Practice Exam


This element consists of 50 questions that are representative of what you should expect on the actual exam. You will find that the majority of questions here are all multiple choice, with relatively few questions in near-simulation format, because of the limitations of paper testing. Still, this exam should help you determine how prepared you are for the real exam, and provide a good base for what you will still need to review. As you take this exam, treat it as you would the real exam: time yourself (about 90 minutes), and answer each question carefully, marking the ones you wish to go back and double check. You will find the answers and their explanations at the end of the exam.

Once you have taken this exam, remember to load the CD-ROM, and check out our exclusive MeasureUp test engine, which is one of the best on the market. (See Appendix A for more information).

1.

You have been hired as a network consultant for ACO to deploy a custom application and are onsite in Phoenix for two months. Jill, whose office is in Tucson, has a problem when testing the application and wants to show you the error. She uses Windows XP Professional and sends you a Remote Assistance invitation via Windows Messenger. You accept the invitation on your Windows XP Professional laptop but you cannot connect to Jill's PC. You verify that ACO's network does not use a proxy or network address translation (NAT) between the Phoenix and Tucson sites. There is a router on each side of the WAN link. You ping Jill's computer by its IP address, then by the NetBIOS name, and finally by the DNS name, each time successfully. What should you do next?

A.

Call Jill and tell her to right-click My Computer and select Properties. Click the Remote tab and then click Select Remote Users and add your user account.

B.

Call Jill and tell her to right-click My Computer and select Manage, navigate to the Services node, right-click the Remote Desktop Help Session Manager service, and select Start from the shortcut menu.

C.

Call Jill and tell her how to create a Remote Assistance invitation file and to place it on a shared drive to which you have access.

D.

Call the WAN administrator and ask him to enable TCP port 3389 for RDP traffic on both routers.

E.

Call the WAN administrator and ask him to enable TCP port 5060 for Windows Messenger traffic on both routers.


2.

You have been hired as a network consultant by ACO to deploy a dial-up remote access solution that uses smart cards with the strongest possible authentication method. You have obtained smart card readers, installed certification authority (CA) servers, and enrolled the smart cards. You are now configuring the dial-up properties that should be deployed. Which of the following dial-up connection properties should you select? (Choose three.)

A.

Security tabAdvanced (Custom Settings)

B.

Security tabTypical (Recommended Settings)

C.

Security tabTypical (Recommended Settings) and Validate My Identity as Follows: Require Smart Card

D.

Security tabAdvanced (Custom Settings), Settings button, select Use Extensible Authentication Protocol and then choose Smart Card or Other Certificate (Encryption Enabled)

E.

Security tabAdvanced (Custom Settings), Settings button, under Data Encryption select Maximum Strength Encryption (Disconnect if Server Declines)

F.

Security tabAdvanced (Custom Settings), Settings button, select Allow These Protocols, and then select the Microsoft CHAP Version 2 (MS-CHAP v2) check box

G.

Security tabAdvanced (Custom Settings), Settings button, under Data Encryption, select Require Encryption (Disconnect if Server Declines)

H.

Security tabTypical (Recommended Settings), under Validate My Identity as Follows, choose Allow Unsecured Password

I.

Security tabTypical (recommended settings), select Require Data Encryption (Disconnect if None)


3.

You are the enterprise administrator for BillBored's LLC. The company has a single Active Directory forest with two domains. All domain controllers are running Windows Server 2003. There are client computers running Windows 98 Second Edition, Windows NT 4.0, Windows 2000 Professional, and Windows XP Professional. Only domain controllers, web, DHCP, WINS, and DNS servers are configured with static IP addresses. All other computers use DHCP and dynamic DNS. One of the print servers has a print queue problem that you've sent your assistant George to fix. George performs a variety of maintenance activities after fixing the print queue problem. He also determines that one of the RAID array drives has failed. He takes the server down and replaces the drive. He verifies that the equipment is working after bringing it up again after 45 minutes of being offline. Now, users have complained that they cannot connect to the web folders shared by the server. The error received is Network path not found. What do you do to fix the problem?

A.

On the server, run tracert to the client computers.

B.

On each client computer, run tracert to the server computer.

C.

On the server, run nbtstat -Rr.

D.

On each client computer, run ipconfig /flushdns.


4.

Michelle is the system administrator for Acme Plumbing. She performed clean installations of Windows XP Professional on 20 computers that form the Sales workgroup. All Sales computers are configured to require a username and password for logon. Thirty days after the installation, the users in the Sales workgroup report that they cannot log on to their computers. How should Michelle correct this problem?

A.

Use the Windows Product Activation Wizard on all 20 computers to activate Windows XP Professional.

B.

Restart each computer in Safe Mode. Use System Restore, specifying a restore point that was created after the installation of Windows XP Professional.

C.

Restart each computer in Safe Mode, and change the local account policy expiration from 30 days to 0 days.

D.

On each computer, log on as a local administrator and reset the user password at the next logon.


5.

After installing Service Pack 2 (SP2) on a Windows XP Professional on a desktop system, Emily discovers that a critical application does not function correctly. On inquiry, it is found that this application is not compatible with SP2 and will not be updated. Emily decides to uninstall SP2. Which of the following are the best methods for doing this? (Choose three.)

A.

Click Start, Run, type c:\windows\$NtServicePackUninstall$\spuninst\uninst.exe in the Open text box, and click OK.

B.

Click Start, Run, type appwiz.cpl in the Open text box, and click OK. Click to select the Show Updates check box. Click Windows XP Service Pack 2, click Remove, and follow the prompts.

C.

Click Start, Run, type %SystemRoot%\System32\restore\rstrui.exe in the Open text box, and click OK. Click Restore My Computer to an Earlier Time, and then click Next. Click the date that you installed Windows XP SP2, and then click Installed Window XP Service Pack 2 in the Restore Point box. Click Next, and then follow the instructions on the screen to remove Windows XP SP2.

