Questions and Answers


Lesson 1 Review

Page 5-15

1.

A user reports that he has changed his text size to Largest, but when he visits sites, sometimes the text on the sites is large and sometimes it is not. He reports this happens occasionally with colors and font styles, too. What does the user need to do to make sure these settings are always used, no matter what website he visits?

  1. Use the Internet Options dialog box in Internet Explorer, and from the General tab, select Accessibility, and make the appropriate changes in the Accessibility dialog box.

  2. Open Control Panel, open Accessibility Options, and on the Display tab, select the Override Web Settings check box.

  3. Use the Internet Options dialog box in Internet Explorer, select the General tab, choose Advanced, and in the Accessibility choices, select the Override Web Settings check box.

  4. Use the Internet Options dialog box in Internet Explorer, select the General tab, choose Accessibility, and in the Accessibility dialog box, select the Format Documents Using My Style Sheet check box.

a is the correct answer. b and c are not valid choices (because they do not exist) and are therefore not correct. d is a valid choice but will not override web settings using the text size, fonts, and colors selected by the user.

2.

A small business owner wants to personalize the Internet Explorer title bar on the computer that visitors access when they come into her store. She also wants to configure a default home page that users cannot change. Which of the following commands is used on the Run line to open the appropriate application for configuring these computerwide settings?

  1. msconfig.exe

  2. sigverif.exe

  3. cmd.exe

  4. gpedit.msc

d is correct because gpedit.msc opens the group policy console, and this console can be used to apply group policies computerwide. a is incorrect because this command opens the system configuration utility. b is incorrect because sigverif.exe opens the file signature verification utility. c is incorrect because cmd.exe opens a command prompt.

3.

A home user wants you to configure his computer running Windows XP so that his 12-year-old son cannot access websites that contain offensive language, nudity, sexual references, or violence that involves fighting or killing. He would like to be able to override those settings if ever necessary by using an administrator password. The user wants to spend the least amount of money possible. What should you tell the user to do?

  1. Tell the user to purchase and install inexpensive third-party parental control software. Teach the user how to configure it.

  2. Configure Content Advisor, included with Windows XP.

  3. Create a separate account for the son, and purchase and install parental control software. Apply the software only to the son’s account.

  4. Configure digital certificates, included with Windows XP, and accept digital certificates only from reputable sites.

  5. Configure the Profile Assistant to limit what sites the son has access to.

b is the correct answer. content advisor, included with windows xp, is an inexpensive way to control what sites and content are accessed on the internet. a and c are incorrect because third-party software generally costs money and is not necessary in this situation. d is incorrect because digital certificates verify identity on the internet; they are not used to judge or rate content. e is incorrect because the profile assistant is used only for identification purposes.

Answers

1.

A is the correct answer. B and C are not valid choices (because they do not exist) and are therefore not correct. D is a valid choice but will not override Web settings using the text size, fonts, and colors selected by the user.

2.

D is correct because gpedit.msc opens the Group Policy console, and this console can be used to apply group policies computerwide. A is incorrect because this command opens the System Configuration utility. B is incorrect because sigverif.exe opens the File Signature Verification utility. C is incorrect because cmd.exe opens a command prompt.

3.

B is the correct answer. Content Advisor, included with Windows XP, is an inexpensive way to control what sites and content are accessed on the Internet. A and C are incorrect because third-party software generally costs money and is not necessary in this situation. D is incorrect because digital certificates verify identity on the Internet; they are not used to judge or rate content. E is incorrect because the Profile Assistant is used only for identification purposes.

Lesson 2 Review

Page 5-29

1.

Which of the following are indications of a full Temporary Internet Files folder? (Choose all that apply.)

  1. When using the Save As command, pictures can be saved only as bitmaps and cannot be saved as .jpeg or .gif files.

  2. No History files appear in the History folder.

  3. Page faults appear.

  4. Access to frequently accessed Web pages is slow.

a, b, and c are correct. d is incorrect because a full temporary internet files folder would imply that frequently accessed web pages are cached.

