Term
Your computer runs Windows XP Professional with multiple FAT32- formatted partitions. You install a new disk drive and create a new FAT32-formatted partition. You want to mount the new partition as a folder in drive C. What should you do? Select 2. A. Convert the C partition to NTFS.
B. Upgrade all disks to dynamic disks.
C. From Diskpart set the new partition as Active.
D. From Disk Management modify the drive path of the new partition.
E. Add an entry to the boot.ini file |
|
Definition
-Convert the C partition to NTFS -From Disk Management modify the drive path of the new partition. |
|
|
Term
Your computer has a limited amount of free disk space. What would be the best way to identify the amount of disk space that is used to store the following? - Temporary Internet Files - Files in the Recycle Bin - Downloaded program files List the steps in order: Select 2. A. From the command prompt
B. From Internet Explorer
C. From the System Tools menu
D. view the Internet Options
E. Disk Cleanup
F. run chkdsk.exe |
|
Definition
C. From the System Tools menu E. Disk Cleanup |
|
|
Term
As the help desk technician for ITOF you have been assigned to comply with a new CNO security directive to ensure that all Password.ini files are encrypted. There are 12 users that run a custom application named TestBank with passwords stored in a file named Password.ini. Each Password .ini is unique and by default stored in a folder named C:\Winnt\App1. The location and name of the file can be changed by an administrator, what will you do? Select 5. A. Instruct the user of each computer to open the properties of the C:\Files folder
B. Configure TestBank to use the Passwords.ini file
C. Ask a network administrator to share a new ecrypted folder named PassFiles on a network server
D. Move the Passwords.ini file to the C:\Files folder
E. Tell them to accept the default settings on the Confirm Attributes Changes dialog box
F. Copy the Passwords.ini file to the C:\Files folder
G. Create a folder named C:\Files |
|
Definition
G. Create a folder named C:\Files D. Move the Passwords.ini file to the C:\Files folder A. Instruct the user of each computer to open the properties of the C:\Files folder E. Tell them to accept the default settings on the Confirm Attributes Changes dialog box B. Configure TestBank to use the Passwords.ini file |
|
|
Term
Jessica’s computer runs Windows XP Professional. She uses Microsoft Outlook Express to download e-mail messages. She needs to copy all of her e-mail messages, Outlook Express settings, and Internet Explorer settings to a new computer that runs Windows XP Professional. List in order the two steps you would use to make sure that Jessica’s settings were copied correctly to her new computer. Select 2. A. Copy all *.dbx files from her old computer to her new computer
B. Back up the system state on the old computer
C. Run the File and Settings Transfer Wizard on the old computer
D. restore the system state on the new computer
E. Run the File and Settings Transfer Wizard on the new computer
F. Establish a Remote Assistance session from the old computer to the new computer |
|
Definition
C. Run the File and Settings Transfer Wizard on the old computer E. Run the File and Settings Transfer Wizard on the new computer |
|
|
Term
You have two computers named CPU1 and CPU2. These computers run Windows XP Professional and are joined to an Active Directory domain. CPU1 contains the recovery agent certificate for the domain. A domain user named Ryan encrypts files on CPU2 in a folder named C:\Ryan. Ryan leaves your company and the administrator deletes his account. You need to decrypt the files that were encrypted by Ryan, what should you do? List in order the 4 steps: A. Log on to CPU1 by using the recovery agent account
