Windows XP Final Review by stariya

VIEWS: 136 PAGES: 17

									Windows XP Final Review

True/False
Indicate whether the statement is true or false.

____    1. The left column of the Windows XP Start menu is divided into the frequently used programs list in
            the upper section and the pinned items list in the lower section.

____    2. Programs may not be pinned to the pinned items list in the Start Menu.

____    3. Windows XP natively supports the writing of files and video directly to CD-R and CD-RW media,
            eliminating the need for third-party applications.

____    4. The CD recording feature included in Windows XP provides OEMs (original equipment
            manufacturers) the option to create applications that can generate emergency boot CDs.

____    5. A domain is a physical network structure that must include a Windows Server product and a domain
            controller.

____    6. A FAT32 partition that already contains a Windows XP Professional installation can be converted to
            NTFS without loss of data.

____    7. A Windows XP Professional computer that was not joined to a domain during its initial installation
            can be added to a domain at a later time without reinstallation of the operating system.

____    8. A “quick” format of a hard disk upon partitioning seriously shortens the lifespan of the disk and may
            affect its ultimate reliability.

____    9. It is essential to choose the correct networking protocols upon initial installation of the Windows XP
            Professional operating system. Networking protocols form the foundation of the operating system
            installation and cannot be modified after initial setup.

____ 10. The use of striped volumes provides the best performance and safety of all Windows XP
            Professional disk management strategies.

____ 11. Disk Cleanup frees up disk space by deleting temporary files and uninstalling programs.

____ 12. Windows XP Professional is installed on the system partition, an active partition that includes the
            hardware-specific files required to load the operating system. This location, also referred to as the
            boot partition, must be located on drive C.

____ 13. You can convert a dynamic disk back to a basic disk without losing any data.

____ 14. Members of the Everyone Group are more trusted than members of the Authenticated Users Group.
____ 15. There is no way to cause Windows XP to retain permissions when an object is copied or moved to
            another NTFS volume.

____ 16. Administrators and users with the Full Control permission are the only users who can assign file and
            folder permissions to user accounts and groups.

____ 17. Administrators can take ownership of a folder or file, regardless of assigned permissions.

____ 18. There are three Microsoft command-line tools for setting or viewing NTFS permissions available for
            use with Windows XP.

____ 19. When auditing is enabled for NTFS objects, the results of the auditing for the system being audited
            can be monitored in the Security event log.

____ 20. Marlon is the Backup Administrator of the Contoso Domain. He is trying to devise a scheme by
            which he can back up the entire documents folder used by the editorial department to create
            advertising documents, news releases, and the like. Marlon has been frustrated in his efforts to
            achieve a consistently error-free backup by the fact that users in the editorial department frequently
            access documents remotely through the corporate VPN while the backup is running. In these cases,
            backup will skip these files because they are open during the backup routine. In discussing his
            problem with Archie, a Help Desk technician, Archie informs Marlon that he can write a batch file
            using the command-line tool CACLS.exe to accomplish this goal. Is Archie’s statement true or
            false?

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____ 21. Which of the following aspects of the Windows XP architecture prevents a failing application from
            affecting other applications and the operating system itself?
            a. Applications are insulated from direct manipulation by users or hardware
                resources.
            b. The hardware abstraction layer.
            c. Each application can be run in a protected memory space.
            d. Applications run in a privileged environment referred to as the kernel.

____ 22. You are the administrator of a network in a large company. You want to standardize the Start menu
            on all systems by locking down items so that users cannot add new items or remove items. Which of
            the following will help you achieve this task?
            a. Domain Controller
            b. Active Directory
            c. Group Policy
            d. Security Center

____ 23. To which of the following can you copy icons in order to launch applications from the taskbar
            without having to open the Start menu?
            a. Notification area
            b. Quick Launch toolbar
           c. System Tray
           d. Task Manager

____ 24. Mike wants to be sure that any hardware he adds to his Windows XP Professional system includes
           device drivers that have been tested and approved by Microsoft. Which of the following features
           should he use to configure Windows XP for this purpose?
           a. Windows Hardware Quality Laboratory
           b. Driver rollback
           c. Driver signing
           d. Plug and Play

