Appendix . Answers to Practice Exam

1.

A. On the Exceptions tab of the Windows Firewall Settings dialog box, you should enable the Remote Administration option. This option enables the management of remote computers by means of utilities that utilize RPC. Remote Assistance enables a user to seek assistance from an expert on another computer but does not enable RPC-based utilities, so answer B is incorrect. Remote Desktop enables you to connect to your computer from another computer running Windows XP or Vista but does not enable RPC-based utilities, so answer C is incorrect. It is not necessary to enable TCP port 135 because it is simpler to enable Remote Administration, so answer D is incorrect. Remote Procedure Call is not a program that you can add to the Exceptions list using the Add Program button, so answer E is incorrect. For more information, see the section, “Basic Windows Firewall Configuration,” in Chapter 5.

2.

B and F. You should open the Internet Properties dialog box and select the Security tab. Select the Trusted Sites zone and click the Sites command button. From the Trusted Sites dialog box you can add the Exam Prep website to the Trusted Sites list. On the same dialog box you should clear the Require Server Verification (https:) for All Sites in this Zone check box. The Trusted Sites zone is the zone that you should use for sites whose content you trust not to damage a user’s computer or data, such as sites of trusted business partners. By default, server verification is required for all sites in the Trusted Sites zone, so you should clear this check box to remove this requirement.

The Local Intranet zone is used for websites on your organization’s intranet, though you can also add external websites to this zone. By default, this zone does not enable downloading of unsigned ActiveX controls. Consequently, you should not add the Exam Prep site to this zone, so answers A and E are incorrect. Enabling the Download Unsigned ActiveX Controls option would leave your computer open to rogue websites downloading malicious ActiveX controls, so answer C is incorrect. The Include All Sites that Bypass the Proxy Server option would cause Internet Explorer to interpret local intranet sites as being in the Internet zone rather than the Local Intranet zone. This setting is not relevant to this situation, so answer D is incorrect. The Initialize and Script ActiveX Controls Not Marked as Safe for Scripting option would also leave your computer open to malicious ActiveX controls, so answer G is incorrect. For more information, see the section, “Configuring Internet Explorer Zones,” in Chapter 5.

3.

A, C, and G. Three things must be in place before Suzanne can connect a Remote Desktop Connection to her home computer: (1) the corporate router and firewall must allow the RDP traffic to be transmitted, (2) Suzanne’s home computer’s Windows Firewall must be configured to allow an exception for RDP traffic, and (3) Suzanne’s home computer must be configured to enable Remote Desktop services with Suzanne’s user account granted permission to connect. The standard port is TCP 3389 for RDP. Answers B, D, E, and F are all incorrect because you do not need to configure anything on Suzanne’s laptop, nor do you need to enable Internet Connection Sharing. Answer F is also incorrect because the Create Invitations that Can Only be Used from Computers Running Windows Vista or Later check box is used when configuring Remote Assistance and not Remote Desktop. For more information, see the section, “Remote Desktop,” in Chapter 6.

4.

D. To be better protected, you should enable the Windows Firewall on Mary’s home computer for the network adapter that is connected to the Internet. Answer A is incorrect because blocking all cookies does not protect the computer from directed traffic. Answers B and C are incorrect because the traffic is passing into Mary’s home computer, from which the laptop could then be exposed to viruses or other problems. You do not need to protect the laptop’s wireless connection if you can protect both the laptop and the home computer by enabling the firewall on only the home computer, where it connects to the Internet, which is on the Ethernet interface leading to the broadband modem. For more information, see the section, “Using a VPN Connection to Connect to Computers,” in Chapter 6.

5.

C. You should check the Setuperr.log file first. This file records only the errors generated during Setup, including those errors generated by hardware or driver issues. Setupact.log records modifications performed on the system during Setup. While it may display some errors, it is not the best location to look first, so answer A is incorrect. Setupapi.log records data for each time an INF file is called and implemented but not setup errors, so answer B is incorrect. WindowsUpdate.log records information about transactions performed by Windows Update, but not errors, so answer D is incorrect. Scesetup.log records security settings but not setup errors, so answer E is incorrect. For more information, see the section, “Troubleshooting Failed Installations,” in Chapter 2.

6.

