Chapter 14. Answers to Practice Exam 1

Question 1

Answer F is correct. All components meet the minimum requirements to install Windows Vista Business. The minimum requirements for a Vista Capable computer are an 800-MHz processor, 512 MB RAM, an SVGA monitor, 20-GB hard drive with 15 GB free, and a CD drive. Because the computer meets or exceeds all of these, all the other answers (A, B, C, D, and E) are incorrect.

Question 2

Answer C is correct. The first thing you should check is to see whether your system is configured to boot first from the optical drive rather than the hard drive. Answers A and B are incorrect because although these are possible causes for this problem, it is best to first check the BIOS setup program. Answer D is incorrect because Windows Vista will install to any bootable hard drive, including IDE and SCSI hard drives.

Question 3

Answers C and D are correct because they support in-place upgrades. Answers A and B are incorrect because they require a clean install.

Question 4

Answers A and B are correct because they can be upgraded without doing a clean install. Answers C and D are incorrect because they require clean installs.

Answer 5

Answer B is correct because it is obvious that these drivers are not the newest. Therefore, check the update website and manufacturer websites for newer drivers. Answer A is not the best answer because the Windows installation disc might not have the newest drivers either. Answer C is incorrect because the edition has no effect on how a driver is loaded. Answer D is incorrect because it is always recommended to load only signed drivers whenever possible.

Question 6

Answer C is correct because, by default, Internet Explorer blocks most pop-up windows. To enable these sites to work properly and to display pop-ups from specific sites, you need open the Pop-up Blocker Settings dialog box, and you need to add the URL of the website to the Allowed Sites list. Answer A is incorrect because if the site has been blocked by the network administrator, you will usually get a message saying that is the case. Answer B is incorrect because you will get a message similar to Site Not Found or Site Not Available. Answer D is incorrect because when a site is not on your trusted list, it will typically stop certain programs from running such as ActiveX controls.

Question 7

Answers A, B, and C are correct. As you run out of disk space, your computer cannot swap information using the paging file and cannot create the needed temporary files when you move files from one drive to another. Your machine also becomes less reliable. Answer D is incorrect because although NTFS supports compression, it will not automatically start compressing files because it is low on disk space.

Question 8

Answers A, B, D, and E are correct because to use Windows Aero, you must set the theme to Windows Vista, set the monitor settings to a refresh rate higher than 10, set the color to 32 bit, and set the color scheme to Windows Aero. Answer C is incorrect because the resolution is not a requirement.

Question 9

Answer B is correct because Windows Aero requires that video cards support at least 64 MB of graphics memory. Therefore, answers A, C, and D are incorrect.

Question 10

Answer A is correct because if the computer is not part of the domain, you can use parental controls. Answer B is incorrect because you configure this with parental controls and not Ease of Access. Answer C is incorrect because configuring NTFS is a more complicated method that takes more time to control access to a computer and is not as effective. Answer D is incorrect because blocking ports is only partially effective and would only block programs from communicating over the network.

Question 11

Answer B is correct because you can use parental controls to specify when a computer can be used. Answer A is incorrect because group policies can be used only with computers that are part of the domain, which a home computer typically is not. Answer C is incorrect because a timer is ineffective. Of course, because answers A and C are incorrect, answer D is incorrect.

Question 12

Answer B is correct because you can use the Restore Advanced Settings button on the Advanced tab of the Internet Options dialog box, which will not impact the other security and privacy setting used by Internet Explorer 7. Answer A would not change settings if you reinstall Internet Explorer, and because Internet Explorer is part of the operating system, this is not an option. Answer C is incorrect because there is no need to use the Reset button on the Advanced tab of the Internet Options dialog box because it would result in all the Internet Explorer settings being reset. Answer D is incorrect because there is no need to reset the zone settings on the Security tab; doing so will impact the security level in Internet Explorer, which is not the problem.

Question 13

Answers A and B are correct because you can shut it off for an individual user account or by using group policies. Answers C and D are incorrect because turning off the User Account Control prompts cannot be controlled using the Computer Management console or by using the System Properties.

Question 14

Answer B is correct because domain accounts are stored in Active Directory on a domain controller. Answers A, C, and D are incorrect because domain accounts are not stored locally on the Windows Vista computer.

Question 15

Answer C is correct because they will not be able to log in as a remote user even if they are an administrator. Answers A, B, and D are incorrect because the user without a password will be able to log in or run these utilities, assuming he has the proper permissions.

Question 16

Answers A and D are correct because these programs can be disabled using Software Explorer and msconfig. Answers B and C are incorrect because the Add/Remove Programs or Computer Management console will not show the programs loaded during startup.

Question 17

Answer A is correct because ActiveX is configured in the Security tab under each of the security zones. Answers B, C, and D are incorrect because you cannot use the other option tabs or the Add/Remove programs.