____ 25. Alex plugs his laptop into his company’s network when he is at the office, and connects to the
           Internet when he is at home with a modem. With his previous operating system, he had to manually
           configure TCP/IP settings when he switched from one location to the other. After upgrading to
           Windows XP Professional, what will he need to do in order to connect to the company network at
           work and to the Internet at home?
           a. Enable DHCP in order to obtain an IP address automatically in both locations.
           b. Continue to manually configure TCP/IP settings when he switches locations.
           c. Use the Auto-Configuration for Multiple Network Connectivity option in
               Windows XP to specify an alternative TCP/IP configuration.
           d. Nothing. The Auto-Configuration for Multiple Network Connectivity will
               automatically configure his computer to connect to the Internet when at home and
               the company network when at the office.
____ 26. You have been hired by a small company to network six computers in one small office that will be
           connected directly to the Internet. The company president wants a cost effective solution that will
           prevent hackers from accessing the gaining access to the computers. What type of network will you
           install, and how will you respond to the president’s security concerns?
           a. Configure all of the computers to participate in a workgroup, and then enable and
               configure the Windows Firewall on each computer.
           b. Configure all of the computers to participate in a workgroup and connect all of the
               computers directly to the Internet.
           c. Set up a domain by designating one computer as the domain controller, and enable
               the Windows Firewall on all computers on the network.
           d. Set up a domain by designating one computer as the domain controller, and
               purchase third-party firewall software for the network.
____ 27. Bert and Ernie share a laptop in a small social services agency with a network set up as a workgroup.
           While talking to clients on the phone, they need to log on and off quickly to access client
           information, but they also want to be sure that unauthorized users cannot access confidential
           information if one of them is logged on and the laptop is unattended. Which Windows XP features
           will address both concerns?
           a. Local Security Policy and Encrypting File System
           b. Local Security Policy and the Windows Firewall
           c. Fast User Switching and the Windows Firewall
           d. Fast User Switching and Encrypting File System
____ 28. Jim works for a large company with approximately 200 computers that participate in a domain. Jim
           has configured his computer to display the Windows XP Welcome screen as his logon prompt, as he
           finds it more visually pleasing, than the standard network Ctrl-Alt-Del logon prompt. What is wrong
           with this scenario?
           a. In a domain, a password is required in order to access a user account.
           b. Networks of over 100 computers must be set up in a workgroup.
           c. If a computer is a member of a domain, the Welcome screen is not an available
               logon prompt choice.
           d. The Windows Firewall is only available to computers in a workgroup.

____ 29. You work at the help desk of a large corporation. A department manager at another site calls to say
           that he tried to connect his new digital camera to his desktop computer through a USB port;
           however, he is getting a message indicating that the BIOS may need to updated in order to support
           the device. He is confused by the message and wants you to check his BIOS version so he can report
           it to the manufacturer. Which of the following options will allow you to do this?
           a. Use Remote Desktop to open the Windows Help and Support Center on his
                computer and select Find Information About the Hardware Installed on This
                Computer.
           b. Use Remote Desktop to open the Windows Help and Support Center on his
                computer and select Use Tools To View Your Computer Information And
                Diagnose Problems.
           c. Use Remote Assistance to open the Windows Help and Support Center on his
                computer and select View General System Information About This Computer.
           d. Go to the Windows Help and Support Center on your computer and select View
                Advanced System Information and View Information For Another Computer.
____ 30. You work at the help desk of a bank with several branch offices. An assistant at one of the branches
           has inherited a laptop from a vice president and wants to find out descriptive information about the
           hardware on her system. She also sees icons on the Start menu for Microsoft Word 2000 and
           Microsoft Excel 2002, and suspects that more than one version of Microsoft Office may be installed.
           She says she has tried to look up this information, but without success. Which of the following is the
           best way to remotely help her learn how to access this information?
           a. Use Remote Assistance to show her how to access My Computer Information in
               Windows Help and Support. In My Computer Information, select and print View
               the Status of My System Hardware and Software.
           b. Use Remote Assistance to show her how to access My Computer Information in
               Windows Help and Support. In My Computer Information, select and print Use
               Tools To View Your Computer Information And Diagnose Problems and View a
               List of Microsoft Software Installed on This Computer.
           c. Use Remote Desktop to show her how to access My Computer Information in
               Windows Help and Support. In My Computer Information, select and print View
               the Status of My System Hardware and Software.
           d. Use Remote Desktop to show her how to access My Computer Information in
               Windows Help and Support. In My Computer Information, select and print Find
               Information About the Hardware Installed on This Computer and View a List of
               Microsoft Software Installed on This Computer.
____ 31. What are the minimum, recommended, and maximum memory parameters for installing and running
           Windows XP Professional?
           a. 32 MB minimum / 64 MB or more recommended / 1 GB Maximum supported
           b. 64 MB minimum / 128 MB or more recommended / 4 GB Maximum supported
           c. 64 MB minimum / 192 MB or more recommended / 4 GB Maximum supported
           d. 128 MB minimum / 256 MB or more recommended / 2 GB maximum supported