D.

Use the Recovery Console.


6.

You are the network administrator for Babble On, a cellular telephone company. The sales department staff members all use laptop computers with local user accounts. One user brings his laptop to you for maintenance. This user has a local profile and uses EFS to encrypt the files on the hard drive. You back up the laptop and perform the maintenance. After the maintenance is complete, you discover that a practical joke played on you by one of your coworkers has caused your maintenance batch file to delete the user's profile. When the user logs on, he cannot access his encrypted files. What do you do? (Choose two. Each answer represents a complete solution.)

A.

Use Windows Backup to restore the user's profile, and make certain to include the RSA folder.

B.

Use the cipher /k command to create a new encryption key for the user.

C.

Use the data recovery agent to decrypt the documents, and then allow the user to re-encrypt the documents.

D.

Add a .NET Passport to the user's new account.


7.

You have been hired to manage the network as a consultant for Gems Bakery, a small catering business. The company's network consists of seven Windows XP professional computers, five of which are laptops. You have configured one of the desktop computers named GEMS1A to be directly connected to the Internet via a cable modem. Its other adapter is connected to a wireless access point. All other computers are connected to the wireless network. You have been called into the office twice recently because users have not had access to the Internet. Each time, you discovered that the workstation connected to the cable modem had been shut down. What can you do to fix this problem? (Choose two. Each item is part of the solution.)

A.

Open the Group Policy Editor and point to Local Computer Policy\User Configuration\Administrative Templates\Start Menu and Taskbar. Enable the Remove and Prevent Access to the Shut Down Command policy.

B.

Open the Group Policy Editor and point to Local Computer Policy\User Configuration\Administrative Templates\Start Menu and Taskbar. Enable the Remove Logoff on the Start Menu policy.

C.

Open Control Panel User Accounts applet. Click Change an Account.

D.

Open Control Panel User Accounts applet. Click Change the Way Users Log On or Off.


8.

You are a network administrator for DandyLyon, a large clothing manufacturer. The company's Windows 2003 Active Directory contains a single domain named dandylyon.local. Geri calls to report that her computer is not working. You determine that the computer has had a hard disk failure. Geri decides to order a new computer and returns the failed computer for you to re-use elsewhere on the network. When the new computer arrives, Geri installs Windows XP Professional, using all the default responses. Geri calls you when the computer is online and tells you that whenever she tries to connect to her My Documents folder on the network server, she receives a message Error 5: Access is denied. How can you fix Geri's computer?

A.

Right-click My Computer and select Manage. Select Disk Management. Right-click the C: partition and change the disk from a basic disk to dynamic disk.

B.

Right-click My Computer and select Properties. Click the Computer Name tab. Click the Change button. Click Domain and type dandylyon.local.

C.

Right-click My Network Places and select Properties. Right-click the LAN network connection and select Repair from the shortcut menu.

D.

Right-click My Network Places and select Properties. Right-click the LAN network connection and select Properties from the shortcut menu. Click Internet Protocol (TCP/IP) and then click the Properties button. Select Obtain IP Address Automatically.


9.

You are the desktop administrator for DandyLyon, a clothing manufacturer. You have a single domain Windows 2003 Active Directory network consisting of 2000 computers. The wholesale distribution department uses portable laptop computers, which are all members of the domain. The majority of the wholesale distribution department connects to the Internet from their homes in the evening, using the same network adapter that they use to connect to the DandyLyon network. Two users in the wholesale departmentTerrell and Jorenhave created personal document libraries of sales data and sales document templates. They have configured their laptops for File and Printer Sharing, and they have shared the folders granting the Everyone group Full Control rights to the files. The file systems on their hard disks are formatted with NTFS. They have granted the NT Authority\Authenticated Users special group the List Folder Contents, Execute File, and Read permissions. However, both Terrell and Joren report that none of their coworkers can connect to the shared folders. What can you do?

A.

On both laptop computers, right-click the LAN connection icons in the Control Panel applet for Network Connections and then select Bridge Connections from the shortcut menu.

B.

On both laptop computers, right-click the LAN connection icons in the Control Panel applet for Network Connections and then select Repair from the shortcut menu.

C.

On Terrell's laptop computer, right-click My Computer and select Manage. Click the Action menu and select Connect to Another Computer. Select Joren's laptop. Click Shared Folders.

D.

On both laptop computers, open My Network Places. Click View Network Connections in the Network Tasks pane. In the Network Connections window, click Change Windows Firewall Settings in the Network Tasks pane. Click the Exceptions tab.

E.

On both laptop computers, open the Group Policy Editor and select Local Computer Policy. Enable the Prohibit Use of Internet Connection Firewall on Your DNS Domain Network policy.

F.

On both laptop computers, open the Group Policy Editor and select Local Computer Policy. Enable the Prohibit TCP/IP Advanced Configuration policy.


10.

You have been hired to complete the Windows XP Professional desktop deployment for Loofah, a company that sells home improvement products. Loofah has a network that consists of an Active Directory forest with two domains. There is a legacy Windows NT 4.0 domain on the network. Desktop computers range from Windows 98 to Windows XP Professional, all of which have been installed without a standard configuration and many that have different power management features. Their business objectives are

  1. Reduce help desk and administration costs.

  2. Create an installation process to reduce inconsistencies.

  3. Upgrade the computers. Do not format the hard disks.

Which of the following installation methods is best to achieve Loofah's business objectives?

A.

Use Setup Manager to create an answer file, create an administrative installation point, and run the installation from a DOS boot floppy with the command WINNT /UDF:unattend.txt /S.

B.

Use Setup Manager to create an answer file, create an administrative installation point, and run the installation from the existing operating system with the command WINNT32 /unattend:unattend.txt /S.