2.

Match the type of cookie on the left with its description on the right.

1. Persistent

a) These cookies are sent to a computer from the website being viewed. They can be persistent or temporary and are generally harmless.

2. Temporary

b) These cookies are sent to a computer from a website not currently being viewed. They generally come from advertisers on the website being viewed for the purpose of tracking Web page use for advertising and marketing purposes. They can be persistent or temporary, and most of these cookies are blocked by default using the Medium privacy setting.

3. First-party

c) These cookies are stored on a computer during only a single browsing session and are deleted when Internet Explorer is closed. They are used by websites to determine the client browser, the language, and the screen resolution that are used, and they allow a user to move back and forth among the Web pages at the site without losing previously entered information. If these cookies are disabled, a user will not be able to access a site that requires them.

4. Third-party

d) A temporary cookie that is deleted from a computer when Internet Explorer is closed.

5. Session

e) These cookies remain on a computer even when Internet Explorer is closed, the user has disconnected from the Internet, or the computer has been turned off. These cookies store information such as logon name, password, e-mail address, color schemes, purchasing history, and other preferences, so that when a site is revisited, this information is available and can be applied.

1. e. 2. c. 3. a. 4. b. 5. d.

3.

Company policy requires that all cookies saved to a user’s computer must have a compact privacy policy that conforms to P3P standards. No cookies shall be saved if they do not conform. Which of the following default privacy settings can be used? (Select all that apply.)

  1. Accept All Cookies

  2. Low

  3. Medium

  4. Medium-High

  5. High

  6. Block All Cookies

e is the correct answer. the other settings do not require cookies to conform to p3p requirements.

Answers

1.

A, B, and C are correct. D is incorrect because a full Temporary Internet Files folder would imply that frequently accessed Web pages are cached.

2.

1. e. 2. c. 3. a. 4. b. 5. d.

3.

E is the correct answer. The other settings do not require cookies to conform to P3P requirements.

Lesson 3 Review

Page 5-45

1.

A company has placed a computer in a break room so that users can access it on their lunch and coffee breaks. How should the computer be configured? Choose all that apply.

  1. Disable AutoComplete.

  2. Clear forms and clear passwords from the AutoComplete Settings dialog box.

  3. Disable Personalized Favorites.

  4. Set privacy settings to block all cookies.

  5. Configure a custom level for the Internet zone to disable the installation of desktop icons.

a, b, and e are correct. disabling autocomplete and clearing autocomplete settings protect users from others obtaining their user names and passwords. disabling the installation of desktop icons keeps the desktop clean. c is incorrect because the way in which the favorites list appears is not a security issue; d is incorrect because blocking all cookies will make many websites nonfunctional.

2.

You need to configure a security setting for the Internet zone for users who access websites from a computer located in the company’s lunchroom. Network administrators have configured Group Policy, physically secured the computer, and performed similar tasks and have asked you to configure a security level for the Internet zone that will apply the following rules by default:

  1. DisableDownload unsigned ActiveX controls; initialize and script ActiveX controls not marked as safe.

  2. EnableRun ActiveX controls and plug-ins; script ActiveX controls marked safe for scripting.

  3. PromptDownload signed ActiveX controls; install desktop items.

Which security level offers these default settings for the Internet zone?

the high security level offers the desired settings. on the security tab of the internet options dialog box, select the internet zone, click default levels, and set the slider to high.

Answers

1.

A, B, and E are correct. Disabling AutoComplete and clearing AutoComplete settings protect users from others obtaining their user names and passwords. Disabling the installation of desktop icons keeps the desktop clean. C is incorrect because the way in which the Favorites list appears is not a security issue; D is incorrect because blocking all cookies will make many websites nonfunctional.

2.

The High security level offers the desired settings. On the Security tab of the Internet Options dialog box, select the Internet zone, click Default Levels, and set the slider to High.

Case Scenario Exercises: Scenario 5.1

Page 5-46

1.

