Windows XP Professional


1. Match the following logon types with their descriptions: Interactive, Network, Service, Batch.
  1. When a service starts up, it logs on to the local computer using the credentials of a local or domain user account or the LocalSystem account.
  2. Logs on to a local computer to which you have direct physical access.
  3. Accesses a system across the network from the computer where you logged on.
  4. Rarely used in the Windows operating system because it is usually reserved for applications such as bank account reconciliation and big print spools.
A. Interactive - 1, Network - 3, Service - 2, Batch - 4
B. Interactive - 2, Network - 4, Service - 3, Batch - 1
C. Interactive - 2, Network - 3, Service - 1, Batch - 4
D. Interactive - 3, Network - 1, Service - 4, Batch - 2
E. Interactive - 4, Network - 3, Service - 2, Batch - 1

>> !
Answer: C

Interactive logon occurs when access the machine directly (i.e. sitting in front of it), Network logon occurs when accessing a machine over the network, Service logon occurs when services startup that must have privileges granted in order to run-thus they have their own account, Batch logon occurs for large scheduled jobs such as account reconciliation or print spools.


2. Your company just purchased a brand new Hewlett Packet HP 8150MFH network printer-it's sweet! After playing with all morning, you decide to finally turn it loose on the network. Almost immediately, the Trolls in accounting start printer Annual Reports for the board meeting next week. Two hours later, the printer is still spitting out paper at the astonishing rate of 32 pages per minute. Your boss, Mr. Smiles, is not amused. It seems that he sent a three page document to the printer and it still hasn't printed. After his 42nd phone call, you decide to put your network game of Diablo II on hold and change the printer settings. You want to ensure that documents Mr. Smiles send to the printer always get first consideration above all others. You decide to perform the following actions:
  1. Create two separate logical printers that both point to the same physical printer.
  2. Name one printer 'Smiley' and configure it with the following options: Always available, Priority of 99, Print directly to printer.
  3. Name the other printer 'Trolls' and configure it with the following options: Available from 6:30 pm - 6:45 pm (you don't much like the Trolls), Priority of 1, Spool documents and start printing after last page is spooled.
  4. On 'Smiley' you set all permissions for the 'Everyone' group to DENY and set all permissions for Mr. Smiley to ALLOW.
  5. On 'Trolls' you remove the 'Everyone' group and grant the 'Trolls' group ALLOW permissions for 'Print' and 'Manage documents'.
What action did you perform that will prevent you achieving your goal?

A. Create two separate logical printers that both point to the same physical printer.
B. Name one printer 'Smiley' and configure it with the following options: Always available, Priority of 99, Print directly to printer.
C. Name the other printer 'Trolls' and configure it with the following options: Available from 6:30 pm - 6:45 pm (you don't much like the Trolls), Priority of 1, Spool documents and start printing after last page is spooled.
D. On 'Smiley' you set all permissions for the 'Everyone' group to DENY and set all permissions for Mr. Smiley to ALLOW.
E. On 'Trolls' you remove the 'Everyone' group and grant the 'Trolls' group ALLOW permissions for 'Print' and 'Manage documents'.

>> !
Answer: D

Setting DENY permissions on any object will always override all other permissions set on that object. In this case, Windows will warn you of this fact (and also that no one will be able to use the printer) when you attempt to configure these settings. The user of DENY is something to be avoided except in special cases.


3. Match the following types of Security Groups with their descriptions:

a. Computer Local Group
b. Domain Local Group
c. Global Group
d. Universal Group

1. Used for combining users who share a common access profile based on job function or business role. They can contain user accounts from the same domain and other global groups from the same domain, and can be granted permissions to any Windows 2000/XP computer in any domain in a forest.
2. Can be given permissions and user rights only to objects on computers within the domain.
3. Security groups that are specific to a computer and are not recognized elsewhere in the domain.
4. Used where there is a need to grant access to similar groups of accounts defined in multiple domains in a forest. Used only in multiple domain trees or forests that have a global catalog. They can contain groups from any domain, and can be used to grant access on any Windows 2000/XP computers in any domain in the forest.

