Vous êtes sur la page 1sur 9

Top of Form

Bottom of Form

You are a network administrator for your company.

Bob is a user and has a computer running Microsoft Windows XP Professional. The user
moves one dynamic disk from a two disk stripe set from another computer and imports
the disk. He reports that he cannot recover the data he needs from the disk and asks
you to correct the problem.

What should you do?

Defragment the disk currently in Bob's computer.

Move the second disk of the stripe set to Bob's computer and convert both disks to basic
disks.

Move the second disk of the stripe set to Bob's computer and restart the computer.

Move the second disk of the stripe set to Bob's computer, restart the computer,
and import the second disk.

jw a 1

Bottom of Form

Question 1 Explanation:
Though it is recommended that you import both disks at the same time, they can be imported
separately. Move the second disk to Bob's computer, restart the computer, and import the disk.
You should then be able to access the striped volume.

Just moving the disk and restarting the computer will not correct the problem. The second disk
will not be accessible until it is imported.

Converting both disks to basic disks will result in the loss of all data on both disks.

Defragmenting the disk will do nothing to aid data recovery and it likely to cause additional loss
of data.
2.

You are a network administrator for your company.

The company network is configured as a Microsoft Windows Server 2003 Active


Directory domain. Domain clients run Windows 2000 Professional and Windows XP
Professional.

Members of a domain security group named Accounts need access to a server


application running on a Windows XP Professional member computer. A file named
Ucontrol.dat containing user names and passwords for the application is stored in the
C:\Program Files\AppPass folder. The folder is shared to the network as
\\AppHome\AppPass. The Accounts group is granted Read and Change share
permissions to the shared folder.

You encrypt the Ucontrol.dat file. Users complain that they can no longer access the
application. You determine that the users' security credentials cannot be used to open
the application password file.

You need to provide user access to the application.

What should you do?

Modify the Advanced properties for C:\Program Files\AppPass\Ucontrol.dat to


authorize the Accounts group access to the file.

Modify the C:\Program Files\AppPass NTFS permissions to grant the Accounts group Full
Control.

Modify the C:\Program Files\AppPass\Ucontrol.dat NTFS permissions to grant the Accounts


group Full Control.

Modify the \\AppHome\AppPass folder share permissions to grant the Accounts group Full
Control.

jw a 1

Bottom of Form

tion 2 Explanation:
Users have sufficient share and NTFS permission to access the C:\Program Files\AppPass folder.
The problem is that you need to authorize access to the encrypted file. Open the file properties,
click Advanced, and then click Details in the Advanced properties to authorize access to domain
users you specify.

Modifying the share or NTFS permissions will not provide users with access to a shared encrypted
file.

Top of Form

3.

Bottom of Form

You are a desktop administrator.

Three users in your company require support for reading and editing Korean and English
documents using Microsoft Word 2003. Their computers are running Microsoft Windows
XP Professional. The computers already have English language support.

You need to add support for Korean.

What should you do? (Choose 2. Each correct answer represents part of the solution.)

Install the Multilingual User Interface (MUI) pack.

Add Korean as an input language service.

Add the Korean code page conversion table.

Install files for East Asian languages.

Install files for complex script.

Question 3 Explanation:
You should add Korean as an input language. To do so, open the Regional and Language Options
control panel utility and display the Languages tab. Click Details. Click Add and select Korean to
add support for entering Korean text. After multiple languages have been selected, the language
bar will be displayed in the Taskbar. This will allow users to switch between languages.

Before you can enable Korean as an input language, you will need to install the language
collection for East Asian languages. Korean is an East Asian language, and so are Chinese and
Japanese.

You do not need to install the language collection for complex script and right-to-left languages.
This language collection is required to support Arabic, Armenian, Georgian, Hebrew, Indic
languages, Thai, and Vietnamese.

There is no need to install the Korean code page. A code page only needs to be installed if an
application has been written to use it instead of Unicode. In this case, the user needs to enter
Korean text in standard Office applications, which use Unicode.

