button displays the configuration options available with the AutoArchive feature. Answer A is incorrect because it is used to initiate the Archive feature manually. Answer C is incorrect because it is used to manage the PST files configured in Outlook. Answer D is incorrect because it is not a valid feature.

Question 31

Answer B is correct. If Outlook Express is configured to block attachments, the user is not able to open any attachments that may contain viruses. To allow the user to open attachments with a specified file extension, open the Folder Options applet, locate the file extension from the File Types tab, and open the Advanced options to deselect the Confirm After Download option. Answer A is incorrect. Deselecting this option means Outlook Express will not block any attachments, which will allow all file attachments to be opened regardless of their file extension. Answer C is also incorrect. Configuring Outlook Express to read all messages in plain text ensures that any HTML messages that contain code will not be run. Answer D is incorrect. If you change the security zone to Internet zone, security may be compromised because any ActiveX content contained in email messages may be run.

Question 32

Answer C is correct. If a computer suddenly shows a dramatic decrease in performance and applications are not functioning properly, the system may be infected with a computer virus. You should always scan for viruses before reinstalling the operating system. Therefore, answers A and B are incorrect. Answer D is incorrect because before applying Windows XP updates, you should determine the cause of the problem.

Question 33

Answer C is correct. If Outlook Express is configured to display all email messages in plain text, some HTML messages may not be displayed properly. Using the plain text configuration increases security because any ActiveX controls that may contain macros cannot be executed. Answers A, B, and D are incorrect because these options would not cause the message to be displayed improperly.

Question 34

Answer D is correct. A Trojan horse is a type of security attack that tries to disguise itself as a valid program. The program contains some type of hidden function designed to compromise the security of the computer. Therefore, answers A, B, and C are incorrect.

Question 35

Answer B is correct. You use the Local Intranet security zone to group the sites that exist within the corporate network. Therefore, answers A, C, and D are incorrect.

Question 36

Answer C is correct. The information is located in the user's old profile and needs to be imported into her new profile. Answer A is incorrect because the user indicated that her data was stored in the Outlook.pst file. Answer B is incorrect because the PST file needs to be imported into the user's new profile. Answer D is incorrect because data is not active and has not been tested to verify its integrity.

Question 37

Answers A and D are correct. When a user has a combination of NTFS and Share permissions, the most restrictive permission is applied. Therefore, the most restrictive permission is Read, so he cannot save changes to any files within the Marketing folder. The Share permissions are also not applied when the user accesses the folder from a local computer, which explains why he can modify the files from the local system but not when the shared folder is accessed across the network. Answer B is incorrect because the effective permission is the most restrictive , which is Read. Answer C is incorrect because NTFS permissions not being propagated to subfolders are not an issue in this situation.

Question 38

Answers B and C are correct. When a file is moved to a new NTFS partition, it will inherit the NTFS permissions of the destination folder. You can also modify the NTFS permissions using the Security tab. Answer A is incorrect because the file permissions are not modified when a file is deleted. Answer D is incorrect because taking ownership of a file does not alter the permissions on a file.

Question 39

Answer C is correct. Any user who opens the file will be prompted to open the file as read-only. If that user refuses, the file will still open for modifications without a password. Answers A and B are incorrect because these approaches will only restrict access to the file, and passwords would need to be distributed to the users. Answer D is incorrect because it will prevent the file from being modified.

Question 40

Answer A is correct. When a user receives a file from an untrusted source and no warning message indicating the file has macros, the security setting is low. Therefore, answers B, C, and D are incorrect.

Question 41

Answer B is correct. Event auditing will track the activity on the folder and the users who access the folder. NTFS file activity logging is a feature used to verify who accesses a folder when it is enabled. Answer A is incorrect because the Event Viewer is used to view the security log created by the auditing system but is not the feature that does the actual tracking. Answer C is incorrect because you can view the log file in the Event Viewer. Answer D is incorrect because you use account lockout to prevent compromised accounts from being used.

Question 42

Answer A is correct. The parent folder named XP Migration has not propagated the permissions to the child folders. Answer B is incorrect because the user is able to view the contents of the Software Training folder. Answers C and D are incorrect because they allow Modify permission in the parent folder.

Question 43

Answer B is correct. The user was able to open the database from the shortcut on her desktop but cannot browse to the database file. Answer A is incorrect because the user was able to open the database from the shortcut on her desktop. Answer C is incorrect because there is no indication that the database file was moved. Answer D is incorrect because the user can open the file from the old shortcut on her desktop.

Question 44

Answer B is correct. A user would need to have local access to the files to delete them. The Share permissions do not apply when accessing the files locally. Answers A and D are incorrect because the user cannot have NTFS permissions on a Windows 95 system. Answer C is incorrect because there is no indication that the files have been moved.

Question 45

Answer B is correct. You should avoid using the Deny option to assist in troubleshooting permissions problems. Applying permissions at the file level also is not recommended. Answers A and C are incorrect because, in practice, you should avoid using the Deny option. Answer D is incorrect because it would create multiple copies of the same files.



MCDST 70-272 Exam Cram 2. Supporting Users & Troubleshooting Desktop Applications on a Windows XP Operating System (Exam Cram 2)
MCSA/MCSE 70-291 Exam Cram: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (2nd Edition)
ISBN: 0789736187
EAN: 2147483647
Year: 2003
Pages: 119
Authors: Diana Huggins

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net