A. a - 3, b - 2, c - 1, d - 4
B. a - 4, b - 2, c - 1, d - 3
C. a - 2, b - 3, c - 4, d - 1
D. a - 1, b - 4, c - 3, d - 2

>> !
Answer: A


4. You are working with a computer that has had a catastrophic failure. You have already tried to use the Last Known Good configuration that that did not fix the problem. You tried to use the Recovery console, but you were not able to fix the problem using the Recovery Console either. Your last chance to get the system running again is to use the Automated System Recovery procedure. You start the computer and press the F2 key to get the ASR process going. When you attempt to restore the volumes, you find that the procedure does not succeed. What is the most likely reason for the problem?

A. If Last Known Good does not work, the ASR procedure will not work
B. The ASR .bkf file was on the C: drive
C. You have to run ASR from the Recovery Console
D. The backup file was not created within the last 10 days

>> !
Answer: B

According to Q298278, if you place the backup file to be used by ASR on either the system or boot partition, the recovery process will not work. The reason for this is that ASR may reformat the boot or system partition during the recovery process. The .bkf file will be lost if the partition it's contained in is reformatted.


5. After starting your Windows XP computer you noticed that it is not able to communicate with other computers on the network. You open a command prompt and type ipconfig /all and press ENTER and find that the computer is assigned the autonet address 169.254.0.25. You call up the network services manager and he tells you that the DHCP for your network segment was down a few minutes ago, but is now up. How can you immediate obtain a valid IP address for your computer?

A. Use the ipconfig /displaynds command
B. Use the ipconfig /flushdns command
C. Use the ipconfig /renew command
D. Use the ipconfig /showclassid command

>> !
Answer: C

Windows XP computer configured as a DHCP client can assigned itself an IP address using Automatic Private IP Addressing (APIPA or autonet) when it cannot contact a DHCP server. Windows XP computers that use APIPA to self-assign an address will be in the 169.254.0.0/16 network ID. By default, the computer will attempt to contact a DHCP server every 5 minutes until is successfully obtains an IP address. You can force the computer to obtain an IP address immediately by using the ipconfig /renew command.


6. You want to install Windows XP. You have selected a 3 GB partition onto which you will install Windows XP. The computer has 1 GB of RAM. After installing Windows XP, you notice that you have less than 800 MB of disk space on the partition. What is the most likely reason for the low amount of disk space?

A. The default Windows XP installation takes about 3 GB of disk space
B. The driver cache on this machine is inordinately large
C. The page file accounts for 1.5 GB of disk space on this volume
D. Windows XP always copies the installation files to the boot partition and leave them there for later use

>> !
Answer: C

The default page file size on Windows XP computers is 1.5 times the amount of RAM installed on the computer. In this scenario, the computer had 1 GB of RAM installed. Therefore the page file size would be 1.5 GB. This accounts for the large amount of disk space used on the fresh installation of Windows XP. Note that you can reconfigure the amount of disk space to meet your personal requirements.


7. Match the following types of built-in local security groups with their descriptions:
a. Administrators
b. Backup Operators
c. Guests
d. HelpServicesGroup
e. Network Configuration Operators
f. Power Users
g. Replicator
h. Remote Desktop Users
i. Users
j. NetWare Users
  1. Members of this group have less system access than Administrators but more than Users.
  2. Members of this group can back up and restore files on the computer, regardless of the permissions that protect those files. They can also log on to the computer and shut it down, but they cannot change security settings.
  3. By default, members of this group are denied access to the application and system event logs. Otherwise, they have the same access rights as members of the Users group.
  4. This is not a built-in Windows XP local security group.
  5. Members of this group have limited administrative privileges that allow them to configure networking features, such as IP address assignment.
  6. Members of this group have total control of the local computer.
  7. Members of this group have limited access on the system and have Read/Write permissions only to their own profile.
  8. Members of this group have the right to log on remotely.
  9. Members of this group can use helper applications to diagnose system problems.
  10. Members of this group are allowed to replicate files across a domain.
A. a - 3, b - 10, c - 1, d - 4, e - 5, f - 6, g - 2, h - 8, i - 9, j - 7
B. a - 6, b - 2, c - 3, d - 9, e - 5, f - 1, g - 10, h - 8, i - 7, j - 4
C. a - 6, b - 2, c - 7, d - 9, e - 5, f - 1, g - 10, h - 8, i - 3, j - 4
D. a - 6, b - 2, c - 3, d - 9, e - 4, f - 1, g - 10, h - 8, i - 7, j - 5

>> !
Answer: B


8. You want to take advantage of the multiple monitor feature in Windows XP. The computer has an AGP video card installed. You power down the computer and add a PCI video card. When you restart the computer and attempt to configure the second video card, you notice that it doesn't work at all. What can you do to fix this problem?