B. Back up the encrypted files on CPU2
C. Log on to CPU2 by using the domain administrator account
D. Restore the files on CPU1
E. At the command prompt, run cipher.exe /u c:\ITSN Baker\*.*.
F. modify the properties of the encrypted files
G. Remove CPU2 from the domain |
|
Definition
B. Back up the encrypted files on CPU2 D. Restore the files on CPU1 A. Log on to CPU1 by using the recovery agent account F. modify the properties of the encrypted files |
|
|
Term
ITSN Alm uses a Windows XP Professional portable computer to deliver training to remote sites and to easily connect to a docking station when he is at the schoolhouse. After completing a training lecture in Hawaii, Alm reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to his docking station. Alm informs you that he will be flying out to Rota, Spain next week and wants to be able to use the training laptop. As the desktop administrator you need to ensure that the error does not occur on his computer when he delivers training in Rota and you also want to ensure that the storage device continues to function correctly when his computer is docked at the schoolhouse. What should you do? List the 3 steps in order: A. Instruct David to start the computer by using the Undocked hardware profile whenever the computer is undocked
B. Remove the storage device from the Undocked hardware profile
C. copy the computer's default hardware profile to create a new hardware profile named Undocked
D. Create a local user account for David on his computer
E. Remove the storage device from the hardware profile on David's computer
F. Disable the storage device in the Undocked hardware profile |
|
Definition
C. copy the computer's default hardware profile to create a new hardware profile named Undocked F. Disable the storage device in the Undocked hardware profile A. Instruct David to start the computer by using the Undocked hardware profile whenever the computer is undocked |
|
|
Term
Karl plans to install Windows XP Professional on a new computer. He has an answer file named unattend.txt and a uniqueness database file named unattend.udb. Unattend.udb contains a section for a computer named Corry1. Karl copies the Windows XP Professional source files, unattend.txt, and unattend.udb to a network share named IT School. He starts the new computer by using a network startup disk. He then maps X: to the IT School share. Karl needs to start an unattended installation of Windows XP Professional on Corry1. 5 steps in order. A. setupmgr.exe /m:corry1
B. unattend:unattend.txt
C. sysprep.exe
D. Winnt32.exe
E. Winnt.exe
F. unattend.udb
G. udf:corry1
H. s:x: |
|
Definition
E. Winnt.exe B. unattend:unattend.txt G. udf:corry1 F. unattend.udb H. s:x: |
|
|
Term
You are the desktop administrator for the ITOF School where all the instructors have Windows XP Professional portable computers. ITSR Thomas has a local user account on her computer and has been issued a portable USB print device. You log on to her computer and disable the restrictions on loading unsigned drivers. All other local computer policies are configured with the default settings. After you restart ITSR’s computer and she connects the USB print device, it does not appear in the Printers folder, and ITSR Thomas cannot print any documents. What will you do to ensure that ITSR can install the printer and print successfully? List 2 in order. A. select the Make this action the system default check box
B. Add the /fastdetect switch in the Boot.ini file on ITSR’s computer
C. Disable the Prevent users from installing printer drivers local security policy setting
D. Modify the Driver Signing Options
E. Ask ITSR what her zodiac sign is. |
|
Definition
D. Modify the Driver Signing Options A. select the Make this action the system default check box |
|
|
Term
Sharon has a computer named WS1 that runs Windows XP Professional. She purchases a new computer named WS2. In order, how would you get all of Sharon’s files to her new computer and ensure that she can unencrypted the files from her encrypted folder; List 3 in order. A. back up Sharon’s files from WS1
B. instruct Sharon to import the user certificate from WS1 to WS2
C. log on to WS2 by using the local administrator account
D. instruct Sharon to create a new user certificate on WS2
E. restore files to WS2
F. configure Sharon’s account as the recovery agent account |
|
Definition
A. back up Sharon’s files from WS1 E. restore files to WS2 B. instruct Sharon to import the user certificate from WS1 to WS2 |