A. The Navigational Flicks and Editing Flicks option in the Flicks tab of the Pen and Input Devices dialog box enables you to employ pen flicks to perform operations such as copy, paste, delete, and undo. It also enables additional options that you can customize. The Pen Options tab of the Pen and Input Devices dialog box enables you to modify settings for actions such as single and double taps, but it does not enable editorial options, so answer B is incorrect. The Gestures tab enables you to choose the desired gesture for scratching out written text but not copy or paste, so answer C is incorrect. The Automatic Learning feature is used to train the handwriting recognizer to translate your handwriting style to text. It also does not enable editorial options, so answer D is incorrect. For more information, see the section, “Pen Flicks,” in Chapter 9.

7.

B. Jennifer should access the Parental Controls feature and select Ryan’s user account. Under Web Restrictions, select the Edit the Allow and Block List option and then add the URLs of the undesirable websites to the Blocked Web Sites list. Doing so prevents Ryan from visiting these sites. If she were to select the High Web restriction level, other websites that are needed might be blocked, so answer A is incorrect. The Restricted Web Sites list places security-based restrictions on websites but does not prevent Ryan from viewing them, so answer C is incorrect. Adding the websites to the list in the Privacy tab of the Internet Explorer Options dialog box prevents these websites from placing cookies on the computer, but does not prevent Ryan from viewing them, so answer D is incorrect. For more information, see the section, “Configuring Parental Restrictions,” in Chapter 4.

8.

B. You should access the International tab of the Junk Email Options dialog box and click the Blocked Top-Level Domain List command button. Then select the countries from which you have received unwanted email. This prevents any email from addresses ending in the top-level domains from these countries from arriving in your inbox unless the address has been specified in the Safe Senders list. The Blocked Encoding List blocks emails encoded in specific character sets but does not specifically block messages from unwanted countries, so answer A is incorrect. Adding the Internet domain addresses of the senders from which you have received unwanted email prevents email from these addresses from reaching your inbox but does not stop email from other addresses in these countries, so answer C is incorrect. The High filtering option blocks a large range of unwanted messages but might block wanted messages as well, so answer D is incorrect. Selecting Add Sender’s Domain to Blocked Senders List in the Message menu would block only the sender of the selected message. You would need to do this for each unwanted message, and furthermore this would not stop email from other addresses in these countries, so answer E is incorrect. For more information, see the section, “Spam and Phishing,” in Chapter 7.

9.

A. You should use the Startup Repair tool to diagnose and repair the problem. This tool attempts to recover a computer that is unable to start normally. Among the problems this tool can repair is that of missing or corrupted device drivers. You cannot use the Last Known Good configuration because Kathy logged on successfully after the first reboot, so answer B is incorrect. You cannot access Safe Mode because Kathy stated the computer would not even boot after it locked up, so answer C is incorrect. The Recovery Console option in Windows 2000 and XP has been replaced by the Startup Repair tool in Vista, so answer D is incorrect. You should not reinstall Vista unless you have exhausted all other repair options, so answer E is incorrect. For more information, see the section, “Troubleshooting Startup Issues,” in Chapter 4.

10.

C. George should boot the computer with the Vista DVD. He should select the option to perform a clean installation, select the third partition, format this partition with the NTFS file system, and install Vista on this partition. This procedure installs Vista while keeping the XP installation intact. On rebooting, he will receive a boot menu from which he can select either XP or Vista. If he were to select the first partition, he would destroy the XP installation, so answer A is incorrect. If he were to select the upgrade option, he would upgrade XP to Vista and would no longer have access to XP, so answer B is incorrect. If he were to format both partitions and install Vista before reinstalling XP, he would lose all his previously configured settings in XP. Further, he would damage the Vista installation because when you install more than one operating system, you should install the oldest operating system first. Consequently, answer D is incorrect. For more information, see the section, “Performing a Clean Installation of Windows Vista,” in Chapter 2.

11.