A. Put the PCI card in the AGP slot
B. Make the PCI card the primary adapter in the system BIOS
C. Disable the AGP card and restart the computer
D. Reinstall Windows XP

>> !
Answer: B

Some PCI cards do not work when configured as a secondary display adapter. In order to get these PCI cards to work in a multi-monitor configuration, you must change the PCI card so that it is the primary video interface in the system BIOS. After the BIOS change is made, you will be able to configure Windows XP to use multiple monitors.


9. Concerning nesting of groups, which of the following statements are true?
  1. Domain Local Groups can contain Domain Local Groups from the same domain.
  2. Domain Local Groups can contain Domain Local Groups from any trusted domain in the forest.
  3. Domain Local Groups can contain user accounts only from the local domain.
  4. Domain Local Groups can be members of Universal Groups.
  5. Global Groups can contain user accounts and Global Groups from any trusted domain in the forest.
  6. Global Groups can contain user accounts and Global Groups from the same domain.
A. All of these statements are true.
B. 1, 3, 4, 6
C. 1, 4, 6
D. 1, 3, 5
E. 2, 3, 5, 6
F. None of these statements are true.

>> !
Answer: C

Domain Local Groups can contain other Domain Local Groups from the same domain. Domain Local Groups can be members of Universal Groups. Global Groups can contain users accounts and Global Groups from the same domain.


10. You are the network administrator for a small real estate company. The company recently purchased new computers that have Windows XP Professional preinstalled. The company does not have a domain controller and runs a workgroup environment. The users in the office need to share files over the network and be able to apply granular access permissions to files and folders on their computer. You begin to apply NTFS permissions to the files and folders and notice that there is no security tab in the folder's properties dialog box. Why?

A. Windows XP does not support NTFS
B. File sharing is supported only on FAT32 volumes
C. You cannot apply NTFS permissions on shared folders and files
D. Simple File Sharing is enabled

>> !
Answer: D

When Windows XP Professional is installed, the default setting in the Explorer interface is to enable Simple File Sharing. When Simple File Sharing is enabled, the Security tab in the file or folder Properties dialog box is not available. In order to view the security tab, open the Windows Explorer and Click the Tools menu and then click Folder Options. In the Folder Options dialog box, click the View menu. In the Advanced Settings dialog list box, scroll through the list and remove the checkmark from the Use simple file sharing (Recommended) checkbox. Note that this is not required if the machine is a member of a domain.


11. Your boss, Mr. Smiles has directed you to create network shares out of some existing folders on some of your network file servers. You decide to research the task before you begin. Which one of the following items do you not learn during the course of your research?

A. You can share folders, but not files. Files located in shared folders inherit the permissions of the folder.
B. Share permissions are added to NTFS permissions to determine the final permissions on a share during over the network access.
C. If you copy a shared folder, the copy will not be shared.
D. If you move a shared folder, it will remain shared.
E. In order to be able to share a folder, you must be a member of the Administrators, Power Users or Server Operators group or have been granted the Create Permanent Shared Objects right.
F. In order to be able to share a folder, you must have at least READ permission on the folder.

>> !
Answer: D

Moving a shared folder will result in the folder no longer being shared. You can only place share permissions on folder, files contained within the folder will be shared per the settings on the folder (segregate your shares at the folder level for best control). Copies of shared folders will not inherit the share permissions and are subject to all normal rules associated with copying objects. Administrators, Power Users and Server Operators all, by default, have permissions to create shares. You can create users for this task by granting them the Create Permanent Shared Objects user right. If you do not have a minimum of READ access to the folder you want to share, you will not be able to create the share.