C.

Use Sysprep to prepare the computer image. Deploy the image to all computers using a cloning tool.

D.

Use Riprep to prepare the computer image. Deploy the image to all computers using a boot floppy disk created with Rbfg.exe.


11.

You have completed your deployment of Windows XP Professional at Loofah. During the deployment, you identified 28 computers that could not be upgraded because of hardware incompatibilities. All these computers were running Windows 98 Second Edition. The president asks whether you can move the information from the old computers to new ones that he has just purchased. Which of the following tools is best used for this project?

A.

User State Migration Tool

B.

Files and Settings Transfer Wizard

C.

RIS

D.

Sysprep


12.

You have been called back to Loofah for a security consultation. Several computers in Loofah's library have been used to log on to the network when a domain controller wasn't available to them. They still were able to authenticate and use shared resources on member servers. The president now requests that you require all desktop computers and servers to allow a logon only if a domain controller is available, except for laptop computers used outside the network. The domain name is Loofah.loofah.com. All desktop computers are contained in an OU called PCs. Which of the following do you perform? (Choose two. Each answer presents part of the solution.)

A.

Create a GPO for the loofah.loofah.com domain.

B.

Create a GPO for the PCs OU.

C.

Create a GPO for Laptops and move all laptops to a new OU below the PCs OU.

D.

Create a GPO for Desktops and move all desktop computers to a new OU (named Desktops) below the PCs OU.

E.

In the GPO, configure the Interactive Logon: Number of Previous Logons to Cache (in Case Domain Controller Is Not Available) policy and set the number to 0.

F.

In the GPO, enable the Interactive Logon: Require Domain Controller Authentication to Unlock Workstation policy.

G.

In the GPO, enable the Network Access: Do Not Allow Anonymous Enumeration of SAM Accounts policy.


13.

Loofah has expanded into a new line. To keep up with the demand for the new products, Loofah has decided to open a new branch office. The branch office will consist of 32 users, 12 laptop computers, and 20 desktop computers. Your network has a security requirement to require domain controller authentication when users log on to the network on desktop computers at the main office. All desktop and laptop computers are moved from the main office to the branch office. There will not be a server on site and users will need to connect to each other's desktop shared folders. Some users who have desktop computers attempt to log on to the network and they receive an error that says The system cannot log you on now because the domain loofah.loofah.com is not available. Laptop users are able to log on without any problem. What actions can you take to ensure that users can log on to the network regardless of whether they use a laptop or desktop? (Choose two. Each answer represents a complete solution.)

A.

Open the Control Panel User Accounts applet. Click Change the Way Users Log On or Off.

B.

Move the branch's desktop computers into their own OU that will not receive the same GPO applied to their former OU.

C.

Install a Windows Server 2003 server at the new site and then run the Dcpromo utility to promote it to a domain controller.

D.

Right-click the My Computer icon on each user's desktop and select Properties. Click the Remote tab and select the Allow Remote Assistance Invitations to be Sent from This Computer check box.


14.

You are a help desk administrator for Crankshaft Software. Twila calls with a problem. Several of her files have been deleted from a shared folder on her Windows XP Professional computer and she has had to retrieve the data from backup. Twila wants to know how she can find out who has been deleting the files. You tell Twila to open the Local Security Policy icon in Administrative Tools under the Performance and Maintenance category of Control Panel. Then you help her navigate to the Audit Policy container, which is shown in the exhibit. Which policy do you tell her to enable? To answer this question, select the correct policy from the exhibit.

15.

You manage the desktop computers for GEMS Bakery, a small catering company that has a workgroup network consisting of seven Windows XP Professional computers. Beth, one of the administrators, has expressed an interest in taking on some of the network administration duties. You make Beth's local user account a member of the Power Users group on each of the computers on the network. Beth calls you after reading a magazine article about being able to audit file and folder usage in Windows XP Professional. She tried to establish auditing on her own computer to see how it worked, but was unable to specify any of the audit settings on one of her shared folders. Which of the following should you tell Beth to do?

A.

Open the Local Security Policy and under Audit Policy, enable the Audit Object Access policy.

B.

Open the Local Computer Policy with the Group Policy Editor, and under User Rights Assignment, enable the Create Global Objects policy.

C.

Open the Local Security Policy and under Audit Policy, enable Audit Privilege Use.

D.

Open the Local Computer Policy with the Group Policy Editor and under Security Options, enable Audit: Audit the Access of Global System Objects.


16.

You are the network administrator for Dynamo Entertainment, a resort management company. One of the new resorts is under construction. At the construction site, you have a four-computer workgroup configured inside a trailer. The workgroup connects to your network via dial-up shared by one of the Windows XP Professional desktop computers. Joe scans in several detailed documents regarding the architectural structure of the new resort buildings. He calls you to ask whether there is a way to reduce the space that these files are taking up on his desktop hard disk. You guide Joe through the process of configuring the advanced attributes for the folder where he has placed these large documents, but Joe tells you that the option to compress is grayed out. What should you advise Joe to do?

A.

Purchase an external hard drive or removable media drive and store the data on the new hardware.

B.

Encrypt the files on his hard disk using EFS.

C.

Convert the file system to FAT32.

D.

Convert the file system to NTFS.


17.

You are the network administrator for Oil of AlaskaYukon, a company that speculates for oil drilling. A team of employees is working at a promising site in the Yukon territory. They have a single telephone line available to the seven computers. Each Windows XP Professional computer is configured with a network adapter, a modem, and a static IP address because you don't have a DHCP server available, and you have provided the team with a hub. The team requires access to e-mail simultaneously and they want to somehow be able to all connect to the phone line simultaneously. Which of the following should you do to help the team out? (Choose all that apply. Each answer presents part of the solution.)

A.