____ 32. The default networking protocol used in Windows XP Professional networking, installed during the
           setup phase, is:
           a. NetBIOS
           b. IPX/SPX
           c. TCP/IP
           d. TCP/NWL
           e. ISO

____ 33. The UDB:
         a. Allows unattended installation to continue in spite of errors by supplying generic
              answers for missing or incorrect answer file responses. The installer can easily find
              and correct these errors before finalizing the system build.
           b. Connects to Internet time servers during unattended installation. This determines
              local time and thereby establishes locale data, allowing for unattended installation
              of appropriate languages and regional options.
           c. Contains the configuration settings that make each computer installation unique.
              The UDB modifies a standard answer file by overriding values in the answer file.
           d. Allows unattended installation to proceed even if network identity is duplicated;
              allowing the installer to change system ID’s and corresponding SIDs (Security
              ID’s) before finalizing the system build.
____ 34. Which of the following operating systems, if any, cannot be directly upgraded to Windows XP
           Professional (providing minimum hardware standards are met)?
           a. Windows 95
           b. Windows 98
           c. Windows ME
           d. Windows NT Workstation 4.0

____ 35. How does a RIS (Remote Installation Services) Server recognize and differentiate between different
           computer clients on a network?
           a. Analysis of the SID (Security ID)
           b. Analysis of the GUID (Globally Unique Identifier)
           c. Analysis of the FQDN (Fully Qualified Domain Name)
           d. Analysis of the Unique Chassis or Asset Number read through WMI

____ 36. Which of the following is NOT one of the four default media pool types managed by the Removable
           Storage Manager (RSM)?
           a. Free
           b. Import
           c. Unformatted
           d. Unrecognized
           e. Application-Specific

____ 37. Which of the following is true of the compression options available under Windows XP
           Professional?
           a. Windows XP Professional supports two types of compression, NTFS compression
              and Compressed Folders.
           b. The Compressed Folders feature allows you to create a compressed folder context
              menu option, so that all files you store in that folder may be manually compressed
              upon saving.
           c. You can create and use compressed files and folders on NTFS volumes only.
           d. You can move these compressed files and folders to any drive or folder on your
              computer, the Internet, or your network, but a utility is necessary to read these files
              on non-Windows XP Professional machines, as the compression algorithm is
              proprietary.
           e. NTFS compressed files can be encrypted to insure their security.

____ 38. Simon, a consultant, is called to the offices of a video production firm to assist in optimizing a
           number of Windows XP Professional computers for use as media editing stations. These machines
           are each equipped with three large hard drives, high performance video cards, 1 GB of memory, and
           high-end processors. Users are complaining that the performance of the systems has deteriorated
           steadily during the first six months of use and is now unacceptable. Simon analyzes the workstations
           and rules out mechanical defects as the cause of the performance issues. He then performs a number
           of operations designed to help the machines meet the performance expectations of the users. Which
           of the following operations would NOT be expected to improve the speed of the workstations?
           a. Reconfiguring the three hard drives as dynamic disks, and arranging them into one
               large striped volume.
           b. Moving the media data files out of the NTFS compressed volumes the data was
               stored in to conserve space.
           c. Using Disk Cleanup to free disk space used by temporary files and unnecessary
               programs.
           d. Using Disk Defragmenter to analyze and repair disk fragmentation.
           e. Disabling the Encrypting File System

____ 39. Mike, a consultant, is asked to check the configuration of a stand-alone desktop machine used in a
           warehouse environment. This Windows XP Professional machine is located on the loading dock,
           runs barcode scanning software and tracks all the shipping and receiving activities at the dock. The
           information it contains is considered vital. At the end of each day, the desktop is brought into the
           warehouse office where it is connected to the network and backed up. While reading through the
           machine’s system logs, Mike discovers that the machine has frequently experienced unexpected
           shutdowns. A conversation with the operator who usually runs the machine reveals that power
           fluctuations are common on the loading dock, with the desktop shutting down and rebooting several
           times a week. Mike immediately recommends the installation of a UPS, which he is told will be
           installed within a week. Which of the following additional procedures will be most helpful in
           protecting this machine’s vital data until the backup power supply is installed?
           a. Add a second hard drive, and, using Disk Management, set up both the original
               and new hard drives as dynamic disks, and install the second drive as a spanned
               volume.
           b. Using Disk Management, repartition the existing hard drive into three separate
                volumes, one for the operating system, one for applications, and one for data.
           c. Using Disk Management, access the existing hard drive and, under Policies,
                deselect the Enable Write Caching check box to turn off write caching.
           d. Using Disk Management, access the existing hard drive and Refresh the disk
              information in order to insure that all data is present.
           e. Using Disk Defragmenter, defragment the disk in order to improve the integrity of
              the data.
____ 40. Which of the following is NOT a correct description of Windows XP NTFS security?
         a. NTFS permissions are available only on NTFS volumes and are used to specify
                which users and groups can access files and folders and what these users can do
                with the contents of those files or folders.
           b.   NTFS stores security descriptors (which include ACLs) for all files in a central
                metadata file. An Index attribute is stored in the file’s MFT record to identify the
                security descriptor.
           c.   NTFS folder permissions take priority over NTFS file permissions.
           d.   To assign or modify NTFS permissions for a file or a folder, you use the Security
                tab of the Properties dialog box for the file or folder.
           e.   When you move a file or folder within a single NTFS volume, the file or folder
                retains its original permissions.