|
|
Term
Tyrell has been tasked to deploy Windows XP Professional on 80 client computers. He needs to create an answer file for a Sysprep setup. What should he do from the Windows XP Professional installation CD? List 4 in order. A. Extract deploy.cab
B. Open System Folder
C. Extract support.cab
D. Open Support Folder
E. run sysprep.exe
F. Open Tools Folder
G. run setupmgr.exe |
|
Definition
D. Open Support Folder F. Open Tools Folder A. Extract deploy.cab G. run setupmgr.exe |
|
|
Term
Adam has a computer named ABC1 that runs Windows XP Professional and is a member of a workgroup. He needs to prevent all users from encrypting files on ABC1. What should he do? List 2 in order. A. delete the recovery agent certificate
B. modify the Encrypting File System (EFS) properties
C. deny the Take ownership permission to the Everyone group
D. From the Certificates snap-in
E. From the Local Security Policy
F. delete all trusted root certification authority (CA) certificates. |
|
Definition
E. From the Local Security Policy B. modify the Encrypting File System (EFS) properties |
|
|
Term
You are the desktop administrator for ITOF. You install Windows XP Professional on your portable computer that is configured to use an IEEE 1394 PC card. While in the schoolhouse you use the computer to download pictures from a digital camera of all the graduating students. Every Monday you attend an administrators meeting at which time you use a battery to supply power to your portable computer. Occasionally, the battery runs out of power during these meetings. You need to configure the computer to conserve battery power while you attend your weekly meeting without affecting your power options when you use the computer at the schoolhouse. How should you configure your computer? Select 2. A. Select the Allow this device to bring the computer out of standby check box
B. Create an additional hardware profile
C. select the Minimal Power Management power scheme in the Power Options Properties
D. In Control Panel
E. disable the IEEE 1394 PC card for this profile |
|
Definition
B. Create an additional hardware profile E. disable the IEEE 1394 PC card for this profile |
|
|
Term
Carter is the desktop administrator for the class and wants to deploy Windows XP Professional to 50 new computers. Each new computer has a 20-GB hard drive, a CD-ROM drive, and a floppy disk drive but not network adapter card. Carter wants to use a fully automated installation process so he specifies the class's standard installation settings and save them in an answer file. This way he can use the Sysprep utility to prepare the source computers for the deployment. Which two actions should he take? (Each correct answer presents part of the solution. Choose two.) A. Place the answer file in C:\Windows\System.
B. Place the answer file in C:\Windows\System32.
C. Place the answer file in C:\Sysprep.
D. Place Sysprep.exe and Setupcl.exe in C:\Windows\System.
E. Place Sysprep.exe and Setupcl.exe in C:\Windows\System32.
F. Place Sysprep.exe and Setupcl.exe in C:\Sysprep |
|
Definition
C. Place the answer file in C:\Sysprep. F. Place Sysprep.exe and Setupcl.exe in C:\Sysprep |
|
|
Term
You have a standalone Windows XP Professional computer that is shared by multiple users. You need to create a shortcut to a shared network resource for all new users on this computer. Fill in the path to get to the default location to place this shortcut: Select 4. A. Documents and settings
B. All Users
C. Administrators
D. Default User
E. Desktop
F. Users
G. WIN CD
H. My Documents
I. System Root |
|
Definition
I. System Root A. Documents and settings D. Default User E. Desktop |
|
|
Term
You are the help desk technician for your Command. You receive a call from Dave stating that he received a removable disk drive cartridge from his Supervisor as he was leaving. Dave discovers that he can’t edit files on the cartridge. Whenever he tries to open any files or folders on the cartridge, he receives an “ACCESS DENIED” error message. Since his supervisor is out of the office you try the cartridge in the removable drive on your computer and receive the same “ACCESS DENIED” error message when trying to access the files and folders.You call Dave’s supervisor and he tells you to grant permission to access the contents of the cartridge only to Dave however, he also wants to prevent Dave from changing permissions on the contents of the cartridge.Which three steps should you take? Select 3. A. as Administrator