Install a router that performs NAT.

B.

Reconfigure each network adapter to use DHCP except for the computer that is connected to the modem.

C.

Configure ICS on one computer.

D.

Configure ICF (or Windows Firewall after SP2 is installed) on all the computers.

E.

Configure ICS on all of the computers.

F.

Reconfigure the modem connection properties to use a static IP address.

G.

Right-click each computer's LAN connection and select Bridge Connections from the shortcut menu.


18.

You are a network administrator for Salty Dogs, LLC. The company has a research and development division consisting of 20 users. Each of these users runs Windows XP Professional as a member of the Active Directory domain that is designated for research. Users are all members of the production domain. The president of Salty Dogs, without your knowledge, hired Jack Hacker to test the perimeter security of your network. Jack was able to penetrate shared folders on the development division's workstation hard disks. Which of the following can you do to enhance the security for the network? (Choose three. Each answer presents part of the solution.)

A.

Enable the group policy to require smart cards for logon.

B.

Install a CA and, using the User or Basic EFS templates, create file encryption and data recovery agent certificates.

C.

Open the Group Policy Editor and enable the Cipher All Non-system Data policy for the Research domain.

D.

From the command prompt, execute the command cipher /d sharepath for each research division shared folder from the owner's logon (either logging on as the user or using the Run As option).

E.

Use self-signed certificates to implement encryption.

F.

From the command prompt, execute the command cipher /e sharepath for each research division shared folder from the owner's logon.

G.

From the newly encrypted shared folder, add the certificates for the other users who should have access to the encrypted files.


19.

You are the network administrator for Salty Dogs, LLC. The company's Design Director, Suzanne, uses a portable laptop computer that has been installed with Windows XP Professional slipstreamed with SP2. Your company requires that all users use smart cards to access company resources. You have therefore provided Suzanne with a portable smart card reader. Company policy also requires that all users connect with the highest level of security possible when using an Internet, VPN, or modem link. You are now creating the modem connection for Suzanne to dial into the network. Which of the following options must you select from the remote connection dialog screens?

A.

Select the Allow These Protocols option under Advanced, and then make certain that MS-CHAP and PAP are selected.

B.

Select the Use Extensible Authentication Protocol (EAP) option, and then select Smart Card or Other Certificate from the drop-down list.

C.

Select the Typical (Recommended Settings) option.

D.

Select the Require Data Encryption option.


20.

You have configured your Windows XP Professional computer with the driver signing options shown in the exhibit. Amy logs on to your computer and she browses the Internet. A pop-up notification tells her that she may have spyware installed and that the only way to disable the spyware is to download a new program to monitor the hard disk. Amy clicks the Yes option. The program does not install. When Amy performs this same sequence of commands at another computer, the program installs. What will Amy see if she uses msinfo32 to look at the driver files? (Choose all that apply.)

A.

She will see Not Available under the Signed column.

B.

She will see No under the Signed column.

C.

She will see Yes under the Signed column and the name of the software publisher will be Microsoft Windows Publisher.

D.

She will see nothing. Msinfo32 does not show hardware information.


21.

You have been hired to monitor Internet usage for GEMS Bakery. One of the bakers has attempted to download a recipe file using File Transfer Protocol (FTP). He enters the command ftp://ftp.wildandwoolyrecipes.com in the Address field of Internet Explorer. He receives a message that says The password was rejected. The baker has a user ID (BakeMeACake) and password (AndFoldIt99); however, Internet Explorer never asks for the password. Which of the following commands can the baker use in Internet Explorer to access the FTP site and download the recipe?

A.

ftp://ftp.wildandwoolyreceipes.com/BakeMeACake

B.

ftp://ftp.wildandwoolyrecipes.com/AndFoldIt99

C.

ftp://ftp.wildandwoolyrecipes.com@BakeMeACake:AndFoldIt99

D.

ftp://BakeMeACake:AndFoldIt99@ftp.wildandwoolyrecipes.com


22.

You are a help desk administrator for Graders, Inc., a corporation that creates educational materials for university-level courses. Your network consists of a single Active Directory forest that consists of four different domains. You have 1000 users and computers. The desktop workstations run Windows XP Professional. You have had several requests from users to help with a troublesome application named APP1. The errors that occur vary, and you must be able to know in which dialog screen they take place to offer the appropriate corrective measures to the user. It is a standard setting on all Windows XP computers to allow users to initiate Remote Assistance requests. Those users who have been able to initiate Remote Assistance requests have an average time to completion of the call of less than one minute. The users who have difficulty initiating Remote Assistance requests have an average time to completion of the call of seven minutes. Your manager has asked if you have suggestions on how to reduce the time for these types of calls. Which of the following actions do you suggest?

A.

Open the Group Policy Editor for the domain GPO. Navigate to Local Policies\Security Options. Double-click Network Access: Sharing and Security Model for Local Accounts policy in the right pane. Enable the Classic: Local Users Authenticate as Themselves policy.

B.

Right-click My Computer and select Properties. Click the Remote tab. Select the Allow Remote Assistance Invitations to Be Sent from This Computer check box.

C.

Open the Group Policy Editor for the domain GPO. Enable the Computer Configuration\Administrative Templates\System\Remote Assistance\Offer Remote Assistance policy. Select the Allow Helpers to Remotely Control the Computer option in the Permit Remote Control of This Computer list.

D.

Open the Windows Firewall applet in Control Panel. Click the Exceptions tab and select the Remote Assistance check box.


23.

You have been called to help with a problem computer, named WinXP1. Your network consists of two subnets, Subnet A and Subnet B, as shown in the network exhibit. WinXP1 is located on Subnet A. A terminal server named TERM1.domain.com is located on Subnet B. The computer receives an error when it attempts to initiate a Remote Desktop connection to TERM1. The computer does not have any problems connecting to servers and printers on Subnet A.