Matching

           Match each description with the correct item below.
           a. A TCP/IP service protocol that offers dynamic leased configuration of host IP
              addresses and distributes other configuration parameters to eligible network
              clients. DHCP provides safe, reliable, and simple TCP/IP network configuration,
              prevents address conflicts, and helps conserve the use of client IP addresses on the
              network.
           b. A hierarchical, distributed database that contains mappings of domain names to IP
              addresses. This service enables the location of computers and services by user-
              friendly names, and it also enables the discovery of other information stored in the
              database.
           c. A feature of Windows XP Setup that queries Microsoft for product updates that
              can be incorporated into the Windows XP installation to enhance its operation.
              These updates may include replacement setup files or updated device drivers.
           d. Software service that allows an administrator to set up new client computers
              remotely, without having to visit each client. The target clients must support
              remote booting.
           e. A portion of a physical disk that functions as if it were a physically separate disk.
              After you create one, you must format it and assign it a drive letter before you can
              store data on it.
____ 41. 1. Dynamic Update
____ 42. 2. Partition
____ 43. 3. DHCP
____ 44. 4. RIS
____ 45. 5. DNS

            Below is a list of components of NTFS permissions. Match each component with its
            description/function.
            a. SACL
            b. DACL
            c. Allow ACE
            d. ACL
            e. System Audit ACE

____ 46. This component is the fundamental construct of security in the Microsoft Windows family of
            operating systems. Objects from files and folders all the way up to group policy objects in Active
            Directory are secured by using these.
____ 47. This component allows access to the listed SID for the listed operations (Read, Write, Modify, etc.).
____ 48. This component lists users or groups that have been granted access to an object.
____ 49. These are defined by the operating system and are controlled administratively, either by policies or
            by system administrators.
____ 50. This component lists the operations to be audited for an object.


Other

        51. Bonus Questions:

            1.) What does the acronym “WORM” stand for?

            2.) You check an IP address on a computer and notice the IP address is 169.254.0.13. What is this addressed
            commonly referred to?
Windows XP Final Review
Answer Section

TRUE/FALSE

     1. ANS: F
        EXPLANATION: The left column of the Windows XP Start menu is divided into the pinned items
        list in the upper section and the frequently used programs list in the lower section. (Discussion
        begins on page 3.)

        PTS: 1              DIF: Demonstration                        REF: 1
     2. ANS: F
        EXPLANATION: Frequently used programs are listed in the lower part of the left column of the
        Start menu, but are ranked from most frequently used (at the top) to less frequently used (at the
        bottom). (Discussion begins on page 3.)

        PTS: 1              DIF: Demonstration                        REF: 1
     3. ANS: T
        EXPLANATION: Windows XP lets users write files and videos directly to CD-R and CD-RW
        media by simply dragging them to an icon representing their CD-R or CD-RW drive. Third-party
        burning tools that were required for this purpose in earlier versions of Windows are no longer
        necessary in Windows XP. (Discussion begins on page 7.)

        PTS: 1              DIF: Demonstration                        REF: 1
     4. ANS: T
        EXPLANATION: Since Windows XP natively supports reading and writing to CD-R and CD-RW
        media, OEM’s can create branded applications that can generate emergency boot CDs instead of
        emergency boot floppy disks. (Discussion begins on page 7.)

        PTS: 1              DIF: Demonstration                        REF: 1
     5. ANS: F
        Explanation: A domain is a logical network structure. A physical network structure refers to the
        actual hardware design, including items such as routers, switchers, cables, and connectors.
        (Discussion begins on page 16.)