There is no need to install the MUI. The MUI adds translated text for the user interface elements,
such as menus, wizards, and help content.

4.

You are a desktop administrator.

Ian is a user in the Graphic Design department. His computer is running Microsoft
Windows XP Professional. Ian uses several processor-intensive applications. Two of the
applications are 16-bit applications.

You have installed a second processor in Ian's computer.

You need to ensure that the 16-bit applications can run simultaneously.

What should you do?

Change the priority of each application to real time.

Set processor affinity for each 16-bit application.

Launch each application using the start /shared command.

Launch each application using the start /separate command.

jw a 1

Bottom of Form
Question 4 Explanation:
You should start each application in its own memory space to distribute the load more evenly
between the processors. You can do this by using the command, start /separate <application-
executable-file>. You can also start an application in its own memory space by creating a
shortcut to the application's executable file and selecting "Run in separate memory space" in the
Advanced Properties dialog box for the shortcut. By default, all 16-bit applications start in the
Win16 on Win32 Virtual Device Manager (NTVDM) subsystem. The NTVDM has a single thread
dedicated to running 16-bit applications in the VDM. When you start each application in its own
memory space, a separate NTVDM is started for the application, and that NTVDM has its own
thread so that the application can run on a separate processor.

You should not start the applications using the /shared option switch. Doing so will cause them
to run in a shared Win16 on Win32 (WOW) session on a single processor.

You should not configure processor affinity for the processes. Doing so will limit the application to
running on a specific processor, even if that processor is already loaded.

You should not configure the applications to run at real-time priority. Real-time priority does not
affect processor assignment. Also, running an application at real-time priority will impact critical
operating system functions.

5.

Top of Form

You are a desktop administrator.

Your company's network is configured as a single Active Directory domain.

Sylvia is a sales manager. Her portable computer is running Microsoft Windows XP Professional
with Service Pack 2. When Sylvia is logged on to the domain, she needs to be able to share an
attached printer and several folders with members of her team. She also connects to the
Internet through a proxy server. When Sylvia is away from the office, she connects to the
Internet though various types of connections, including a Digital Subscriber Link (DSL)
connection at home and both wireless and DSL connections when she is traveling.

You need to ensure that users cannot access the shared folders when Sylvia is not connected to
the domain. Your solution must provide the best possible security.

What should you do? (Choose four. Each correct answer represents part of the solution.)

Enable the Prohibit Use of Internet Connection Firewall on your DNS Domain Network policy
under Network | Network Connections.

Enable the Allow local port exceptions policy under Windows Firewall | Standard Profile.
Enable the Allow file and printer sharing exception under Windows Firewall |
Domain Profile.

Enable the Allow local program exceptions policy under Windows Firewall | Domain Profile.

Enable Protect all network connections under Windows Firewall | Domain Profile.

Enable the Do not allow exceptions policy under Windows Firewall | Standard
Profile.

Enable Protect all network connections under Windows Firewall | Standard Profile.

jw a 2

Bottom of Form

Question 5 Explanation:
Windows XP Service Pack 2 provides Windows Firewall as a replacement for Internet Connection
Firewall (ICF). Windows Firewall offers considerably more flexibility, including the ability to define
different rules when logged on to the Active Directory domain (Domain Profile) than when not
logged on to the domain (Standard Profile). To meet the requirements, you need to enable
Protect all network connections in both the Domain Profile and the Standard Profile. Doing this
will ensure that Windows Firewall is enabled at all times. Because Sylvia needs to share folders
and printers when connected to the domain, you need to enable the Allow file and printer sharing
exception policy only in the Domain Profile. You also need to enable the Do not allow exceptions
policy in the Standard Profile to prevent users from configuring exceptions locally.

You do not need to enable the Allow local program exceptions policy in the Domain Profile. In
fact, doing so will decrease the security of the solution because it will enable a user to add
exceptions using the Windows Firewall utility.

