Chapter 16. Answers to Practice Exam 2

Question 1

Answer B is correct. For a system to be Windows Vista capable, it must have at least 512 MB of RAM. Therefore, more RAM should be added to the system. The minimum requirements for a Vista Capable computer is an 800-MHz processor, 512 MB RAM, an SVGA monitor, 20-GB hard drive with 15 GB free, and a CD drive. Therefore, Answers A, C, D, E, and F are incorrect.

Question 2

Answers B and C are correct because you can use an in-place upgrade for Windows XP Pro, Windows XP Home, Windows XP Media Center, and Windows XP Tablet PC. Note that the Windows XP Pro computer requires Service Pack 2 to be installed for an in-place upgrade. Answers A and D are incorrect because they require a clean install, especially if you are upgrading from a 32-bit system to a 64-bit system.

Question 3

Answer A is correct because the Windows Vista Upgrade Advisor is a utility that allows one to access an easy-to-understand report after scanning your computer. This report will specify whether the currently installed hardware will work with Windows Vista. Answer B is incorrect because there is no Microsoft utility called System Checker for Windows Vista. Answer C is incorrect because the System Information gives you a quick view of what components and software your computer has; it does not specify which components do not meet Windows Vista minimum requirements. Answer D is incorrect because the Computer Management Console is used to manage the computer.

Question 4

Answer B is correct because at this point, you can only use the Startup Repair utility to fix the problem. Answers C and D are incorrect because you cannot load Windows in Normal mode or Safe mode to run the Software Explorer or msconfig.exe. Answer A is incorrect because a clean install was done, and therefore, there is no prior information left on the hard drive to revert back to.

Question 5

Answer D is correct because signed drivers have been tested by Microsoft to ensure that they are stable and will not cause any problems. Answer A is incorrect because signed drivers have nothing to do directly with system security. Answer B is not correct because Microsoft does not keep track of paid drivers. Answer C is incorrect because Microsoft may or may not have acknowledged the driver.

Question 6

Answer C is correct because you have to specify which sites you do not want to block pop-up blockers. Answer A is incorrect because you would use the Manage Add-On dialog box to shut down add-on programs such as Adobe Shockwave Flash. Answer B is incorrect because adding to a trusted site allows websites more permissions, such as running ActiveX. Answer D is incorrect because you need to open the Pop-Up Blocker Settings dialog box and add the URL to the allowed sites list.

Question 7

Answers A and D are correct because Windows Aero requires that the video card includes DirectX 9, with Pixel Shader 2.0 and Windows Vista Display Driver Model (WDDM). Answer B is incorrect because although Windows Aero can use the higher resolution, it is not required. Answer C is incorrect because there is no 64-bit color on computer systems.

Question 8

Answer A is correct because the Ease of Access Center enables you to control the accessibility options. Answers B and C are incorrect because there are not such consoles with those names. Answer D is incorrect because the Computer Management is a powerful console but does not including accessibility options.

Question 9

Answers A, B, and C are correct because all of these options can be controlled using the Ease of Access Center. Answer D is incorrect because increasing the resolution typically makes things smaller on the screen, making it harder to read.

Question 10

Answers C and D are correct because you cannot use parental controls when the computer is part of a domain and when you are logged on as an administrator. Answer A is incorrect because parental controls are available on all editions of Windows Vista. Answer B is incorrect because the Power Users group is mostly used for backward compatibility with applications that were created for older versions of Windows.

Question 11

Answer B is correct because you can use parental controls to block certain websites. Answer A is incorrect because the firewall is used to block certain ports or applications from communicating over the network, not specific websites. Answer C is incorrect because you cannot use NTFS to block websites. Answer D is incorrect because the child should not have administrative permissions.

Question 12

Answer B is correct because volumes are managed using the Computer Management Console, which is found in Administrative Tools. Answers A, C, and D are incorrect because these do not exist.

Question 13

Answers A and C are correct because you should try to run the application as a Windows 95 environment. If that does not work, try to run the application as an administrator. Answers B and D are incorrect because NTFS permissions and file attributes are not the cause of the problem.

