Questions and Answers


Lesson 1 Review

Page10-8

1.

An end user reports that although he was able to install Windows Update files when he first purchased his computer two years ago, he now cannot install Service Pack 1. After a quick check, you discover that Windows Update is enabled in System Properties, and is configured to automatically download updates. You verify that the user can download Service Pack 1 but cannot install it. What is most likely the problem?

  1. The user has an unlicensed copy of Windows XP.

  2. The user is running Windows XP Home Edition and needs to upgrade to Windows XP Professional Edition.

  3. The user needs to register Windows XP with Microsoft.

  4. The user needs to activate Windows XP with Microsoft.

  5. Windows Update determined after scanning the computer that the user does not need to install the service packs.

a is correct. end users must have a licensed copy of windows xp (any version) to install service packs. b is incorrect because both home and professional editions can be used to obtain and install windows update files. c is incorrect because registration is optional. d is incorrect because the computer would not function after two years if the product had never been activated. e is incorrect because everyone should install distributed service packs.

Answers

1.

A is correct. End users must have a licensed copy of Windows XP (any version) to install service packs. B is incorrect because both Home and Professional Editions can be used to obtain and install Windows Update files. C is incorrect because registration is optional. D is incorrect because the computer would not function after two years if the product had never been activated. E is incorrect because everyone should install distributed service packs.

Lesson 2 Review

Page10-20

1.

A small office user has a network that consists of four computers. One computer running Windows XP Professional Edition acts as the host and provides ICS services, and the other three computers access the Internet through this host computer’s Internet connection. The administrator of the network wants to protect the network by using ICF. What must the administrator do?

  1. Purchase and install a router that is compatible with Windows XP and ICF.

  2. Upgrade to DSL or a cable modem; ICF does not work with a dial-up connection.

  3. Enable ICF on the host computer.

  4. Enable ICF on all four network computers.

c is correct. enabling icf on the host computer is all the administrator needs to do on a network that is already configured and running properly. a and b are incorrect because routers, dsl, and cable modems are not requirements of icf. d is incorrect because icf should not be installed on computers that are not directly connected to the internet.

2.

You are troubleshooting a network connection and need to use the Ping command to see if a host is reachable. Which ICMP option should you enable on the host computer?

  1. Allow Incoming Router Request

  2. Allow Incoming Echo Request

  3. Allow Outgoing Source Quench

  4. Allow Redirect

b is the correct answer because it allows the host computer to respond to ping requests. a is incorrect because this option passes on information about connected routers and the flow of traffic from the computer. c is incorrect because this option allows the computer to send a message to slow the flow of data. d is incorrect because this option allows routers to redirect data to more favorable routes.

Answers

1.

C is correct. Enabling ICF on the host computer is all the administrator needs to do on a network that is already configured and running properly. A and B are incorrect because routers, DSL, and cable modems are not requirements of ICF. D is incorrect because ICF should not be installed on computers that are not directly connected to the Internet.

2.

B is the correct answer because it allows the host computer to respond to ping requests. A is incorrect because this option passes on information about connected routers and the flow of traffic from the computer. C is incorrect because this option allows the computer to send a message to slow the flow of data. D is incorrect because this option allows routers to redirect data to more favorable routes.

Lesson 3 Review

Page10-25

1.

An end user reports that she has noticed some bizarre behavior on her computer all morning, and she believes it is getting worse. She reports that the computer is displaying odd messages, that she cannot open her JPEG files, and that some programs will not run. She says she has not opened any e-mail attachments all morning and that no one except her has accessed the computer. What is most likely the problem?

  1. The user has a virus on her computer and it is most likely a simple replicating virus.

  2. The user has a virus on her computer and it is most likely a worm.

  3. The user has an internal problem that cannot be a virus because the user states that she did not open any e-mail attachments recently.

  4. The user’s operating system needs to be reinstalled; these are common signs of a corrupt installation.

b is correct. these symptoms are common signs of a virus that is a worm. a is incorrect because simple replicating viruses usually replicate only through e-mail and the network. c is incorrect because viruses can travel in ways other than e-mail. d is incorrect because these are not common signs of a corrupt installation; they are common signs of a virus.

2.