You do not need to enable the Allow local port exceptions policy in the Standard Profile. In fact,
doing so will decrease the security of the solution unless Do not all exceptions is enabled.

You do not need to enable the Prohibit Use of Internet Connection Firewall on your DNS Domain
Network policy. This policy was used prior to Service Pack 2 to disable ICF globally.

6.

Top of Form
You are a desktop administrator.

Clint is planning a business trip to another office. Clint's desktop computer is running Microsoft
Windows XP Professional. However, while Clint is away, he will connect to the network using a
portable computer running Windows 98. He needs to access data and applications on his
desktop computer from the portable computer. He will be logging on to the network using a
virtual private network (VPN) connection.

You need to ensure that Clint can connect to his desktop computer and access his data and
applications.

What should you do? (Choose two. Each correct answer represents part of the solution.)

Enable Allow users to connect remotely to this computer on the desktop computer.
Add Clint's account as a remote user.

Install Terminal Services on the desktop computer.

Install Remote Desktop Connection Software on the portable computer.

Grant Clint's account the Allow logon through Terminal Services user right on the desktop
computer.

Grant Clint's account the Access this computer from the network user right on the desktop
computer.

jw a 2

Bottom of Form

Question 6 Explanation:
You need to enable Remote Desktop on the desktop computer and add Clint's account
to the Remote Desktop Users group. You can enable Remote Desktop by selecting
Allow users to connect remotely to this computer on the Remote tab of the System
Control Panel utility. You can add Clint's account to the Remote Desktop Users group
by clicking Select Remote Users on the Remote tab and adding Clint's account.

You also need to ensure that the Remote Desktop Connection software is installed on
the laptop computer. The Remote Desktop feature is built on the Terminal Services
technology developed for Windows 2000 servers. Remote Desktop uses the Remote
Desktop Protocol (RDP) for communication between two computers. Remote Desktop
Connection software can be downloaded from Microsoft's Web site.

You do not need to install Terminal Services on the desktop computer because Remote
Desktop takes the place of Terminal Services on Windows XP.

You do not need to grant Clint the Allow logon through Terminal Services user right.
The Remote Desktop Users group already has that right.

You do not need to grant Clint the Access this computer from the network user right.
The Everyone group has that right by default.

Top of Form

Question 7 / 7 Mark for Review


Bottom of Form

You are a network administrator for your company.

Your company ordered ten new computers with no operating system installed. You plan
to use Sysprep to install Microsoft Windows XP Professional. Your company has Volume
License installation media for Windows XP installation and sufficient licenses for the new
computers.

You install Windows XP Professional. You create an answer file to fully automate the
Mini-Setup routine. As part of the answer file, you want to ensure that the user is not
prompted for the volume license key value.

What should you do?

Enter the volume license key in the [UserData] section of the answer
file.

Enter the volume license key in the [TapiLocation] section of the answer file.

Enter the volume license key in the [GuiUnattended] section of the answer file.

Enter the volume license key in the [Identification] section of the answer file.

jw a 1

Bottom of Form
Microsoft (70-270) Installing, Configuring, and Administering Microsoft Windows XP Professional
* Demo Test *
Question ID: fmMS_W-200 Jump to Question ID

Question 7 Explanation:
The volume license key must be provided to the Mini-Setup wizard when you use a disk image to
install Windows XP Professional from Volume License Media. You can prevent Mini-Setup from
prompting the user by supplying the volume license key in the [UserData] section of the answer
file.

The Mini-Setup routine will be unable to retrieve the volume license value if it is placed in the
[GuiUnattended], [TapiLocation], or [Identification] sections of the answer file.

The [GuiUnattended] section lets you specify GUI (graphical user interface) information, such as
administrator password and time zone.

The [TapiLocation] section lets you specify telephony support information, such as area code and
country code.

The [Identification] section lets you specify network identification information, including domain
or workgroup name.

1.

2. Automated Setup Options


Microsoft Windows XP Inside Out, Second Edition, Microsoft
Chapter 2: Installing and Configuring Windows XP