Question 14

Answer A is correct because this warning is generated by User Account Control to protect you from an application that may be performing functions that it should not be performing. Answer B is incorrect because the problem is caused by User Account Control and has nothing to do with NTFS permissions. Answer C is incorrect because although you could try running the application as an administrator, this would open up the security on your system. In addition, applications written for older operating systems may not function properly on Windows Vista because of the enhanced security. Answer D is incorrect because it would give you an error saying a file is read-only or not able to save something.

Question 15

Answer E is correct because you can run programs that were installed by another user. Answers A, B, C, and D are incorrect because you must be an administrator to install or uninstall software, install hardware, delete system files, and change settings that affect other users.

Question 16

Answer C is correct because if the Windows Firewall is active, you can allow communication by adding the name of the program file to the Exceptions list. Answers A, B, and D do not have these capabilities.

Question 17

Answer B is correct because the Windows Firewall with Advanced Security is used to manage your IPSec configuration when the firewall rules and IPSec settings conflict with each other. Answers A, C, D, and E are incorrect because the console does none of these.

Question 18

Answer A is correct because Protected mode prevents Component Object Model (COM) objects, such as ActiveX controls, from automatically modifying files and settings. With Protected mode enabled, only users can initiate these types of requests. Answers B, C, and D are incorrect because Protected mode does not do any of these.

Question 19

Answer A is correct because chkdsk is used in Windows Vista. Answer B is incorrect because the /F parameter will fix errors (such as lost clusters and cross-lined files) that it finds while checking the disk. Answers C and D are incorrect because scandisk was used by the Windows 9x versions of Windows. Answer E is incorrect because it is not scandisk.

Question 20

Answer C is the correct because disk defragmentation leads to slow disk performance. Answers A and B are incorrect because when you defrag a hard drive, you are relocating clusters. You are not deleting files or clearing out space, and you are not checking for or removing viruses. Answer D is incorrect because disk errors would be found using chkdsk.

Question 21

Answers A and B are correct because Windows ReadyBoost boosts system performance by using USB flash devices as additional sources for caching, and Windows ReadyDrive boosts system performance on mobile computers equipped with hybrid drives. Answer C is incorrect because ReadyBoost boosts system performance by using USB flash devices as additional sources for caching. Answer D is incorrect because ReadyDrive boosts system performance on mobile computers equipped with hybrid drives.

Question 22

Answer A is the correct answer because if you load the basic VGA driver rather than the new driver, you can then roll back to the previous driver. Answer B is incorrect because you cannot roll back the driver using the command prompt. Answer C is not correct because you cannot roll back the driver, and you don’t want to reinstall Windows. Answer D is incorrect because you cannot connect to the update site until you can boot to Windows.

Question 23

Answer D is correct because msconfig enables you to temporarily disable each program one by one to see which one is causing the problem. Answer A is available only when the computer is not part of the domain and is a clumsy way to perform the same tasks. Answers B and C are incorrect because they are clumsy ways to perform the same tasks.

Question 24

Answers A and B are correct because Personal mode provides authentication via a preshared key or password, and Enterprise mode provides authentication using IEEE 802.1X and EAP. Answers C and D are incorrect because they state the opposite.

Question 25

Answer B is correct because you need to flush the DNS cache so that it can get the new address from the DNS server. Answer A is incorrect because it would only register your computer’s IP address with the DNS server. Answer C clears the cache, but it is not the most efficient way because rebooting your computer takes far longer than using the ipconfig command. Answer D does not correct the problem, because the address is still cached.

Question 26

Answer C is correct. For a user to access a Windows Vista machine using Remote Desktop, the user must be added to the Remote Desktop Users group. Users must also have passwords. Answer A would work, but would most likely be a security problem because a user who is an administrator will have access to everything on the machine; if a person lets a virus on the system, it will spread through the entire system because of the user’s rights and permissions. Answer B is incorrect because the Power Users group is for backward compatibility. Answer D is incorrect because there is no Telnet group that comes with Windows.