Network exhibit.

You run Ipconfig on WinXP1. You receive the output displayed in the IP exhibit.

IP exhibit.

What is the error related to and what must you configure to fix the error?

A.

This is a DNS error. In the Remote Desktop Connection dialog box, use the IP address of 192.168.1.88 rather than the name TERM1.

B.

This is a WINS error. In the Remote Desktop connection dialog box, use the IP address of 192.168.1.88 rather than the name TERM1.

C.

This is an IP configuration error on the router. Change the subnet mask on the router's interface connected to Subnet A to 255.255.255.240.

D.

This is an IP configuration error on the WinXP1 computer. Change the default gateway address to 192.168.0.1.


24.

You are a help desk administrator for your company. Ed calls you and asks for help in connecting to an intranet website shared by Robert's computer, EINSTEIN8. You open IIS Admin and you connect to EINSTEIN8. You right-click Default Web Site and select Properties. You receive the information displayed in the exhibit.

What do you tell Ed to do?

A.

Type http://192.168.0.88:81 in Internet Explorer.

B.

Type https://192.168.0.88 in Internet Explorer.

C.

Type http://192.168.0.88 in Internet Explorer.

D.

Type file://192.168.0.88:81 in Internet Explorer.


25.

You are using RIS to install Windows XP Professional on a new computer. The RIS image you select matches your computer's configuration exactly. Your computer uses a SCSI hard disk with 20GB of free disk space, a PXE-capable network interface card, 512MB RAM, a single Pentium 4 processor, an ACPI-compliant BIOS, and two Super-VGA compatible video adapters. You have already booted up the computer with its default operating system of Windows 2000 Professional as it was delivered by the manufacturer, and it has checked out fine. You are able to begin the installation, but during the early stages of installation you receive an error that states that no hard drive is available. What can you do to fix the computer?

A.

Roll back the video drivers.

B.

Press the F6 button to select the correct SCSI driver provided by the manufacturer.

C.

Press the F5 button to select a HAL that is ACPI compliant.

D.

Terminate the SCSI adapter.


26.

You are a user who works for a large corporation. Your company is in the process of deploying Windows XP Professional to all the networked computers. The company has purchased volume licensing for this project. You have decided to install the operating system for your entire department by yourself rather than wait for your department's slated install date. You do not have access rights to the installation point on the network, so you bring in your home computer's copy of Windows XP Professional. When you run the installation, you use the product activation key that was announced for the volume licensing project. You receive an error. Which of the following actions can you take to fix the error?

A.

Cancel Setup and request access to the network installation files.

B.

Perform the unattended installation command, using the media and the command winnt32 /unattend:unattend.txt /s.

C.

Use the retail product key on each of the computers in your department.

D.

Request a new retail CD because it is damaged.


27.

You have been hired to deploy Windows XP Professional to all the computers in a company with 500 desktops. The company provides a lab for research and development, which, because of its security settings, cannot be connected to the production network. You have performed the unattended installation on identical hardware from a network share for other computers by using the command winnt /u:myfile.txt /s. For the lab computers, you need to deploy Windows XP Professional, using the CD media. What must you do to ensure that the unattended installation completes properly?

A.

Place the answer file on a floppy disk and rename it Winnt.sif.

B.

Place the answer file on a floppy disk and rename it Unattend.txt.

C.

Place the answer file on a floppy disk and retain the name Myfile.txt.

D.

Place the answer file on a floppy disk and run the command winnt32 /unattend:myfile.txt /s.


28.

You are a network administrator for your company. The sales department often works while traveling. All sales associates have been provided with laptop computers, Internet access, and VPN connections. All sales associates routinely use offline files to be able to work when not connected to the network. All are members of the Domain Users group in your forest and have cached credentials enabled. You have a user who has installed a second hard disk in his laptop. His C: partition contains his offline files. You have used a utility to migrate the offline files to the new D: partition, which has been formatted with NTFS. The user reports that even though the Synchronization Manager tells him that offline files have been synchronized, he has not received any updates. What should you do?

A.

Convert the file system on the new partition to FAT32.

B.

Use the Disk Management utility to change the new hard disk to a dynamic disk from a basic disk.

C.

In My Computer, right-click the new disk and select Sharing and Security, select the Security tab, modify the permissions on the new disk, and grant the Users group Write permissions for the folder, files, and all subfolders.

D.

In My Computer, right-click the new disk and select Sharing and Security, select the Security tab, modify the permissions on the new disk, and grant the Domain Users group Write permissions for the folder, files, and all subfolders.


29.

You are the help desk administrator for your company. You have been notified that a new application named MOV has been deployed to Windows XP Professional computers in the HR department. Soon, users in HR call to report problems with MOV. They tell you that when they attempt to run MOV, the image on their computer screens becomes garbled. Several users report that the rest of the screen is fine but the MOV window is completely black. Which of the following should you instruct the users to do?

A.

Right-click the desktop and select Properties. In the Settings tab, click Advanced. Select the Monitor tab and then change the screen refresh rate to a lower mode.

B.

Right-click the desktop and select Properties. In the Appearance tab, click the Effects tab and clear the Show Window Contents While Dragging check box.

C.

Right-click the MOV application's executable file mov.exe and select Run As. Then select the local Administrator account.

D.

Right-click the MOV application's executable file mov.exe and select Properties. Click the Compatibility tab, and under Display Settings select the Run in 256 Colors check box.


30.

You are the New Yorkbased network administrator for BillBoreds, an advertising corporation with international locations. A sales associate named Lana works offsite and at various office locations around the world. She has been given a laptop computer configured with Windows XP Professional. Whenever Lana starts up her laptop computer, she is prompted to select a profile that is Docked or Undocked. Lana never uses a docking station. However, many other users do have docking stations for laptops and you often move computers to different users depending on other changes. How should you modify Lana's laptop configuration? (Choose two. Each answer represents a complete solution.)