B. Windows Update downloads updates to Windows Defender as well as updates to other components of Vista. To ensure that these updates are downloaded and installed automatically, you must select Install Updates Automatically (Recommended). To ensure that all updates (and not just critical updates) are installed, you also must select Include Recommended Updates When Downloading, Installing, or Notifying Me About Updates. The Download Updates But Let Me Choose Whether to Install Them option downloads updates but does not install them automatically, so answer A is incorrect. If you select Check for Updates on the Windows Defender home page, you receive currently available updates to Windows Defender definition files, but future updates are not automatically downloaded or installed, so answer C is incorrect. If you select this option from Windows Update, all currently available Windows Updates are offered for download, but no automatic installation takes place, so answer D is incorrect. For more information, see the sections, “Updating Windows Defender,” in Chapter 5 and “Working with Windows Update,” in Chapter 8.

12.

D. You should specify Susan’s email address in the Receipts tab of the Fax Options dialog box. This enables Susan to receive an email when a recipient receives faxes she has sent. If Susan’s computer is off, she will receive the email when she turns it back on. The Allow the Device To Send Faxes and Allow the Device to Receive Fax Calls option must be selected to send faxes at all, and it by itself does not send notifications back to Susan, so answer A is incorrect. The Notify of Success and Failure for Incoming Faxes and Notify of Success and Failure for Outgoing Faxes options would display a balloon tip in her notification area. If Susan’s computer is turned off, she would not receive this balloon tip, so answer B is incorrect. There is no Properties dialog box associated with fax accounts in the Fax Accounts dialog box, so answer C is incorrect. For more information, see the section, “Sending and Receiving Faxes,” in Chapter 7.

13.

A. When you upgrade to an edition of Vista, the Windows.old folder holds subfolders and files from the previous operating system. The Program Files folder holds the current applications only, so answer B is incorrect. The Documents and Settings folder holds current user-specific documents and settings. It does not hold previous settings, so answer C is incorrect. Software Explorer is a utility that enables you to view and manage programs. It also does not hold previous settings, so answer D is incorrect. For more information, see the section, “Upgrading to Windows Vista from a Previous Version of Windows,” in Chapter 3.

14.

C. You should select the OS Boot Information option from the Boot tab of the System Information utility, which is started by typing msconfig. This tool enables you to disable common services and startup programs to selectively troubleshoot which items are preventing a normal startup. By selecting the OS Boot Information option, you can see which drivers are being loaded during startup. This can assist you in determining which driver is causing her computer to not start properly. The Diagnostic Startup option loads only basic drivers and services but does not display driver names during startup, so answer A is incorrect. The Boot Log option logs information from the boot procedure to %systemroot%Ntbtlog.txt. It does not display driver names, so answer B is incorrect. The Disable All option disables all startup programs but does not display driver names, so answer D is incorrect. For more information see the section, “System Configuration Utility,” in Chapter 8.

15.

D. You should access the Compatibility tab of each program’s Properties dialog box and select the Run This Program as an Administrator option. Doing so enables the program to run without requesting administrative credentials. Specifying Elevate Without Prompting would enable the program to run without displaying a UAC prompt only for administrative users. This would not help a non-administrative user, so answer A is incorrect. The local Power Users group is not used in Vista except for enabling certain legacy applications to run. Shelley would still receive a prompt requesting an administrative password if she were made a member of this group, so answer B is incorrect. The Parental Controls feature simply allows Shelley to run this program but does not drop the need for specifying an administrative password, so answer C is incorrect. For more information see the section, “Configuring User Account Control,” in Chapter 5.

16.

A. You should access the DVD drive’s Properties dialog box in Device Manager, select the DVD Region tab, and select Japan from the list provided. Different regions of the world use different DVD encoding, and you cannot play a DVD from one region in a player configured to play a DVD from a different region. Note that Windows provides a maximum of five DVD region changes for any given DVD drive, after which you cannot change the region specified for the drive. This setting is not available from the Properties dialog box accessed from Computer, so answer B is incorrect. Changing the DVD setting to Japanese in Windows Media Center affects only audio and subtitle languages for DVDs that you play and does not enable you to play a DVD from another region, so answer C is incorrect. The Regional and Language Options Control Panel applet specifies the language used for displaying localized content in Windows, so answer D is incorrect. A codec is a software program used to compress or decompress digital media. It does not enable the playing of a DVD from another country, so answer E is incorrect. For more information see the section, “Setting Up Windows Media Player,” in Chapter 7.

17.