12. OK, so it's Thursday now and you've managed to make it this far through the week, although you have no idea. Today you have to make a Power Point presentation to the Executive Board as to why you need an OC-12 fiber line put in just for the IT department. You've spent all morning finishing up your presentation and have now transferred it to your laptop. The board room where you will be giving your presentation is an odd one at that. There is only one power outlet in the whole place. One plug on the outlet is taken up by the projector you will be hooking your laptop up to, the other plug is currently in use by the most important piece of hardware your company owns (at least in the mind of the boss), the Sub Zero refrigerator. You will not be using your laptop display screen at all during the presentation and you will be using your USB Microsoft optical mouse. What is the best way to configure your laptop to ensure that you have enough to power to complete the entire presentation without limiting your ability?

A. Select the 'Max Battery' setting in Power Options and configure nothing more.
B. Select the 'Always On' setting in Power Options and configure nothing more.
C. Select the 'Presentation' setting in Power Options and change the settings as follows: Turn off monitor - 5 minutes.
D. Select the 'Portable/Laptop' setting in Power Options and configure nothing more.
E. Select the 'Always On' setting in Power Options and change the settings as follows: System hibernates - 30 minutes.
F. Select the 'Presentation' setting in Power Options and configure nothing more.

>> !
Answer: C

In this situation, when you know you will be running off of batteries solely, you want to start with a configuration that will act to maximize battery lifetime. To do this, we select he 'Presentation' setting which has default values of: Turn off monitor - never, Turn off hard disks - 5 minutes, System standby - 15 minutes, System hibernate - 30 minutes. By changing the setting for the monitor, we now have the display and hard drive turning off after five minutes of inactivity. Ten minutes later the system will go into standby-easily awakened by the mouse or keyboard. In the event that another 15 minutes passes, the system will hibernate. Hibernation is not likely in this situation since it is a presentation.


13. You have a new computer that has four USB ports available on the motherboard. You have installed Combat Flight Simulator 2 and want to use a USB joystick with the application. You plug the USB interface of the joystick into the USB port on the computer and notice that the operating system does not detect a new Plug and Play device. You restart the computer and the joystick is still not recognized. What is the most likely reason for this problem?

A. The joystick should be plugged into another USB port
B. The USB interface has not been enabled in the BIOS
C. You must use a USB hub for USB joysticks; they cannot be plugged in directly
D. Windows XP does not support USB joysticks

>> !
Answer: B

The USB interface is disabled on many new computer configurations. In order to enable the USB interface on the motherboard, you must go into the system BIOS and enable the USB interface. After the USB interface is enabled, restart the computer and Windows XP will autodetect the USB joystick.


14. You use an always-on cable modem connection and the Internet Connection Services (ICS) to connect your home network to the Internet. Because your work requires a lot of travel, you would like to be able to connect to your Remote Desktop over the Internet while you're on the road. What port number is used by the connection for inbound access to your Remote Desktop computer on your internal network?

A. 119
B. 389
C. 829
D. 3389

>> !
Answer: D

The Remote Desktop feature included with Windows XP is a scaled down version of the Windows Terminal Server. The primary difference between Windows Terminals services and Remote Desktop is that the Remote Desktop feature allows a single inbound connection and when the inbound connection is established, the user logged on interactively with the machine is logged off. Remote Desktop and Terminal service both use port TCP 3389 for inbound access.


15. In planning for the deployment of Windows XP across your organization, it has become apparent to you that some form of automated installation could benefit you by speeding up the process and ensuring a consistent deployment across all machines. Which of the following statements about Windows XP automated installation processes is not true?

A. When using SYSPREP, the source and destination computers must have compatible Hardware Abstraction Layers (HALs).
B. To use Remote Installation Services (RIS), you require the following on the network: a DHCP server, a DNS server, Active Directory, and a RIS server with at least two FAT partitions.
C. Windows XP Product Activation can be accomplished during an unattended installation by the use of an answer file and a Uniqueness Database File.
D. Windows XP Product Activation can be accomplished during an unattended installation by the use of an answer file and a Uniqueness Database File.