A.

Update the BIOS to the latest version and, in the BIOS, disable the docking station options.

B.

Right-click My Computer and select Manage. In the Removable Storage utility, delete the Docking Station library.

C.

Right-click My Computer and select Properties. On the Hardware tab click Hardware Profiles. Select the Undocked profile and click Properties. Clear the Always Include This Profile as an Option when Windows Starts check box.

D.

Right-click My Computer and select Properties. On the Hardware tab click Hardware Profiles. Select the Docked profile and click Properties. Clear the Always Include This Profile as an Option when Windows Starts check box.

E.

Right-click My Computer and select Properties. On the Hardware tab click Hardware Profiles. Select the Docked profile and click Delete.

F.

Right-click My Computer and select Properties. On the Hardware tab click Hardware Profiles. Select the Undocked profile and move it so that it is the first option in the list. Click the Select the First Profile Listed if I Don't Select a Profile In option, and then change the value to 0 seconds in the drop-down list.


31.

You have been hired by BillBoreds to deploy Windows XP Professional to 300 new laptop computers. These laptop computers will replace 300 desktop computers already in use. The desktop computers will then have their hard disks repartitioned, formatted, and reinstalled to be placed in the TeleCenter for use by the telemarketing group. One of the objectives that you have been given is to transfer the files and settings from the old computers to the new laptops before the data is destroyed. Which of the following steps must you perform? (Choose two. Each answer presents part of the solution.)

A.

On the desktop computers, run Sysprep to gather information.

B.

On the laptop computers, run a third-party cloning software to deploy the image gathered with Sysprep.

C.

On the desktop computers, run Scanstate to gather information.

D.

On the laptop computers, run Loadstate to copy the data gathered with Scanstate.


32.

You are the network administrator for your company. You have hired a network technician to deploy Windows XP Professional throughout the network. You have a network installation point at \\SERVER\SHARE, an Active Directory domain named DOMAIN.Forest.Local, and have configured the default groups in Active Directory to include access to proprietary company data that should never be disclosed to outside persons. You need to provide the technician with sufficient rights to deploy the operating system, but you do not want to grant access to the proprietary data. How do you configure the new technician's account, which you have named TECH? (Choose all that apply. Each answer presents part of the solution.)

A.

Create a domain local group called DEPLOY LOCAL and place TECH into DEPLOY LOCAL.

B.

Create a global group called DEPLOY GLOBAL and place TECH into DEPLOY GLOBAL.

C.

Create a domain local group called DEPLOY LOCAL and place the new global group DEPLOY GLOBAL into DEPLOY LOCAL.

D.

Create a global group called DEPLOY GLOBAL and place the new domain local group DEPLOY LOCAL into DEPLOY GLOBAL.

E.

Grant the permission to add workstations to the domain found in the Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment container to the DEPLOY LOCAL group in the Domain Controller Group Policy.

F.

Grant the Read & Execute, List Folder Contents, and Read permissions to \\SERVER\SHARE to DEPLOY GLOBAL.

G.

Grant the Read & Execute, List Folder Contents, and Read permissions to \\SERVER\SHARE to DEPLOY LOCAL.


33.

You are a help desk associate for Help Desks, Inc. One of your client companies has notified you that it has deployed a new application named APP, which uses the executable App.exe, to its legal department. A few days later, a legal department user named Joe calls. Joe says that every computer in the department runs at a snail's pace when they try to use the Reports function in APP. You discover that the Reports function is actually a separate executable, Rpts.exe, that has its own Start menu shortcut. When a report is requested, it takes several minutes to several hours to compile the report and notify the user that it is ready. The legal department wants to fix the slow response of their other applications, but they also want to retain APP and its Reports function. What should you tell Joe?

A.

Configure the Performance settings of the System applet so that it is optimized for background services.

B.

Configure the Performance settings of the System applet so that it is optimized for system cache memory.

C.

Edit the Start menu shortcut properties for APP so that it reads Start App.exe /Realtime.

D.

Edit the Start menu shortcut properties for Reports so that it reads Start Rpts.exe /Low.

E.

Edit the Start menu shortcut properties for APP so that it reads Start Rpts.exe /Min.


34.

You are the desktop administrator for an architectural firm. One of the staff architects, Kim, routinely saves large graphics and CAD files to the C:\Documents and Settings\My Documents\CAD folder on the hard disk of her Windows XP Professional computer. The computer has slowed considerably since it was first deployed as an upgrade from Windows Me, and now Kim receives errors that there is not enough memory to run some of her applications. You look at the computer and determine that Kim has run out of space on the hard disk. Based on the files and storage needs, you add three hard disks to Kim's computer. The disks are each 100GB in size. You configure these in Disk Management as dynamic disks in a striped volume. One of Kim's applications is hard-configured to save all files to Kim's CAD folder by default, and it automatically places temporary files in the same folder. What can you do to ensure that Kim can use the CAD folder and not run out of disk space? (Choose three. Each answer presents part of the solution.)

A.

Convert the file system of the C: drive to NTFS.

B.

Back up the files and settings by using the Files and Settings Transfer Wizard, format drive C: with FAT32, reinstall Windows XP as a clean installation, and redeploy the CAD application to point it at drive D:.

C.

Convert the file system of the C: drive to FAT32.

D.

Convert the C: disk partition to a dynamic disk.

E.

Mount the new striped volume to the C:\Documents and Settings\My Documents\CAD folder, using Disk Management.

F.

Move the files out of the C:\Documents and Settings\My Documents\CAD folder.

G.

Extend the C: disk to include the striped volume.


35.