        PTS: 1              DIF: Demonstration                        REF: 1
     6. ANS: T
        EXPLANATION: Windows XP Professional provides the Convert command for converting a
        partition to NTFS without reformatting the partition and losing all the information on it. (Discussion
        begins on page 30.)

        PTS: 1              DIF: Application     REF: 2
     7. ANS: T
        EXPLANATION: Regardless of the initial membership, you can change a Windows XP
        Professional computer from workgroup to domain membership and back after installation.
        (Discussion begins on page 72.)
   PTS: 1              DIF: Application     REF: 2
8. ANS: F
   EXPLANATION: A quick format is essentially a standard format that does not scan the disk for bad
   sectors. If you are certain the disk is not damaged, you can speed your installation using this option.
   If the disk has never been formatted, or if you want to be sure the scan for bad sectors is performed,
   use the standard NTFS format option. (Discussion begins on page 33.)

   PTS: 1              DIF: Synthesis       REF: 2
9. ANS: F

   EXPLANATION: The Windows Setup Wizard prompts you to choose typical or customized settings
   for the networking components it installs. Custom allows you to specify any settings and optional
   clients or protocols you desire. You can install other clients, services, and network protocols at this
   time, or you can wait until after the installation has completed. (Discussion begins on page 36.)

    PTS: 1             DIF: Application     REF: 2
10. ANS: F
   EXPLANATION: In a striped volume, data is written evenly across all physical disks in 64-KB
   units. Like spanned volumes, striped volumes, available in Windows XP professional, don’t provide
   fault tolerance. If a single disk in a striped volume fails, the data in the entire volume is lost.
   (Discussion begins on page 80.)

    PTS: 1             DIF: Application     REF: 3
11. ANS: T
   EXPLANATION: Disk Cleanup frees up disk space by deleting temporary files and uninstalling
   program files deemed unessential to a program’s operation. Disk Cleanup lists the temporary files,
   Internet cache files, and unnecessary programs that can be safely deleted. (Discussion begins on
   page 111.)

    PTS: 1             DIF: Demonstration                        REF: 3
12. ANS: F
   EXPLANATION: The system partition and the boot partition are two separate entities. Although
   both can, and typically do, reside on the same partition, this is not a requirement, nor is it a
   requirement that the either reside specifically on the C: drive. The Windows XP Professional system
   partition is the active partition, looked to by the machine BIOS, that contains the hardware-specific
   files required to load the operating system. The Windows XP Professional boot partition is the
   primary partition, or logical drive, where the operating system files are installed. The system
   partition must be on the active partition, but not necessarily drive C. whereas the boot partition can
   be on another primary partition or an extended partition. (Discussion begins on page 76.)

    PTS: 1             DIF: Application     REF: 3
13. ANS: T
   EXPLANATION: All data on a dynamic disk will be lost when it is reverted to a basic disk.
   (Discussion begins on page 82.)

    PTS: 1             DIF: Application     REF: 3
14. ANS: F
   EXPLANATION: The Authenticated Users Group contains users that have been authenticated by an
   authority recognized and trusted by the system. This is an important consideration for security
   because authenticated users are more trusted than users belonging only to the Everyone group.
   (Discussion begins on page 223.)

    PTS: 1             DIF: Demonstration                      REF: 7
15. ANS: F
   EXPLANATION: There are two ways to cause Windows XP to retain permissions even when an
   object is copied or moved to another NTFS volume: 1) Using Xcopy.exe with the /O or the /X
   command-line switch copies permissions to the new destination. 2) Modifying the
   HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer
   registry key. Adding the DWORD value ForceCopyAclwithFile with a value of 1 causes Windows
   XP to always copy the ACL with the object. (Discussion begins on page 228.)

    PTS: 1             DIF: Synthesis       REF: 7
16. ANS: F
   EXPLANATION: Administrators, users with the Full Control permission, and the owners of files
   and folders can assign permissions to user accounts and groups. (Discussion begins on page 231.)

    PTS: 1             DIF: Demonstration                      REF: 7
17. ANS: T
   EXPLANATION: An administrator can always take ownership of a folder or file, regardless of
   assigned permissions. If an administrator takes ownership, the Administrators group becomes the
   owner and any member of the Administrators group can change the permissions for the file or folder
   and assign the Take Ownership permission to another user account or group. (Discussion begins on
   page 234.)