>> !
Answer: B

All of the RIS requirements have been met except that RIS requires two partitions, both formatted with NTFS. The second partition must not be the system or boot partition and should be devoted entirely to the RIS service. Microsoft actually recommends that you devote an entire hard-drive to RIS. It is important to note that laptop computers are not automatically excluded from RIS installations--if they are docked in a docking station with a PXE or rbfg.exe compatible network card, they qualify for RIS installation.


16. While upgrading one of your Windows 2000 Professional machines to Windows XP Professional, you get a dialog box with the following text: 'The currently installed driver for the NETBEUI Transport Protocol is not compatible with Microsoft Windows XP and will be uninstalled during the upgrade. This protocol is removed from this new version of Windows.'

This comes as quite an upsetting bit of news to your boss, Mr. Smiles as he's real big on sticking with the tried and true protocols-despite the obvious drawbacks. How will you go about installing the NetBEUI protocol back onto your Windows XP Professional machines so you can get Mr. Smiles off your back and get back to your real reason for being at work: playing network games of Quake III Arena?

A. Install it from the Windows 2000 Setup CD-ROM.
B. Um, you can't! Duh, that's why they took it away after all.
C. Download and install it from the Windows Update web site.
D. Install it from the Windows XP Setup CD-ROM.

>> !
Answer: D

You can install the NetBEUI protocol from the Windows XP Setup CD-ROM, however it is an unsupported protocol now, so don't go running to Microsoft for help.


17. You have a couple of workstations that seem to constantly wind up corrupted all on there own. Since you have recently installed Windows XP on all workstations in your company, you decide to look into using the System Restore feature of Windows XP to help alleviate this problem, or least save you time recovering these workstations. Which of the following is not true about System Restore?

A. During a System Restore, personal files such as those in the My Documents folder are not overwritten.
B. System Restore can be turned off on only the system volume in a multi-volume machine, if desired.
C. System Restore points can be created manually in addition to those created on a daily basis.
D. System Restore points are created automatically upon the installation of an application that uses the Windows Installer or Install Shield Pro version 7.0.
E. System Restore can be used in Safe Mode.
F. System Restore can be managed via Group Policy Object settings.

>> !
Answer: B

Turning off System Restore on the system volume automatically disabled System Restore for all volumes on that machine. A better option would be to reduce the amount of disk space allocated to System Restore (12 percent, by default) and also turn off System Restore on non-system volumes as desired. System Restore does not create Restore Points while running in Safe Mode, but you can perform a System Restore while running in Safe Mode from an existing snap-shot. You always have the option to create a manually Restore Point if you want to, a good option before making vast changes to the system if you are unsure of the ultimate consequences. System Restore ignores personal files as they are not usually the cause of a problem, and thus they are not overwritten during a restore process.


18. You have decided to implement roaming profiles with folder redirection on your network. Which of the following statements is not true concerning roaming profiles and folder redirection in a Windows 2000 Active Directory domain with Windows XP Professional clients?

A. A user profile contains a portion of the Registry that contains settings such as those for Windows Explorer, taskbar settings, network printer and application settings.
B. User profiles, by default, are located on a network server.
C. User profiles, when used with folder redirection, provide an effective and transparent way to ensure all user data is backed up regularly.
D. Roaming profiles can be prevented from propagating back to the network server, if desired by the Administrator to ensure consistency.
E. The Application Data, Desktop, My Documents, and Start Menu folders can all be redirected using folder redirection.

>> !
Answer: B

User profiles, by default, are located on the local computer. A profile is created for each user that logs onto the computer. When Administrators configure profiles to roam, all of the data and settings contained in the profile are copied to a network server when the user logs off. User profiles, in conjunction with folder redirection, make it easy to back up all user data regularly by locating the data on centralized servers, which are easily backed up. The Application Data, Desktop, My Documents and Start Menu folders are the only folders that be redirected to a different location. The roaming profile folders stay in the same location where the profile was originally created.