All computers in your office have recently been upgraded from Microsoft Windows 98 to Windows XP. A clean installation was performed on each computer, and all service packs were installed. The installation went smoothly. However, the stockbrokers in your office are complaining that they are not getting up-to-date quotes when they visit their favorite, frequently viewed websites. They have been accessing these sites for two years without incident. What is most likely wrong, and how can this problem be resolved?

  1. The application the stockbrokers use to get stock quotes is not compatible with Windows XP and needs to be replaced with a newer version.

  2. The Temporary Internet Files folder is full and needs to be emptied.

  3. The settings for the temporary files need to be changed to check for newer versions of stored pages every time the page is visited.

  4. The Temporary Files folder was moved during the upgrade, and Internet Explorer does not know where to store temporary files and therefore is not saving any.

c is the correct answer. by default, temporary files are configured to look for newer versions of pages automatically, which is not as often as the stockbrokers need. a is incorrect because incompatible software would have been reported by windows xp during the upgrade. the scenario states that the upgrade went smoothly. b is incorrect because, although a full temporary internet files folder could cause problems, it would not cause problems on multiple computers at the same time. d is incorrect because the temporary files folder is accessible after a clean installation.

Answers

1.

C is the correct answer. By default, temporary files are configured to look for newer versions of pages automatically, which is not as often as the stockbrokers need. A is incorrect because incompatible software would have been reported by Windows XP during the upgrade. The scenario states that the upgrade went smoothly. B is incorrect because, although a full Temporary Internet Files folder could cause problems, it would not cause problems on multiple computers at the same time. D is incorrect because the Temporary Files folder is accessible after a clean installation.

Case Scenario Exercises: Scenario 5.2

Page 5-47

1.

A user reports that each time she accesses a particular website, she is inundated with content that she does not want to see, and she thinks this might have to do with ActiveX, Java applets, or scripts running on the site. The user reports that the site takes a long time to load, too. She wants to visit this site and read only the data; she has no interest in the other items on the site. You need to make this site available without making any changes to the default settings for the Internet zone. What should you do?

  1. Add this site to the Local Intranet zone.

  2. Add this site to the Trusted Sites zone.

  3. Add this site to the Restricted Sites zone.

c is the correct answer. adding sites to the restricted sites zone disables features such as activex controls and java. a and b are incorrect because these zones do not restrict websites but instead do just the opposite.

Answers

1.

C is the correct answer. Adding sites to the Restricted Sites zone disables features such as ActiveX controls and Java. A and B are incorrect because these zones do not restrict websites but instead do just the opposite.

Troubleshooting Lab

Page 5-47

1.

You are working for a company that provides computer support for several small businesses. You get a call from a user who complains that she tries to send an e-mail message from within Internet Explorer; it creates a new message using Outlook Express. However, she uses Outlook as her e-mail software. She would like you to configure Internet Explorer so that she can create a message using Outlook. After talking with her for a few more minutes, you also find that she would like the following programs to be configured to work within Internet Explorer:

  1. HTML editor: Notepad

  2. E-mail client: Hotmail

  3. Newsgroup reader: Outlook Express

  4. Internet call: NetMeeting

  5. Calendar: Microsoft Office Outlook

  6. Contact list: Address Book

How would you configure these programs within Internet Explorer?

you should configure these programs on the programs tab of the internet options dialog box, shown in figure 5-13 . use the programs tab of the internet options dialog box to configure the programs used by internet explorer.

Answers

1.

You should configure these programs on the Programs tab of the Internet Options dialog box, shown in Figure 5-13.

click to expand
Figure 5-13: Use the Programs tab of the Internet Options dialog box to configure the programs used by Internet Explorer.




McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
McDst Self-Paced Training Kit (Exam 70-272(c) Supporting Users and Troubleshooting Desktop Applications on a[... ]ystem)
ISBN: N/A
EAN: N/A
Year: 2006
Pages: 237

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net