Question 18

Answer C is correct because using a USB flash drive is the easiest to implement. Answer A is a possible answer but takes more work to perform. Therefore, Answer a is not correct. Answer B is incorrect because although you can copy the configuration to the shared folder, the laptop computers are not able to access the shared drive until the wireless network is configured on each laptop. Answer D is incorrect because the network settings of most corporate networks prevent a network from being autodetected, Answer E is incorrect because there is no group policy that will configure wireless settings and the laptop would have to be connected to the network to get those settings.

Question 19

Answer A is correct because Remote Assistant enables you to see the same screen that Joe is looking at. Answer B is incorrect because although you will see the desktop, you disable Joe’s view while you do it. Answer C is incorrect because telnet shows the command prompt only and not the GUI interface. Answer D is incorrect because connecting to a server is not helpful. The problem is on Joe’s computer, and you typically do not want users to take control of servers.

Question 20

Answer A is correct because the Windows Vista Home Basic edition does not support Remote Desktop. Answers B, C, and D are incorrect because if you have Windows Vista Home Basic edition, it does not support Remote Desktop. Therefore, you would not be able to access the computer remotely.

Question 21

Answer B is correct because the paging file allows you to run more programs and access more memory by using the paging file as memory. Answers A and C are incorrect because paging files do not keep track of your files on your drive, nor do they provide backward compatibility with older versions of Windows. Answer D is incorrect because paging files will actually slow your system when the paging file has to swap between RAM and disk space.

Question 22

Answer B is correct because the Startup Repair tool will allow you to fix boot problems. Answer A will not work because Windows will not start. Answers C and D are incorrect because you cannot start Windows from the installation disc.

Question 23

Answer B is correct because the Event Viewer shows the logs. Answers A, C, and D are incorrect because none of these utilities exist.

Question 24

Answer D is correct because when you have private shares, you need to turn on Password Protected Sharing. Answer A is incorrect because there is no such thing as Domain Share option. Answer B is incorrect because you don’t need to use public folders to protect it. Answer C incorrect because network discovery and Windows Firewall is turned on by default. When Network Discovery is enabled, anyone on the network can locate your computer.

Question 25

Answer C is correct because it does not fall in the range of private addresses. Answers A, B, and D are incorrect because they are private addresses. The private addresses are 10.x.x.x, 172.16.x.x to 172.31.x.x, and 192.168.0.x and 192.168.255.x (256 class C address ranges).

Question 26

Answers A and B are correct because IPv6 has large address space (128 bit), efficient routing, straightforward configuration, and enhanced security. Answer C is incorrect because IPv6 performs routing more efficiently, and answer D is incorrect because IPv6 does not include built-in name resolution.

Question 27

Answer C is correct because you need to select Scan Settings to Be Forwarded to an E-mail Address. Answer A is incorrect because the Scan setting is not available to forward images to an e-mail address. Answer B is incorrect because this is a manual process that needs to be done each time. Answer D is incorrect because this is a secure method and it would not send the images automatically.

Question 28

Answer B is correct because the single group will allow you to view all three calendars combined. Answer A is incorrect because you need to divide the meetings and appointments to three separate calendars. Answer C is incorrect because three groups are too many groups. Answer D is incorrect because the three calendars without the group will not allow you to see all the appointments and meetings together.

Question 29

Answer C is correct because BitLocker is the only one that will protect the entire driver. Answers A, B and D are incorrect because NTFS, share permissions, and EFS do not protect everything on the volume.

Question 30

Answer B is correct because Task Manager will show processor and memory utilization of all processes. Answer A is incorrect because the Event Viewer will show you the logs. Answer C is incorrect because the Computer Management console is used to configure the system. Answer D is incorrect because Windows Defender is used to protect against spyware.

Question 31

Answer D is correct because Sysprep will remove the SID from the image and clean up various user and machine settings and log files. Answer A is incorrect because ImageX is a command-line tool that captures, modifies, and applies installation images for deployment in a manufacturing or corporate environment. Answer B is incorrect because Windows Setup (Setup.exe) installs the Windows Vista operating system, and answer C is incorrect because Diskpart is a command-line hard disk configuration utility.

Question 32

Answer B is correct because the down arrow means that the device is disabled. Answer A is incorrect because the exclamation point indicates a device that is having a problem. Answers C and D are not indicated in the Device Manager.

Question 33

Answer C is correct because the ping command is used to test network connectivity. Answer A is incorrect because ipconfig is used to show IP addresses of a system. Answer B is incorrect because the arp command is used to show the ARP cache. Answer D is incorrect because the nslookup command is used to look at DNS problems.

Question 34

Answer B is correct because the administrator and guest account are disabled when you first install Windows. Answer A is incorrect because the administrator is the primary Windows account. Answer C is incorrect because the first account created is active. Answer D is incorrect because no RemoteUser account comes with Windows.

Question 35

Answer C is incorrect because the security identifier (SID) is a unique identifier that is automatically generated when a user account is created and consists of a computer or domain security ID prefix combined with a unique relative ID for the user. Answer A is incorrect because MIB has nothing to do with user accounts. Answer B is incorrect because a CID does not exist in Windows. Answer D is incorrect because the UserID is used with the SID to easily identify a user.