19. Windows XP Professional is the BEST thing to ever come to your help desk. Your help desk personnel absolutely love it. Why? Remote Assistance. Now instead of having to generate a trouble call ticket to be attended to later, in person, they can simply generate the trouble call (for tracking purposes, of course) and connect to the users machine via Remote Assistance and solve most problems. Which of the following statements about Remote Assistance are true?
  1. Remote Assistance requests can be sent from the requesting computer via Windows Messenger, MAPI compliant email programs (such as Outlook or Outlook Express) or via an email attachment.
  2. Remote Assistance requests can be protected with a password that should be given via a secondary method (such as telephone).
  3. Remote Assistance requests must have a expiry period assigned to them.
  4. Remote Assistance can be initiated without a request, provided that the support personnel has the IP address of the client computer in question.
  5. Remote Assistance requests work if the requesting client is behind a Proxy Server.
  6. Remote Assistance requests sent via Windows Messenger work if both the client and the support personnel are behind a NAT.
  7. Remote Assistance may require opening of port 3389 on a firewall separating the client and support personnel.
  8. The support personnel can take control of the client's computer at any time without any additional permission.
  9. Remote Assistance can be disabled via Group Policy settings.
  10. Remote Assistance can be disabled via the System applet.
A. All of the above.
B. 1, 2, 3, 4, 5, 6, 9, 10
C. 1, 2, 3, 4, 7, 9, 10
D. 1, 2, 4, 5, 7, 8, 9
E. 1, 2, 3, 4, 6, 7, 9, 10

>> !
Answer: C

Remote Assistance does not work if the requesting computer is behind a Proxy Server, as discussed in MSKB# Q301529. Remote Assistance Requests sent via Windows Messenger will work if either the support personnel or the requesting client are behind a NAT, but will not work if both are behind a NAT, as discussed in MSKB# Q301529. The support personnel (expert) can request to take control of the requesting clients computer, but the requesting client must grant permission to do so. Additionally, the requesting client can cancel this action at time by pressing the ESC key. All other statements are true of Remote Assistance. (MSKB# Q300546, MSKB# Q301529, MSKB# Q301527, MSKB# Q305608, MSKB Q306800)


20. The Trolls in accounting have a problem. Who would have figured that would happen? They have a super-secret database that only the department manager (affectionately known as 'Troll Superior') and his assistant ('Mini Troll', of course) can be allowed to access. The Trolls are keeping the database on a local machine, which is running Windows XP Professional. They have also mentioned that file encryption would be nice to have. Which of the following actions will is not a good part of the solution?

A. Place the database file in a special directory and name it something like 'TrollSecure$'.
B. On the new directory, remove the 'Everyone' group and add the 'TrollBigWig' group with full control permissions.
C. Using the account of 'Troll Superior', set the Advanced properties of the folder to encrypt the folder, subfolder and files.
D. Tell the Trolls you cannot encrypt the folder or file because then they would have to both use the same logon credentials, which makes 'Troll Superior' cringe.
E. Using the account of 'Troll Superior', add the user certificate for 'Mini Troll' to the encryption details for the database file.

>> !
Answer: D

Creating a directory name with a $ at the end of the name will prevent it from being shown as a shared folder, should someone share it at a later time. Users who know the UNC location of the folder can still locate it however. Removing the 'Everyone' group from the folder just makes basic sense, and thus you add the Trolls to the folder, as they own it. Encrypting the folder is always the best option because any files placed in the folder at a later date will automatically become encrypted. Additionally any temporary files that are created when the database file is open will be encrypted as well, preventing compromise of data from these temporary files. A new (and neat) feature of Windows XP is that you can add multiple users to the encryption properties for files. Any user added can then access the file transparently, as if they had encrypted it themselves.


21. Dynamic Disks are your bread and butter. Around the office, you've acquired the name 'Dynamic Dirk' due to love of Dynamic Disks. Your newest junior Administrator, in an effort to impress you (it's performance review time), comes running up to you in the hallway outside your hot tub room (it's been a good year) and wants to tell you all about Dynamic Disks. Which of the following things that she tells you is wrong?

A. Dynamic Disks are supported under all versions of Windows 2000 and Windows XP.
B. Dynamic Disks are not supported on portable computers that are ACPI compliant.
C. Dynamic Disks are not recommend or supported on non-ACPI compliant portable computers.
D. Dynamic Disks are not available on hard drives with sectors larger than 512 bytes.
E. Windows 2000 Servers running with Dynamic Disks can take advantage of mirroring.