B and C. To share the modem, one computer should be connected to both the modem and the network. That computer should be configured with ICS. This automatically begins a simplified DHCP service, with a DNS forwarding service and NAT service, to the rest of the computers. The remaining computers should all be configured as DHCP clients because they receive their IP address information from the sharing computer. Answer A is wrong because there is no need to install a router that uses NAT. You likely do not need to modify the default configuration of Windows Firewall, which means answer D is wrong. Answer F is wrong because the modem either obtains an IP address, or it is configured with a static IP address—either way, it is still able to be shared. Answer E is wrong because only one computer needs to share the Internet connection. Answer G is wrong because you do not want to create a bridge on any of the computers. For more information, see the section, “Configuring and Troubleshooting Internet Connection Sharing,” in Chapter 6.

18.

B, C, and E. Windows translucency and the Flip 3D feature are components of the advanced Aero Glass display appearance. To enable Aero Glass, Evan should set the color depth to 32 bits, set the theme to Windows Aero, and set the refresh rate to a value greater than 10 hertz. Aero Glass will not appear if the color depth is set to 16 bits, so answer A is incorrect. The screen resolution is immaterial to whether or not Aero Glass appears, so answers D and F are incorrect. A graphics memory bandwidth of 1800MB is required for Aero Glass if the screen resolution is set to 1280×1024 or higher but is not necessary if the screen resolution is set to a lower value. Therefore, answer G is incorrect. For more information, see the section, “Understanding Hardware Requirements for Running Aero,” in Chapter 4.

19.

B. You should use the EAP authentication protocol. This is the only authentication protocol that works with smart cards. None of PAP, CHAP, or MS-CHAP v.2 work with smart cards, so answers A, C, and D are incorrect. For more information, see the section, “Remote Access Authentication Protocols,” in Chapter 6.

20.

B and D. Joe can configure the computer’s power button action to shut the computer down on battery power by selecting Shut Down from the Power Button Action option in the Power Options dialog box or by selecting the same option after clicking Change Plan Settings under the current power plan. Either of these actions configures the computer’s power button to shut the computer down completely rather than enter Sleep mode. The Power Saver power plan by default does not shut the computer down when the power button is pressed, so answers A and F are incorrect. Answer C is incorrect because this action shuts the computer down when Joe clicks the Start Menu power button rather than pressing the computer’s power button. Answer E is incorrect because this action prevents the computer from entering Sleep mode but does nothing for changing the default action when the computer’s power button is pressed. For more information, see the sections, “Additional Power Plan Options,” and “Advanced Power Settings,” in Chapter 9.

21.

A, B, and E. When you upgrade from Windows XP to Windows Vista, the upgrade retains all applications, folders, and settings. System restore points and backups of Registry files are removed. Neither applications nor their settings are removed, so answers C and D are incorrect. For more information, see the section, “Upgrading to Windows Vista from a Previous Version of Windows,” in Chapter 3.

22.

B. You should upgrade the RAM. All editions of Windows Vista require a minimum of 512MB RAM, and for better performance (premium ready), 1GB RAM. The specifications indicated for processor and hard drive meet the premium ready requirements for Vista, so answers A and C are incorrect. The specifications for the video card meet the minimum requirements but not the premium ready requirements. Ted will be unable to run Aero Glass, but he will be able to install Vista with this video card, so answer D is incorrect. The network card is also adequate for Vista, so answer E is incorrect. For more information, see the section “Identifying Hardware Requirements” in Chapter 2.

23.

B. Software Explorer is a component of Windows Defender that enables you to view information about software programs and system state on your computer. It provides information about startup type among other items. You can select any unfamiliar programs and then click the Remove button to prevent them from starting. It would be possible to prevent programs from running at startup by examining the CurrentVersionRun Registry keys and removing unfamiliar entries, but this would take far more administrative effort (indeed, you needed to do this with older Windows operating systems); therefore, answer A is incorrect. The Exceptions tab in the Windows Firewall Settings dialog box enables you to specify which programs can access your computer across the Internet. It is most likely that the problem program is present on Phil’s computer because no other computers are experiencing the same problem, so answer C is incorrect. The System Information utility provides a list of startup programs, but you cannot delete entries from this location, so answer D is incorrect. For more information, see the section, “Using Software Explorer,” in Chapter 5.

24.