You work for an Internet service provider (ISP). An end user calls and reports that he has a virus on his computer. He has discovered through his friends and from watching the national news that he has the Blaster worm. He does not have any antivirus software installed. Although it is not your job to assist the user in ridding the computer of the virus, you want to assist in some way in the time you are allotted. List four ways the user can get help in ridding the computer of the virus.

answers may vary, but the following list shows the common ways of helping get rid of viruses: * visit http://www.microsoft.com/security/antivirus. * visit http://www.microsoft.com/security/protect/windowsxp/firewall.asp. * visit the website of a manufacturer that produces antivirus software. * purchase antivirus software, install it, and run the virus removal tools. * visit a virus removal newsgroup. * visit the microsoft knowledge base.

Answers

1.

B is correct. These symptoms are common signs of a virus that is a worm. A is incorrect because simple replicating viruses usually replicate only through e-mail and the network. C is incorrect because viruses can travel in ways other than e-mail. D is incorrect because these are not common signs of a corrupt installation; they are common signs of a virus.

2.

Answers may vary, but the following list shows the common ways of helping get rid of viruses:

  • Visit http://www.microsoft.com/security/antivirus.

  • Visit http://www.microsoft.com/security/protect/windowsxp/firewall.asp.

  • Visit the website of a manufacturer that produces antivirus software.

  • Purchase antivirus software, install it, and run the virus removal tools.

  • Visit a virus removal newsgroup.

  • Visit the Microsoft Knowledge Base.

Lesson 4 Review

Page10-29

1.

List the types of vulnerabilities for which MBSA can scan.

the vulnerabilities for which mbsa can scan include the following: * windows vulnerabilities * weak passwords * iis vulnerabilities * sql vulnerabilities * security updates

Answers

1.

The vulnerabilities for which MBSA can scan include the following:

  • Windows Vulnerabilities

  • Weak Passwords

  • IIS Vulnerabilities

  • SQL Vulnerabilities

  • Security Updates

Case Scenario Exercises: Scenario 10.1

Page10-30

1.

An end user is setting up a server that he will host himself using his small office network, and he wants Internet users to be able to connect to the Web pages stored on it. He is also setting up an additional server that will permit users to upload and download files using the Internet instead of the local network. Which two services must he enable to permit the required traffic to flow through the ICF he currently has configured on this connection? (Choose two.)

  1. Web Server (HTTP)

  2. FTP Server

  3. Telnet Server

  4. POP3

a and b are correct. the web server (http) service allows users to access the web pages stored on the web server, and the ftp server service allows users to upload and download files stored on the additional server. c is incorrect because telnet servers are used to log on to network computers from remote locations. d is incorrect because pop3 servers are used to receive e-mail.

Answers

1.

A and B are correct. The Web Server (HTTP) service allows users to access the Web pages stored on the Web server, and the FTP Server service allows users to upload and download files stored on the additional server. C is incorrect because Telnet servers are used to log on to network computers from remote locations. D is incorrect because POP3 servers are used to receive e-mail.

Case Scenario Exercises: Scenario 10.2

Page10-30

1.

As a desktop technician for a small office network, it is your job to make sure all the computers on the network are as secure and protected as possible. You have configured Windows Update to obtain and install updates automatically, you have ICF configured on all of the computers that need it, you have antivirus software installed on each computer, you incorporate a router for extra protection, and you enforce password policies that require users to create strong passwords on their computers. You now want to be able to test the computers on the network regularly from your desktop computer and check for additional vulnerabilities as they arise. The computers are all in the IP range of 192.168.0.1 to 192.168.0.12. You want to check the following:

  • Whether the most recent security updates have been installed

  • Whether password requirements are configured

  • Whether the file systems are all configured as NTFS

  • Whether the Guest account is enabled on any of the computers

  • How many shares are present on each computer

  • Whether Microsoft Outlook security zones have security issues

Is there a single free program available to do this? Select the best answer.

  1. There is no program like this available, but one is not needed; the computers are amply protected.

  2. There is no program like this available, but MBSA offers some of these options.

  3. MBSA offers all of these options and can be used from the administrator’s desktop.

  4. There is no free program available, but several applications can be purchased that will perform these tasks.

c is the correct answer. mbsa does all of these things. the other answers are incorrect for this reason.

Answers

1.

C is the correct answer. MBSA does all of these things. The other answers are incorrect for this reason.




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net