Question 27

Answer D is correct because it is most likely blocked by the Windows Firewall. Answer A is incorrect because Remote Desktop cannot be controlled through parental controls. Answer B is incorrect because the users who are trying to use Remote Desktop are already members of the Remote Desktop Users group (which has all the permissions needed to access Remote Desktop). In addition, a user who is an administrator would most likely be a security problem because that user would have access to everything on the machine; if a person lets a virus on the system, it will spread through the entire system because of the user’s rights and permissions. Answer C is incorrect because you don’t have to register Remote Desktop with Microsoft for it to function.

Question 28

Answer A is correct because you need to leave a copy of messages so that when you go to the other computer, the messages will still be there. You also need to check the Remove from Server When Deleted option so that when you delete from one, the message will be gone from the other. Answer B is incorrect because you did not check the Remove from Server box. Answer C is incorrect because there is no Auto-Update option. Answer D is incorrect because Windows Mail does not do these options by default.

Question 29

Answer B is correct because when you have remote users, you need to send out invitations. Answer A is incorrect because the remote users will not see that the meeting is nearby. Answer C is incorrect because Allow People Near Me will only include local users. Answer D is incorrect because there is no Allow All People option.

Question 30

Answer A is correct because you start the computer and enter the recovery password in the BitLocker Driver Encryption Recovery Console. Answer B is incorrect because you did not save the password to disk. Answer C is incorrect because you cannot enter the TMP Management Console. Answer D is incorrect because you cannot access the BitLocker Driver Encryption Recovery Console using the Windows Vista installation disc.

Question 31

Answer A is the correct answer because the exclamation point indicates a problem. Answer B is incorrect because a device that is disabled would have a down arrow. Answers C and D are incorrect because they are not indicated in the Device Manager.

Question 32

Answer C is correct because ipconfig /release releases an IPv4 address. Answer A is incorrect because the ipconfig command displays the IP address, subnet mask, and default gateway. Answer B is incorrect because the /registerdns option will register the IP address with the DNS server. Answers D and E are incorrect because the /renew option is used to renew IPv4 addresses, and the /renew6 is used to renew IPv6 addresses.

Question 33

Answer B is correct because nslookup is used to diagnose your DNS infrastructure. Answer A is incorrect because there is no /dns option with the ipconfig command. Answer C is incorrect because NBTState is used troubleshoot NetBIOS name-resolution problems. Answer D is incorrect because no resolve command comes with Windows.

Question 34

Answer A is correct because for Link Layer Topology Discovery to function, you have to enable Network Discovery. Answers B, C, and D are incorrect because none of these options enable Link Layer Topology Discovery.

Question 35

Answers A, B, and C are correct because NTFS permissions include write permission combined with read and execute. The Contributor share permission gives the ability to read, write, execute, and delete. When you combine the two, you take the least, so that would be read, write, and execute. Answer D is incorrect because there was no delete NTFS permission given. Because they have permissions, answer E is incorrect.

Question 36

Answer A is correct because Microsoft Windows Preinstallation Environment (Windows PE) is a bootable tool that replaces MS-DOS as the preinstallation environment. Windows PE is not a general-purpose operating system. Instead, it is used to provide operating system features for installation, troubleshooting, and recovery. Answer C is incorrect because a Windows image is a copy of a disk volume saved as file. Answer D is incorrect because a catalog is a binary file (CLG) that contains the state of the settings and packages in a Windows image. Answer B is incorrect because it is a made-up answer.

Question 37

Answer C is correct because the name of the answer file is autoattend.xml. Answers A, B, and D are incorrect because they are fictional answers.

Question 38

Answers A and D are correct. DNS, short for Domain Name System, translates from host name to IP address. WINS, short for Windows Internet Naming Service, translates from computer name (NetBIOS name) to IP address. Answer B is a file that provides name resolution from computer name to IP address. Answer C is incorrect because DHCP is a method to assign IP addresses to hosts.