A. Steve received this message because the USB drive has both fast and slow memory. ReadyBoost is able to use only the fast memory in a USB drive to boost system performance. If the drive has fast memory only, he would not receive this message, so answer B is incorrect. If the drive has slow memory only, he would be unable to use it at all and would receive a different message, so answer C is incorrect. The drive exceeds the minimum of 256MB required for use with ReadyBoost, so answer D is incorrect. For more information, see the section, “Windows ReadyBoost,” in Chapter 8.

25.

D. Sharon should back up all her files. She should then boot her computer from the Windows XP Professional CD-ROM, format the partition containing Vista, and reinstall Windows XP. This is the only way she can take her computer back to running Windows XP. Sharon cannot use the Winnt32.exe command because this command is used only for upgrading an older Windows version such as Windows 2000 to Windows XP and not for downgrading a newer Windows version such as Vista, so answer A is incorrect. Unlike Windows XP, Vista does not offer an Uninstall option in the Control Panel Programs applet, so answer B is incorrect. System Restore can restore her computer to an earlier point in time, but only within Vista. It cannot be used to restore Windows XP, so answer C is incorrect. For more information, see the sections, “Upgrading the Computer to Windows Vista,” in Chapter 3 and “Troubleshooting Startup Issues,” in Chapter 4.

26.

B. You should right-click the news feed gadget and choose Opacity and then increase the opacity level to 100 percent. Windows Sidebar offers the option to reduce the opacity of gadgets and enable anything hidden beneath them to become visible. In this case, you do not want this to occur so that Brian is able to see the headlines clearly. The Bring Gadgets to Front option places the gadgets above other screen items but does not improve visibility if the opacity is set to less than 100 percent, so answer A is incorrect. The Ease of Access Center enables you to select a desktop scheme for vision-impaired users but also does not improve visibility if the opacity is set to less than 100 percent, so answer C is incorrect. Reducing the number of headlines does not affect their visibility, so answer D is incorrect. For more information, see the section, “Windows Sidebar Gadgets,” in Chapter 7.

27.

A. SIM enables you to create answer files from information included in a Windows image (.wim) file and a catalog (.clg) file. The answer file created by SIM is named Unattend.xml, and you should copy this file to a floppy disk and insert the disk after the computer to be installed with Vista has booted from the DVD-ROM. Windows XP and older operating systems used the answer file named Unattend.txt. This file is not used with Vista, so answers B and D are incorrect. Sysprep.exe is used to create an image of a Vista installation for deployment to other computers. It is not used to create answer files, so answers C and D are incorrect. For more information, see the section, “Creating an Answer File,” in Chapter 2.

28.

C. For the Offline Files feature to function properly, users must have the permission to write new files to the folder and to create new subfolders. The Write permission provides this functionality. You would select the local Users group because the Domain Users global group is automatically made a member of all the Users groups. Answer A is incorrect because you cannot convert a file system back to FAT32. In addition, Offline Files requires the file system to be NTFS. Answer B is incorrect because laptops do not support dynamic disks. Answer D is incorrect because you do not want to grant any domain global groups permissions—the correct procedure is to grant permissions to local groups and place the global groups in the local groups as needed. For more information, see the sections, “Belonging to a Windows Server Domain,” in Chapter 5 and, “Synchronizing with Network Folders,” in Chapter 9.

29.

A. Jason should run the Windows Vista Upgrade Advisor. This tool generates reports describing hardware and software components that may not be compatible with Windows Vista, thereby alerting him to problems that might occur when he upgrades his computer. The Windows Vista Program Compatibility Wizard enables Jason to configure older programs to work properly with Vista after he has upgraded, so answer B is incorrect. The Windows Vista Easy Transfer Wizard is used to transfer files and settings from an older computer to a new Vista computer, so answer C is incorrect. While he can upgrade drivers from Device Manager in Windows XP, he might still have other compatibility issues that would be divulged when running the Upgrade Advisor, so answer D is incorrect. For more information, see the section, “Vista Upgrade Advisor,” in Chapter 3.

30.