You work as a tax preparer for Taxes in Texas LLC with another tax preparer named Jack. Both you and Jack have Windows XP Professional computers that are connected to an Ethernet hub. Jack's computer is linked to a high-speed laser print device. Jack wants to share the print device and make certain you can manage your own print jobs. He does not want Chloe, a staff person, to have access to the printer. Both you and Chloe are members of the TAX local group that grants access to client accounts, which you both need to do. How should Jack configure sharing?

A.

Jack should remove Chloe from the TAX local group and grant the AllowManage Documents and AllowPrint Printers permissions to TAX.

B.

Jack should create a new local group named TAXPREP, add your account as a member, and then grant the AllowManage Documents and AllowPrint Printers permissions to TAXPREP.

C.

Jack should create a new local group named TAXPREP and make it a member of TAX. Jack should then grant AllowPrint Documents and AllowPrint Printers permissions to TAX.

D.

Jack should create a new local group named TAXPREP and move your account to TAXPREP (Removing it from TAX). Then Jack should grant AllowPrint Documents and AllowPrint Printers permissions to TAXPREP.


36.

You are the network administrator for Taxes in Texas. You have several locations, each with three to seven users. The president of the company has asked you to deploy Windows XP Professional on each computer in each site. For your installation at the first location, you use media that you purchased at the local computer store. After 30 days, users report that their computers are not allowing them to log on. What should you do?

A.

Reset each user's password.

B.

Edit the Account Lockout policy.

C.

Run the Windows Product Activation Wizard on each computer.

D.

Use ASR to return the computers to a functioning state.


37.

You have a Windows XP Professional computer with two hard disks. The C: drive is formatted with NTFS. The D: drive is formatted with NTFS. You have a folder on the D: drive named OLD, which is compressed. You want to move it to the C: drive as a subfolder of C:\NEW, which is encrypted. What will happen when you move the folder? (Choose two. Each answer presents part of the solution.)

A.

The files will be decompressed.

B.

The files will remain compressed.

C.

The files will be encrypted.

D.

The files will remain decrypted.


38.

You are the network administrator for your company. One of the business-critical applications is DATA, which stores its records in files with the extension .dbs. These files have been placed in a shared folder named \\SERVER\USERS. Within this share, users also store their roaming profiles below a folder named with their respective usernames (with explicit NTFS permissions to ensure security on those folders). In the wake of a summer outage of the server hosting this share, many users have made the share and all its subfolders available offline. During this same time period, you have had to restore the .dbs files at least once daily because of corruption. You need to restrict users from making the .dbs files available offline, but enable them to have access to their personal data. In Group Policy, you navigate to Computer Configuration\Administrative Templates\Network\Offline Files and receive the list of policy settings shown in the exhibit. Which policy should you configure to accomplish this task? To answer this question, select the correct policy from the exhibit.

39.

You are a tax preparer for Taxes in Texas. All your computers are configured with Windows XP Professional. Because of recent privacy laws, you cannot allow anyone other than official tax preparers to have access to your tax preparation materials for clients. You store all client files in the CLIENTS folder on your NTFS-formatted C: drive, as do all other tax preparers in your workgroup. You have four staff persons who work in the office. They are in the STAFF group. All tax preparers are in the PREP local group. One of the STAFF group members is also a member of the local Administrators group on each computer. What can you do to configure your system to ensure the privacy laws are met?

A.

Delete all users and groups from your computer.

B.

Configure the PREP group to have full control of the C:\CLIENTS folder.

C.

Run cipher /e on the C:\CLIENTS folder. Add certificates for each tax preparer to the encryption attributes.

D.

Run cipher /d on the C:\CLIENTS folder. Add certificates for the STAFF group.


40.

You are a network administrator for your company. You have a telemarketing group that has high turnover. The telemarketers use the computers to log data in a database, but they do not save files. The telemarketing group often hires people and puts them to work before a separate user ID has even been requested from your group. To accommodate this practice, you have created five telemarketing user accounts: TELE1, TELE2, TELE3, TELE4, and TELE5. The last time a new hire accessed TELE4, the profile was completely changed to some undesirable settings. You want to make certain that these five accounts can be used and that their profiles will not be changed from the one you set. How can you do this?

A.

Create a roaming profile and ensure that it uses the exact settings you want all telemarketers to use.

B.

Configure the roaming profile NTFS permissions so that they provide only Write access to all members of the Users group.

C.

Rename the local profile to Ntuser.man, place it on a shared network location, and point all TELE1 through TELE5 accounts at this location on each user account's profile tab.

D.

Use Group Policy local settings to remove the permission of Access This Computer from the Network for the group Everyone.


41.

You are the network administrator for your company. You use roaming profiles only on the Marketing domain. All Marketing domain servers are formatted with NTFS permissions. You have just migrated a group of users from the Production domain to the Marketing domain. One user reports that it takes much longer to log on to the network now. He saves all his files and folders to the My Documents directory. What can you do to reduce the logon time?

A.

Disable the use of cached credentials on the network.

B.

Require a domain controller's authentication to unlock a workstation.

C.

Change the user's home directory on the Profile tab of the user account so that the My Documents folder is redirected rather than cached and downloaded as part of the profile.

D.

Configure the option to Change the Way Users Log On or Off the Computer.


42.

John installs a new application on his computer. The computer immediately exhibits errors and shuts down with a Stop error. John doesn't know what to do and calls you before he restarts his computer. What do you tell John? (Select the best answer.)

A.

Restart the computer with the Last Known Good Configuration.

B.

Restart the computer in Safe Mode with Networking and then run Chkdsk.

C.

Use the ASR tool to restore the computer.

D.

Restart the computer and edit the Boot.ini file to force the computer to use the /BASEVIDEO switch.


43.