    PTS: 1             DIF: Demonstration                      REF: 7
18. ANS: F
   EXPLANATION: Microsoft offers two command-line tools for viewing and setting NTFS
   permissions in Windows XP, CACLS.exe (for “Change ACLs”) and XCACLS.exe (for “Extended
   CACLs”). CACLS is included in Windows XP, and XCACLS is available for download from
   Microsoft, or included Windows resource kits. The principle difference is that CACLS can set only
   standard NTFS permissions—Read, Write, Change (Modify), and Full Control—while XCACLS
   offers more (but not full) control over special permissions such as Delete, Change Permissions, and
   Take Ownership. (Discussion begins on page 236.)

    PTS: 1             DIF: Demonstration                      REF: 7
19. ANS: F
   EXPLANATION: Once auditing is enabled for NTFS objects, the results of the auditing can be
   monitored in the Security event log for the system being audited. (Discussion begins on page 244.)

    PTS: 1             DIF: Demonstration                      REF: 7
20. ANS: T
       EXPLANATION: The true power of a tool such as CACLS is the ability to use it in batch files to
       change permissions for many users or folders at once. By issuing a series of CACLS commands in a
       batch file, you can automate changes to lock users out of data folders during backup operations and
       let them back in afterward. (Discussion begins on page 236.)

       PTS: 1              DIF: Synthesis       REF: 7


MULTIPLE CHOICE

    21. ANS: C
       EXPLANATION: Running each application in a protected memory space prevents a failing
       application from affecting other applications or the operating system. The kernel, not applications, is
       insulated from direct manipulation by users or hardware devices. The hardware abstraction layer is
       incorrect because this code layer separates the kernel from system hardware. Applications do not run
       in the privileged environment of the kernel, but in a less privileged environment and are separated
       from the kernel in order to protect this environment from instabilities caused by failing or unstable
       applications. (Discussion begins on page 2.)

        PTS: 1             DIF: Application     REF: 1
    22. ANS: C
       EXPLANATION: Group Policy is a management tool that can be used to lock down items on the
       Start menu. A domain controller is a server that manages and centralizes security settings. Active
       Directory is a database that is used to manage user security, permissions, applications, and other
       resources for ease of location and configuration. The Windows Security Center is a centralized,
       Internet security monitoring center that lets users manage the Windows Firewall, anti-virus software,
       and Automatic Updates. (Discussion begins on page 3.)

        PTS: 1             DIF: Application     REF: 1
    23. ANS: B
       EXPLANATION: The Quick Launch toolbar provides quick access to frequently used applications,
       documents, or folders. The notification area is incorrect because it contains icons that represent
       alerts, applications, or services that are running in the background on the system. This area is not
       used to store icons for frequently used programs. The system tray is a name for the notification area
       used in earlier versions of Windows. The Task Manager is incorrect because this is a Windows
       utility that provides information about programs or processes currently running on the computer.
       (Discussion begins on page 4.)

        PTS: 1             DIF: Demonstration                        REF: 1
    24. ANS: C
   EXPLANATION: Mike can use driver signing to require device drivers for new hardware to contain
   a digital signature from Microsoft’s Windows Hardware Quality Laboratory. This means that the
   devices and their drivers have been tested and approved by Microsoft. The Windows Hardware
   Quality Laboratory is incorrect because this is not an option for configuring Windows XP; it is the
   database of signed devices and drivers that Windows XP uses when driver signing is configured.
   Driver rollback is incorrect because this feature lets a user uninstall a new driver and return the
   previous driver when a problem occurs. Plug and Play is incorrect because this allows simple
   configuration of hardware devices, but cannot be configured to require approved devices and drivers.
   (Discussion begins on page 7.)

    PTS: 1             DIF: Application     REF: 1
25. ANS: C
   EXPLANATION: The Auto-Configuration for Multiple Network Connectivity option lets a user
   specify an alternative configuration for TCP/IP if a DHCP server is not located. By configuring this
   option, Alex’s computer will operate at both the office and home without requiring manual
   reconfiguration. Enabling DHCP in order to obtain an IP address automatically is incorrect because
   Alex is not connecting to a network at home; the IP address is assigned by his ISP. Continuing to
   manually configure TCP/IP settings is incorrect because the Auto-Configuration for Multiple
   Network Connectivity option makes this unnecessary. Doing nothing is incorrect because the Auto-
   Configuration for Multiple Network Connectivity option must be configured before its first use.
   (Discussion begins on page 8.)

    PTS: 1             DIF: Application     REF: 1
26. ANS: A
   EXPLANATION: A workgroup is the most practical solution for a small network of six computers.
   Since the Windows Firewall is a built-in component in Windows XP Professional with SP2 installed,
   no additional software is needed. Setting up a domain is impractical for a network of this size, since
   it requires extensive planning and administration and is not cost-effective in this situation.
   (Discussion begins on page 13.)