B. Heather should designate the external monitor as the primary display. By default, the built-in display is designated as the primary display, but Heather can change this from the Display Properties dialog box. If she mirrors her desktop to the external monitor, the Start button and taskbar would appear on both monitors, and the built-in display would not function as a secondary display, so answer A is incorrect. If she shows her desktop on the external monitor only, the built-in display again would not function as a secondary display, so answer C is incorrect. It is not possible to drag the Start button or the desktop to the external display; this is possible only for program and Explorer windows, so answer D is incorrect. For more information, see the section, “External Monitors,” in Chapter 9.

31.

C and D. Windows Defender provides two methods that you can use to prevent alerts from happening with desirable programs such as the CAD program in this scenario. You can add the folder containing the program to the list in the Do Not Scan These Files or Locations section under Advanced Options in the Options page. Alternately, when an alert appears, you can select the program and click Always Allow. The program will not appear in the list of quarantined items unless it has been quarantined; furthermore, removing it from this list will not prevent future alerts from appearing, so answer A is incorrect. The Allowed Items page only displays allowed programs and enables you to remove programs from the list; it does not have an Add option, so answer B is incorrect. For more information, see the section, “Scanning for Malicious Software,” in Chapter 5.

32.

D. The problem was due entirely to a misconfigured default gateway address. When the default gateway address is incorrect, the data that is transmitted to the network does not have a path to exit to other subnets. The Ipconfig output confirms that the default gateway address is not the same as the router’s address for subnet A. The output also confirms that the error is not caused by name resolution or a router misconfiguration. Answers A and B are wrong because the data revealed that there was a problem with the IP configuration. Answer C is incorrect because the subnet mask was correct and does not need to be changed. For more information, see the section, “Using TCP/IP Utilities to Troubleshoot TCP/IP,” in Chapter 6.

33.

D. You can configure the APP application to start in a lower priority and take less processing power by editing the shortcut on the Start menu to have a low priority. Answers A and B are wrong because you do not want to change the performance management of the entire computer based on the poor performance of one application. Answer C is wrong because Realtime mode takes up even more processing power, plus it can cause a computer crash. Answer E is wrong because the /Min switch minimizes the application window while the application is running, which does not affect the processor usage. For more information, see the section, “Configuring Application Priority,” in Chapter 8.

34.

C. You should click the down arrow next to the Search area in the Internet Explorer address bar. From the menu displayed, select the desired search provider. This procedure changes the search provider for the duration of the current Internet Explorer session, after which it reverts to the default you have configured. The Settings button on the Privacy tab of the Internet Options dialog box enables you to configure the pop-up blocker and not the search provider, so answer A is incorrect. Selecting a search provider by either clicking Settings from the Search section of the General tab or clicking Change Search Defaults from the Tools menu changes the search provider permanently, so answers B and D are incorrect. For more information, see the section, “Customizing Search Providers,” in Chapter 4.

35.

A. Sheila should instruct the users to run the ipconfig /flushdns and ipconfig /registerdns commands. The ipconfig /flushdns command flushes the contents of the DNS cache, and the ipconfig /registerdns command renews all adapters’ DHCP leases and refreshes the DNS configuration. It is probable that the users’ computers have cached the old IP address of Server1 and are hence unable to locate this computer, so running these commands flushes the cache and loads new DNS information that contains the new IP address of Server1. The ipconfig /release and ipconfig /renew commands release and renew IP address leases for the client computers. The ipconfig /displaydns command displays the contents of the DNS cache. The nbtstat -R command displays NetBIOS name resolution statistics. The nslookup command accesses the DNS server and displays information records on this server. None of these commands obtain IP address information for Server1, so answers B, C, D, and E are incorrect. For more information, see the section, “Using TCP/IP Utilities to Troubleshoot TCP/IP,” in Chapter 6.

36.

B and D. You should attach the card reader first. When you do this, the Found New Hardware Wizard should start, and you should then insert the CD-ROM and follow the instructions provided by the wizard to install the drivers and support applications. You should not install the drivers and applications first, so answer A is incorrect. It is not necessary to access Device Manager to install the drivers and applications, so answer C is incorrect. You should attach the card reader before inserting the CD-ROM, so answer E is incorrect. For more information, see the section, “Managing and Troubleshooting Drivers and Driver Signing,” in Chapter 2.

37.