You are helping out with Taxes in Texas and are the local Administrator user on each of the Windows XP Professional computers, which are all members of the TAXinTX workgroup. Joan, one of the tax preparers, has come down with a lengthy illness. She is expected to return in three weeks. While Joan is away, Ray will be taking over her job. You set Ray up as a user on Joan's computer. Ray runs the tax program and tries to open one of the client files. He receives an Access Denied error. How can you help Ray?

A.

Reset Joan's password and rename Joan's account to Ray.

B.

Add a .NET Passport to Joan's user account.

C.

Log on to the computer as the local Administrator and take ownership of the client files. Grant Ray the Full Control permissions for those files.

D.

Back up the data on the computer. Reinstall Windows XP Professional and restore the data.


44.

You are the network administrator for your company. You have configured a new Windows XP Professional desktop computer that will be used to share files for a folder named FOLDER. You have set the NTFS permissions to be as follows:

  • Authenticated Users Allow Read

  • Administrators Allow Full Control

  • Accounting Allow Modify

You have set the Share permissions to be as follows:

  • Everyone Allow Read

  • Accounting Deny Full Control

  • Administrators Allow Full Control

Jack is a member of the Accounting group and the Administrators group. When Jack tries to access FOLDER from another computer on the network, what rights will he have?

A.

Full Control

B.

Modify

C.

Read

D.

None


45.

You are a desktop technician hired to roll out Windows XP Professional to all the computers on the Bland network. One computer is configured with two PCI video adapters that use different drivers. You have decided to use multiple monitors with the computer. The monitors and the adapters are all Plug and Play. When you complete the final installation, you discover that the screen extends across both monitors, but that the left part of the screen is shown on the right monitor and the right part of the screen is displayed in the left monitor. What can you do?

A.

Use the Display Settings applet Settings tab and drag the monitor labeled 1 to the right side of the monitor labeled 2.

B.

Use the Display Settings applet Settings tab. Clear the box next to Extend my Windows desktop onto this monitor with Monitor 2 selected.

C.

Use the Display Settings applet Settings tab. Select Monitor 2 and check the box next to Use This Device as the Primary Monitor.

D.

Use Device Manager and right-click the adapter for Monitor 1 and select Update Driver from the shortcut menu.

E.

Use Device Manager and right-click the adapter for Monitor 2 and select Disable from the shortcut menu.


46.

You are the network administrator for a small company with 100 desktop computers. All computers run Windows XP Professional, which are identically configured with a 20GB hard disk that has been subdivided into three partitions of 4GB each and an 8GB unpartitioned space. Each computer has 256MB of RAM. The system drive is C:, and this partition contains all operating system files and application files. The D: partition contains the paging file and the temporary files. The E: partition contains user files and shared folders. A user calls to report that although he has no trouble using the computer during the day, each morning he starts up the computer and receives an error message that the system is low on virtual memory. What can you do to increase the computer's performance?

A.

Using Disk Management, convert D: to a dynamic disk.

B.

Using Device Manager, clear the Enable Write Caching on the Disk check box on the Policies tab in the disk device's Properties dialog box.

C.

Using the System applet, Advanced tab, configure the settings for Performance so that you increase the initial size of the paging file.

D.

Using the System applet, Advanced tab, configure the settings for Performance so that you optimize performance for background services.


47.

You are the network administrator of a large internetwork. You have a small group of users who will be starting to take their laptops home and working partly through cable Internet connections and partly at work. Your network uses DHCP for all subnets. The cable Internet connections require a static IP address configuration. The test users return after the first day of trying the cable Internet configuration and when they connect to the company's network they are unable to use it. You end up reconfiguring each LAN connection. How do you enable users to be able to use each network without connection errors?

A.

Configure APIPA.

B.

Configure ICS.

C.

Configure the IP address to be the same at work as it is when connected to the cable Internet connection.

D.

Configure an alternate IP configuration.


48.

You have been hired to deploy Windows XP Professional to a network of 50 computers. You have configured an unattended installation process that works when you upgrade a Windows 2000 Professional computer to Windows XP Professional. However, when you attempt to run a clean installation of Windows XP Professional, you fully install the system, and on final reboot you end up with video disruption and an Unknown device driver error. What can you do to fix your installation?

A.

Restart the computer in Safe Mode and use the Rollback feature on the video adapter driver.

B.

Configure the startup sequence to use the /BASEVIDEO switch.

C.

Slipstream SP2 into the installation files.

D.

Restart the computer in Safe Mode and install the Windows 2000 device driver for the video adapter.


49.

You manage the computers for your department, which consists of 30 users. Your manager has decided to replace all the computers in the department and at the same time to deploy a new application. She asks you to install the 30 new computers identically using Windows XP Professional. You are given access rights to the network installation point and a product key for the volume licensing media. You decide to automate the installation. You do not have any third-party tools or additional servers at your disposal, but you are able to implement a clean installation of Windows XP Professional. Which of the following methods do you select?

A.

RIS

B.

Setup Manager

C.

Sysprep

D.

Unattended installation using CD media


50.

You have installed Windows XP Professional on your ACPI-compliant laptop computer. As a photographer working in an advertising firm, you use a digital camera and download photos to your computer. You must be able to keep the computer running while you download files; however, your computer does not detect activity when the camera is connected and downloading photos. Sometimes, it shuts down while the camera is connected. How can you configure the power options on your laptop to ensure that this doesn't happen?

A.

Update the BIOS to an APM version.

B.

Configure the BIOS settings to enable power management features.

C.

Configure the Power Options applet in Control Panel and select the Always On power management scheme.

D.

Using the Hardware Profiles option, configure a new profile for use when conserving battery power. Disable all unnecessary adapters for this profile.




Exam Prep 2. Windows XP Professional
MCSA/MCSE 70-270 Exam Prep 2: Windows XP Professional
ISBN: 0789733633
EAN: 2147483647
Year: 2004
Pages: 193

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net