    PTS: 1             DIF: Synthesis       REF: 1
27. ANS: D
   EXPLANATION: The two users in this scenario can use Fast User Switching to quickly log another
   user onto the system while the first user is placed in a standby status. The Encrypting File System
   prevents anyone who has access to the laptop from gaining access to the contents of the files. Local
   Security Policy is incorrect because this is a means of controlling the configuration of a Windows
   XP computer. The Windows Firewall is incorrect because this feature is used to prevent
   unauthorized access to the network. (Discussion begins on page 19.)

    PTS: 1             DIF: Synthesis       REF: 1
28. ANS: C
   Explanation: If a computer is a member of a domain, the Welcome screen and Fast User Switching
   are not available. A user account in a domain can be set up with no password. Workgroups are
   impractical for networks of more than ten computers. The Windows Firewall is available to
   computers in either a workgroup or a domain. (Discussion begins on page 13.)

   PTS: 1              DIF: Synthesis       REF: 1
29. ANS: B
   EXPLANATION: Using Remote Desktop will allow you to control the manager’s computer. You
   can then open the Windows Help and Support Center on his computer and select Use Tools To View
   Your Computer Information And Diagnose Problems to determine the BIOS version. Viewing Find
   Information About the Hardware Installed on This Computer in Windows Help and Support is
   incorrect because this section does not contain information about the BIOS version. Using Remote
   Assistance is incorrect because the manager has asked you to determine the BIOS version, not to
   help him locate it. Viewing Information For Another Computer is incorrect because this requires
   administrative privileges, and this is not indicated in the scenario. (Discussion begins on page 9.)

    PTS: 1             DIF: Synthesis       REF: 1
30. ANS: B
   EXPLANATION: Remote Assistance is a more appropriate choice than Remote Desktop because
   the assistant wants to learn how to access the information, rather than have you do it for her. With
   Remote Desktop, you can control her computer, but she cannot see what is happening on the screen.
   The section in My Computer Information that will provide descriptive information about the
   installed hardware is Find Information About the Hardware Installed on This Computer. The section
   that will list Microsoft Office programs is View a List of Microsoft Software Installed on This
   Computer. Selecting View the Status of My System Hardware and Software in My Computer
   Information is incorrect because this screen shows the status of hardware and software, rather than
   providing descriptive information. (Discussion begins on page 11.)

    PTS: 1             DIF: Synthesis       REF: 1
31. ANS: B
   EXPLANATION: 64 megabytes (MB) is the minimum memory size required for installation. 128
   MB is the minimum recommended memory size, and a maximum of 4 GB of memory is addressable
   by Windows XP Professional. (Discussion begins on page 26.)

    PTS: 1             DIF: Demonstration                      REF: 2
32. ANS: C
   EXPLANATION: Transmission Control Protocol/Internet Protocol (TCP/IP) is the default
   networking protocol used in Windows networking. (Discussion begins on page 36.)

    PTS: 1             DIF: Demonstration                      REF: 2
33. ANS: C
   EXPLANATION: A Uniqueness Database File (UDB) contains the configuration settings that make
   each computer installation unique. The UDB modifies a standard answer file by overriding values in
   the answer file. Entries in the UDB file override values in the answer file, and the identifier (id)
   determines which values in the .udb file are used. (Discussion begins on page 46.)

    PTS: 1             DIF: Synthesis       REF: 2
34. ANS: A
   EXPLANATION: Windows 95 must be upgraded to Windows 98, and then to Windows XP
   Professional. Windows NT versions prior to Workstation 4.0 also require interim upgrades before
   Windows XP can be installed. (Discussion begins on page 48.)

    PTS: 1             DIF: Demonstration                      REF: 2
35. ANS: B
   EXPLANATION: The server is able to recognize clients by their Globally Unique Identification
   (GUID), which is unique to each computer, can be preset for certain configurations in the Active
   Directory, and can be configured to provide additional configuration information (such as computer
   name) to the client during the installation process. (Discussion begins on page 53.)

    PTS: 1             DIF: Synthesis       REF: 2
36. ANS: C
   EXPLANATION: These are the four default media pool types:
   Free - Contains all media that has been detected by the system but not allocated to any application.
   Import - Contains media that is recognized but known to contain data from another application.
   They are placed here for protection until they can be placed in an appropriate media pool.
   Unrecognized - Contains media that the system does not recognize. Typically these are media of a
   type not known to the system, but they can also be corrupted media of a known type.
   Application-Specific - Applications such as Backup create media pools to manage their own media.
   (Discussion begins on page 86.)