A. You should select the check box labeled Apply Default Actions to Items Detected During a Scan. This option automatically removes spyware or other types of malware at the conclusion of a scan. The check box labeled Check for Updated Definitions Before Scanning ensures that Windows Defender is up-to-date with regard to spyware definitions. While this check box should be selected, it does not remove malicious software automatically, so answer B is incorrect. If you choose Ignore from the Default Action list for low alert items, Windows Defender will ignore all low alert items, which is not the recommended action, so answer C is incorrect. If you choose Full System Scan from the Type of Scan drop-down list, more locations will be scanned than stated in the requirements, so answer D is incorrect. For more information, see the section, “Configuring Windows Defender Actions,” in Chapter 5.

38.

D. You should upgrade your home computer to Vista Ultimate. Although Vista Home Premium contains a large range of features suitable for advanced home users wanting full media capabilities, it does not include business-oriented features such as Remote Desktop. Remote Assistance is designed to allow expert users to assist novices in the use of their computers. It does not enable you to work on your remote office computer, so answer A is incorrect. Enabling Remote Administration also does not enable you to access your remote office computer, so answer B is incorrect. Microsoft does not support an upgrade path to Windows Vista Business from Vista Home Premium, so answer C is incorrect. For more information, see sections, “Windows Vista Editions,” in Chapter 1, “Upgrading from One Edition of Windows Vista to Another,” in Chapter 3, and “Remote Desktop,” in Chapter 6.

39.

C. You can encrypt the contents of the Clients folder by using the cipher /e command. To ensure that other tax preparers can use the files, you must add each preparer’s file encryption certificate to the Encryption attributes options. Answer A is wrong because that would render users incapable of accessing the resources. Answer B is wrong because it would render the computer fully open to anyone who happened to pass by and log on. Answer D is incorrect because the /d switch causes files to be decrypted rather than encrypted. For more information, see the section, “Encrypting Files,” in Chapter 8.

40.

B. You should use email to distribute the invitation file to the Toronto office. When you post an invitation to the People Near Me location, it is available to all users on the same subnet but not other subnets. Answer A is incorrect because users in Toronto are able to see other meetings, so Windows Firewall must be configured properly. Answer C is incorrect because the Invite People Near Me list contains only those who are signed in to the People Near Me application, so the invitation would not reach others who are needed. Answer D is incorrect because this option must already have been selected or people in San Francisco would have been unable to see the invitation. For more information, see the section, “Running Meetings,” in Chapter 7.

41.

C. You should configure computers on the network with site local unicast IPv6 addresses. These addresses are equivalent to the private IPv4 addresses and are used for communication between nodes located in the same site. This provides addresses that are private to an organization but unique across all the organization’s sites. Global unicast addresses are globally routable Internet addresses that are equivalent to the public IPv4 addresses. They are not private, so answer A is incorrect. Link local unicast addresses are equivalent to APIPA-configured IPv4 addresses and are used on networks without a DHCP server, so answer B is incorrect. Multicast addresses provide interfaces to which packets are delivered to all network interfaces identified by the address. This is not appropriate, so answer D is incorrect. Anycast addresses are only utilized as destination addresses assigned to routers, so answer E is incorrect. For more information, see the section, “Types of IPv6 Addresses,” in Chapter 6.

42.

A. You can restart the computer with the Last Known Good Configuration. The Last Known Good Configuration can be used because John didn’t log on after the Stop error. Answers B, C, and D are wrong because they all require more time and effort than using the Last Known Good Configuration. For more information, see the section, “Last Known Good Configuration,” in Chapter 4.

43.

B. Lisa should turn off the Windows Media Player gadget in Windows SideShow. Windows SideShow enables the use of an auxiliary display in a portable computer lid or an external device such as a cell phone to perform basic functions such as displaying email alerts and so on by means of small utilities known as gadgets. Windows Sidebar also uses gadgets but only on the computer itself, so answer A is incorrect. The Power Settings dialog box provides advanced configuration of power plan options but does not include the capability to turn gadgets off, so answer C is incorrect. This use of the cell phone does not involve a sync partnership, so answer D is incorrect. For more information, see the section, “Windows SideShow,” in Chapter 9.

44.