Question 36

Answers B and D are correct because Windows Vista Home Premier and Window Vista Ultimate include the MPEG-2 decoder. Answers A and C are incorrect because Windows Vista Home Basic and Windows Vista Business do not include the MPEG-2 decoder.

Question 37

Answer C is correct because you need Windows Vista Home Premium or Windows Vista Ultimate to record movies, and you will need to have two tuners to record two movies at the same time. Answers A and B are incorrect because Windows Vista Enterprise and Windows Vista Home Basic do not support recording of movies. Answer D is incorrect because you need only two TV tuners to record two movies at the same time, not three.

Question 38

Answer C is correct because DVDs and DVD players are assigned regions so that they know what area in the world they play in. Answer A is incorrect because NTFS permissions are used to secure files. Answer B is incorrect because BitLocker is used to encrypt a drive. Answer D is incorrect because a codec is a translator for audio and video files.

Question 39

Answer C is correct. When you configure a Bluetooth-enabled handheld device, you need to enable Bluetooth and assign a passkey. Answer A is incorrect because Network Discovery is a network setting that affects whether your computer can see (find) other computers and devices on the network and whether other computers on the network can see your computer. Answers B and D are incorrect because WiFi is used to configure a wireless network connection (802.11b and g).

Question 40

Answer D is correct. To program the pen actions, you need to configure flicks. Answers A and C are incorrect because Automatic Learning and Pen options in Pen and input devices have nothing to do with pen actions. Answer B is incorrect because there is no such thing as gestures.

Question 41

Answer C is correct because you will not find pointer devices in the Windows Mobility Center. Answers A, B, and D are incorrect because you find brightness, battery status, and presentation settings in the Windows Mobility Center.

Question 42

Answer B is correct because when a processor runs at a reduced voltage and smaller clock speed, it is known as throttling. Answers A and D are incorrect because they are not real. Answer C is incorrect because steppings are often referred to as versions of a component such as a processor.

Question 43

Answer C is correct because in Windows Vista, the power settings saved together are called power plans. Answer A is incorrect because a profile consists of files and settings for user accounts. Answer B is incorrect because this is what power plans were called in older versions of Windows. Answer D is incorrect because power settings are what you find in the Control Panel.

Question 44

Answer A is correct because an answer file is an XML file that scripts the answers for a series of GUI dialog boxes and other configuration settings used to install Windows. Answer C is incorrect because a Windows image is a copy of a disk volume saved as file. Answer D is incorrect because a catalog is a binary file (CLG) that contains the state of the settings and packages in a Windows image. Answer B is incorrect because it is a made-up answer.

Question 45

Answer A is correct because Dynamic Update is the feature built in to Windows Setup that automatically checks for new drivers, compatibility updates, and security fixes while Windows is being installed. Answers B and D are incorrect because they are not real answers. Answer C is incorrect because Automatic Updates is the feature that keeps Windows updated automatically after it is installed.

Question 46

Answer B is the correct answer because the User State Migration Tool (USMT) is used to migrate the files and settings to a removable media or to a network share and later restore the files and settings to the target computer. Answer A is incorrect because the Windows Easy Transfer (WET) uses removable media, or over the network it uses WET to perform a side-by-side migration to migrate the settings to a new computer that already runs Windows Vista. Answer C is incorrect because Windows PE is a bootable tool that replaces MS-DOS as the preinstallation environment. Answer D is incorrect because Sysprep is a utility that facilitates image creation for deployment to multiple destination computers.

Question 47

Answer A is correct because the notification area includes a clock and small icons that show the status of certain programs and computer settings. Answer B is incorrect because it is on the opposite side of the screen and is used to start most programs. Answers C and D are incorrect because they are not real.

Question 48

Answer D is the correct answer because Safe List Only allows you receive messages only from people or domain names on your Safe Senders list. E-mail messages from people or domain names that are not on your Safe Senders list are treated as junk e-mail messages. Answer A is incorrect because No Automatic Filtering will stop blocking junk e-mail messages. Windows Mail will continue to block messages from domain names and e-mail addresses on your Blocked Senders list. Answer B is incorrect because Low blocks only the most obvious junk e-mail messages. This is the default setting. Answer C is incorrect because High blocks more junk e-mails and should be used if you receive a lot of junk e-mail.

Question 49

Answer A is correct because the act of capturing private information using fake e-mails and websites is called phishing. Answers B and C are incorrect because IP spoofing and ARP spoofing are used to hide the location of sent messages. Answer D is incorrect because poisoning is a form of denial-of-service (DoS) attack.

Question 50

Answer C is correct because the pane that holds the gadget is known as the Windows Sidebar. Answer A is incorrect because the Control Panel is the main configuration tool used in Windows. Answer B is incorrect because Administrative Tools is the place to find advanced configuring and troubleshooting tools. Answer D is incorrect because the Gadget Panel is not real.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.223.170.63