Question 39

Answer C is correct because tracert traces the route that a packet takes and displays the series of IP routers. Answer A is incorrect because ipconfig is used to display the IP configuration. Answer B is incorrect because arp is used to show the ARP cache. Answer D is incorrect because the ping command is used to test a connection to a host.

Question 40

Answer B is correct because an intranet is defined as part of the organization’s network that does not require a proxy server. Answer A is incorrect because anything that is not assigned to any other zone and anything that is not on your computer, or your organization’s network defines this as the Internet zone. Answer C is incorrect because trusted sites are those that you believe you can download or run files from without damaging your computer or data or that you consider not a security risk. Answer D is incorrect because restricted zone sites are those that you do not trust to download or run files from because they might damage your computer or data, or those that are considered a security risk.

Question 41

Answer C is correct because the Windows Vista Ultimate edition includes everything that all the others offer. Answers A and B include more features than most of the other versions, but Ultimate has additional features. Answer D is incorrect because there is no Advanced edition.

Question 42

Answer C is correct because you need to have a pop-up blocker to stop the windows from opening. Answers A and B are incorrect because they will not stop the pop-up windows. Answer D is incorrect because Windows Defender will protect against spyware. However, Windows Defender will help little against some pop-ups that are generated by spyware programs.

Question 43

Answer A is correct because ActiveX is the popular control used in Internet Explorer. Answer B is incorrect because OLE allows you to cut, copy, and paste objects from one document to another document, even between different applications. Answers C and D are incorrect because these are programming languages.

Question 44

Answer B is correct because RSS, short for Rich Site Summary, is used to get feeds from websites when new content is published. Answer A is incorrect because ActiveX includes special controls used in Internet Explorer plug-ins. Answer C is incorrect because this is a type of font created by Adobe. Rich Text Format is a file format that supports fonts, font styles (such as bold, underline, and italics), and varying font sizes.

Question 45

Answer B is correct because the Trusted Platform Module (TPM) is a special microchip that supports advanced security features. Answer A is incorrect because ActiveX includes special controls used in Internet Explorer plug-ins. Answer C is incorrect because Dynamic Protection is used to make sure web applications cannot access files on the computer. Answer D is incorrect because NTFS is a file system.

Question 46

Answer C is correct because EFS, which is short for Encrypted File System, is used to encrypt individual files. Answer A is incorrect because NTFS is the secure file system used in Windows Vista that supports both compression and EFS. Answer B is incorrect because compression is used to compress files, not encrypt them. Answer D is incorrect because BitLocker is used to encrypt entire disk volumes.

Question 47

Answers A and D are correct. All administrators are automatically given the necessary permission to use Windows Remote Desktop. For other users, you must add them to the Remote Desktop Users group. Answer B is incorrect because the Power Users group is mostly used for backward compatibility. Answer C is incorrect because there is no Remote Desktop Administrators group.

Question 48

Answer C is correct because the file in which the memory content is saved during hibernation is hiberfil.sys. Answer A is a made-up file. Answer B is the name of the paging file used in Windows XP and Vista. Answer D is incorrect because Power.sys is a system file used in Windows to help manage power settings.

Question 49

Answer A is correct. Windows Vista supports offline folders to help keep file synchronized. Answer B is a possible solution, but using a login script requires some skill and can be a lengthy process because it copies files from one drive to another. It might also overwrite newer files. Answer C is incorrect because Distributed File System (DFS) is only available on Windows servers. Answer D is not a viable option.

Question 50

Answer B is correct because the Windows Mobility Center can be used to disable both USB and Bluetooth connections. Answer A is incorrect because the Windows Hardware Disable tool does not exist at the time of this writing. Answer C is incorrect because the System Configuration utility (msconfig.exe) is a troubleshooting tool that can be used to disable startup programs and services. Answer D is incorrect because the Registry Editor is used to edit the registry, which holds most of the configuration information for hardware and software programs.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.26.138