B. grant Dave Allow - Modify permission on the files and folders
C. take ownership of the files and folders
D. grant Dave Allow - Take Ownership permission on the files and folders.
E. grant your help desk user account Allow - Full Control permission on the files and folders
F. grant Dave Allow - Full Control permission on the files and folders. |
|
Definition
A. as Administrator C. take ownership of the files and folders B. grant Dave Allow - Modify permission on the files and folders |
|
|
Term
IT”A” School sponsors a multi-national military classroom in which multiple users will share the same computer. These computers must work in French, Spanish, or English. What would you do to ensure that all users can change the language in which the system menus appear? List 2 in order. A. from the Display Properties
B. run muisetup.exe
C. from Regional and Language Options
D. from the Multilingual User Interface (MUI) pack installation CD
E. modify the Location settings and the Input Languages settings |
|
Definition
D. from the Multilingual User Interface (MUI) pack installation CD B. run muisetup.exe |
|
|
Term
In order for multiple users to be able to switch their keyboard layout between multiple languages, what 2 things must you do? In order. A. modify the Language Preferences
B. from Regional and Language Options
C. install the Multilingual User Interface (MUI) pack
D. from the Keyboard settings
E. modify the Text services and input languages settings |
|
Definition
B. from Regional and Language Options E. modify the Text services and input languages settings |
|
|
Term
As the ITOF domain administrator you have enabled roaming profiles for all MCP instructors. The roaming profiles are stored on a server named Server1, in a shared folder named Profiles. Ms. Patty is an instructor for MCP. IT1 Gooden is her manager. IT1 Gooden reports that Ms. Patty is continually modifying her desktop settings which result in having to call the help desk for assistance and instructional down time for the students. You want to ensure that Ms. Patty can no longer modify her roaming profile, what should you do? Select 2 in order: A. In Ms. Patty's profile on Server1, change the file name of Ntuser.man to Ntuser.dat
B. In Ms. Patty's profile on her computer, change the file name of Ntuser.dat to Ntuser.man
C. Log off Ms. Patty’s account
D. In Ms. Patty's profile on Server1, change the file name of Ntuser.dat to Ntuser.man
E. change the profile path to \\Server1\Profiles\%username%.man |
|
Definition
C. Log off Ms. Patty’s account D. In Ms. Patty's profile on Server1, change the file name of Ntuser.dat to Ntuser.man |
|
|
Term
Your network contains a server named Eagle1. All students at IT “A” school log on to a single computer named CPU1 every day by using local user accounts. You want to configure the user profiles on CPU1 to be stored on Eagle1. What should you do? List 3 in order. A. on CPU, map a drive from each client computer to an administrative share on Eagle1
B. assign Full Control permissions to all users
C. on CPU1, configure each user's profile path to a folder in the shared folder
D. create a shared folder on Eagle1
E. on Cpu1, configure each user's home folder path to a folder in the shared folder
F. configure each user's home folder path to point to the mapped drive |
|
Definition
D. create a shared folder on Eagle1 B. assign Full Control permissions to all users C. on CPU1, configure each user's profile path to a folder in the shared folder |
|
|
Term
Your ITOF network contains 250 computers in which 1 of the computers performs application testing and has Internet Information Services (IIS) installed. This computer has a group named Trainers and you want to ensure that only the members on the Trainers group can access the Web site. Which two configuration changes should you perform? (Each correct answer presents part of the solution. Choose two.) A. Modify the properties of the Developers group
B. from the properties of the default Web site, modify the Authentication Methods
C. from the properties of the default Web site, assign an SSL certificate
D. modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder |
|
Definition
D. modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder B. from the properties of the default Web site, modify the Authentication Methods |
|
|
Term
Because of your duties as Student of the Year at ITOF you need both a portable computer and a desktop computer to perform your duties. Both have Windows XP Professional and are members of a domain named Eagle. The desktop computer hosts a shared folder named Pride1. You need to ensure that all files from the Pride1 folder will be automatically available on the portable computer when it is disconnected from the network. Which actions should you perform? Select 4. A. from the portable computer
B. from the desktop computer
C. enable offline files
D. modify the properties of the Shared Documents folder
E. modify the properties of Pride1 |
|
Definition
A. from the portable computer C. enable offline files B. from the desktop computer E. modify the properties of Pride1 |
|
|