    PTS: 1             DIF: Demonstration                        REF: 3
37. ANS: A
   EXPLANATION: The statement that Windows XP Professional supports two types of compression,
   NTFS compression and Compressed Folders, is correct. The Compressed Folders feature allows you
   to create a compressed folder so that all files you store in that folder are automatically compressed,
   not manually compressed. You can create and use compressed files and folders on both FAT and
   NTFS volumes; this option is not restricted to NTFS volumes. You can move these compressed files
   and folders to any drive or folder on your computer, on the Internet, or on your network, and they
   will be compatible with any program that can read Zip archives. The compression algorithm is not
   proprietary, and no specialized utility is needed to read the files. NTFS encryption and compression
   are mutually exclusive. For that reason, if you encrypt the contents of a file or folder, you cannot
   also compress the file or folder. (Discussion begins on page 89.)

    PTS: 1             DIF: Synthesis       REF: 3
38. ANS: C
   EXPLANATION: The answer “Using Disk Cleanup to free disk space used by temporary files and
   unnecessary programs” is the correct choice because, although the use of Disk Cleanup to free disk
   space on a regular basis is an excellent maintenance procedure and increases storage efficiency, it
   has no effect on system speed. The use of Striped volumes offers the best performance of all the
   Windows XP Professional disk management strategies, and would, therefore, improve the speed of
   the workstations. In a striped volume, data is written evenly across all physical disks in 64-KB units.
   Because all the hard disks that belong to the striped volume perform the same functions as a single
   hard disk, Windows XP can issue and process concurrent I/O commands simultaneously on all hard
   disks. In this way, striped volumes can increase system I/O speed. Both NTFS compression and its
   close relative, the Encrypted File System, can cause performance degradation when you copy and
   move files. When a compressed or encrypted file is copied, it is uncompressed or unencrypted,
   copied, and then compressed or encrypted again as a new file. Therefore, eliminating the use of
   compressed or encrypted files would result in a speed increase. Finally, use of the Disk
   Defragmentation tool would also improve access times and system speed by rearranging disk data
   into contiguous blocks which can then be accessed with fewer revolutions of the hard disk platters.
   (Discussion begins on page 94.)
       PTS: 1             DIF: Synthesis       REF: 3
   39. ANS: C
      EXPLANATION: The addition of a UPS is the only reliable means of protecting the data in
      question. However, some degree of protection can be provided by deselecting the Enable Write
      Caching check box, which disables write caching on the disk and in Windows. Write caching allows
      the system to operate faster by storing data in system or hard drive electronic memory and
      continuing to perform Windows operations while the data is being written to disk, instead of waiting
      for the actual disk write to occur. However, a power outage or equipment failure during this time
      might result in data loss or corruption. The addition of a second hard drive as a spanned volume and
      the repartitioning of the existing drive into three volumes would do nothing to prevent data loss
      during a power failure and is therefore incorrect. Refreshing disk information has absolutely no
      bearing on the issue of data loss, so that answer is incorrect as well. Attempting to defragment a disk
      when the machine is connected to a known unreliable power source would not address the need to
      protect the machines vital data, and would, in fact, present a severe risk of data loss. (Discussion
      begins on page 80.)

       PTS: 1             DIF: Synthesis       REF: 3
   40. ANS: C
      EXPLANATION: NTFS file permissions take priority over NTFS folder permissions. All remaining
      statements are correct. (Discussion begins on page 246.)

      PTS: 1              DIF: Application     REF: 7


MATCHING

   41. ANS:   C           PTS: 1               DIF: Demonstration
       REF:   2
   42. ANS:   E           PTS: 1               DIF: Demonstration
       REF:   2
   43. ANS:   A           PTS: 1               DIF: Demonstration
       REF:   2
   44. ANS:   D           PTS: 1               DIF: Demonstration
       REF:   2
   45. ANS:   B           PTS: 1               DIF: Demonstration
       REF:   2

   46. ANS:   D           PTS: 1               DIF: Demonstration
       REF:   7
   47. ANS:   C           PTS: 1               DIF: Demonstration
       REF:   7
   48. ANS:   B           PTS: 1               DIF: Demonstration
       REF:   7
   49. ANS:   A           PTS: 1               DIF: Demonstration
       REF:   7
   50. ANS:   E           PTS: 1               DIF: Demonstration
       REF:   7
OTHER

   51. ANS:
       1.) Write Once Read Many

        2.) APIPA, or Automatic Private IP Addressing

        PTS: 1

								
To top