D. You should ask the receptionists to publish their calendars to a shared folder location. Windows Calendar allows you to share and publish calendars, and others can subscribe to the published calendars so that they know each others’ planned activities. It is not necessary to ask them to create a common calendar because Windows Calendar enables you to publish calendars, so answer A is incorrect. Having users log on as each other requires that they share passwords and creates a serious security risk, so answer B is incorrect. It is not necessary to create a new user account because you can publish calendars. Furthermore, this would also create a security risk, so answer C is incorrect. For more information, see the section, “Sharing Calendars,” in Chapter 7.

45.

C and F. You can upgrade computers running Windows XP Home Edition and Windows Vista Home Basic to Windows Vista Home Premium without the need to reinstall all applications and user settings. Answers A, B, D, and E are wrong because all other computers listed in this question require a clean install of Vista, which requires that applications and user settings be reinstalled. For more information, see the sections, “Upgrading to Windows Vista from a Previous Version of Windows,” and “Upgrading from One Edition of Windows Vista to Another,” in Chapter 3.

46.

B and E. To delete passwords, cookies, and form data that you have stored on the computer, you should access the Delete Browsing History dialog box and click Delete All. You can reach this dialog box either from the General tab of the Internet Options dialog box or from the Tools menu in Internet Explorer 7. Then to clear automatically completed names and passwords, you should access the Content tab of the Internet Options dialog box. Click Settings in the AutoComplete section, and then clear the check box labeled User Names and Passwords on Forms. The Temporary Internet Files and History Settings dialog box does not have an option for deleting browsing history, so answer A is incorrect. Clearing the check box labeled Turn on Feed Reading Now stops the downloading of RSS feeds but does not remove stored passwords, so answer C is incorrect. Changing the security level for the Internet zone to High also does not remove stored passwords, so answer D is incorrect. For more information, see the section, “Customizing Internet Explorer,” in Chapter 4.

47.

A. You should change the behavior of the Elevation Prompt for Administrators in Admin Approval Mode setting to Elevate Without Prompting. This setting is found in the Local Security Policy console. By selecting the Elevate Without Prompting option, you can prevent the UAC prompt from appearing when Wendy makes administrative changes to her computer. Changing the behavior of the Run All Administrators in Admin Approval Mode setting would disable the appearance of all UAC prompts. This would reduce security on the computer by enabling rogue programs to install or run without displaying a UAC prompt, so answer B is incorrect. Adding Wendy’s user account to the Domain Admins group would give her unnecessary privileges across the network; furthermore, it would not prevent the UAC prompt from appearing in these circumstances, so answer C is incorrect. Selecting the Run as Administrator check box would always cause the programs to display a UAC prompt, so answer D is incorrect. For more information, see the section, “User Account Control Policies,” in Chapter 5.

48.

D. You should enable the Password Protected Sharing option. This option increases security by limiting access of shared files and printers to only those who have a user account and password on your computer. Vista allows you to specify the usernames of users allowed to access a shared folder. However, this option does not prevent users without passwords from accessing the shared folders or the Public folder, so answer A is incorrect. The Public Folder Sharing option enables others on the network to access files in your Public folder. This option does not prevent users without passwords from accessing the Public folder, so answer B is incorrect. The Network Discovery option enables your computer to locate other computers and devices on the network and other computers to locate yours. Disabling this option would prevent users from accessing shares on your computer, so answer C is incorrect. For more information, see the section, “Using the Network and Sharing Center to Configure File Sharing,” in Chapter 6.

49.

B. You should select SIM so that you can create an answer file and then deploy a scripted installation. Answer A is wrong because you don’t have access to a server; you cannot use WDS. Answer C is wrong because you don’t have access to third-party tools; you should not use Sysprep. Answer D is wrong because you were not given a DVD to use; you cannot use the unattended installation using a DVD. For more information, see the section, “Using Windows System Image Manager to Create Unattended Answer Files,” in Chapter 2.

50.

E. The Import option in the File menu enables you to import contacts, messages, and account settings from another program including Outlook. You should select Messages, specify the required format, click Next, and confirm the location displayed or type the proper location. The Tools menu enables you to import account information but not messages, so answer A is incorrect. The Messages menu does not have an Import option, so answers B and C are incorrect. You should import messages and not email accounts, so answer D is incorrect. For more information, see the section, “Configuring Mail Options,” in Chapter 7.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.190.211