>> !
Answer: A

All versions of Windows 2000 and Windows XP Professional support Dynamic Disks. Windows XP Home Edition does not support Dynamic Disks.


22. One of your older desktop machines (OLD_MAN_42) has been experiencing a lot of problems lately. It seems to spontaneously slow down to a crawl, sometimes stopping services altogether and other times it appears to have no problems at all. You would like to configure the Performance monitor to track items that you are interested in. You suspect that the problem with the machine is either memory or processor related. What counters should you add to best troubleshoot and diagnose the problems with OLD_MAN_42?
  1. Processor - % Processor time
  2. Memory - Pages/sec
  3. Paging File - % Usage
  4. LogicalDisk - Split IO/Sec
  5. Processor - % Idle Time
  6. Server Work Queues - Queue Length
A. All of the above
B. 1, 3, 4, 5
C. 1, 2, 6
D. 1, 3, 4, 6
E. 2, 4, 5, 6

>> !
Answer: C

Processor - % Processor Time measures the time the processor spends executing non-idle threads. Sustained high values indicate a processor bottleneck and a need to upgrade the processor. Memory - Pages/sec measures the rate at which pages are read or written to the hard drive to resolve page faults. A high number (above 5) is a bad sign and indicates the need for more memory. Server Work Queues - Queue Length indicates the number of processes waiting for CPU time. A number above 2 indicates a processor bottleneck.


23. You are the forgetful type sometimes. As if that weren't bad enough, you have a bad habit of taking naps while using your laptop. Last time you take a nap, you were on a plane flying cross-country. Needless to say, by the time you woke up your laptop had shut down and vaporized the Power Point presentation that you were to give the next morning-to your company's biggest customer, for what was to a be $42 gazillion order. To make a long story short, you didn't sleep much that night. You want to prevent this sort of 'thing' from happening again, so you ask your Network Administrator if he can help you configure some sort of option in your laptop's Windows XP setting to help you should you fall asleep again. Shrugging his shoulders as he puts his game of Diablo II on hold, he agrees to help you with your problem. After all, the more the company sells, the more toys he can buy for the IT department. Which of the following things would be the best that he could do to help you with your 'problem'?
  1. Configure the 'Max Battery' setting in Power Options.
  2. Configure the 'Critical Battery Alarm' setting to activate at 5% battery power level and have it force the computer to Hibernate.
  3. Configure the 'Low Battery Alarm' setting to activate at 20% battery power level and have it force the computer to Hibernate.
  4. Kick you in the head--to help your memory problems, of course.
  5. Configure the 'Low Battery Alarm' setting to activate at 15% battery power level and have it give you an audible alarm and display a message on screen.
  6. Configure the 'Critical Battery Alarm' setting to activate at 3% battery power level and have it give you an audible alarm and display a message on screen.
A. Any combination of the above would be fine.
B. 1, 2, 3, 4
C. 3, 4, 6
D. 1, 3, 6
E. 1, 2, 5
F. None of the above would be fine.

>> !
Answer: E

Starting with the 'Max Battery' configuration is a good choice for laptops, even better than the 'Portable/Laptop' configuration. With 'Max Battery', you will have the following by default: Turn off monitor - 5 minutes, Turn off hard disks - 10 minutes, System standby - 15 minutes, System hibernate - 20 minutes. By configuring the 'Critical Battery Alarm' to actuate well before the battery finally dies and force the computer to hibernate, you leave yourself enough power to restart if needed without being plugged in. Configuring 'Low Battery Alarm' to actuate at 15% and display visual and audible warnings gives us enough time to start closing down applications and saving open documents.


24. It's really been one of those weeks. On Monday your Porsche 911 got towed. On Tuesday your dog ran away. Today, Wednesday, finds you in you fetal position in the back corner of your office. The slamming of the door against the wall awakens you from your dream, where the answer was always 42 regardless of the question. You raise your head to see your Backup Administrator (who just hired last Thursday) standing over you with an unhappy face. You wonder if giving her the lint out of left pocket will make her go away, but decide against it as she tells you that the Accounting department file server just exploded (you really are beginning to hate those Trolls) and a replacement one is being sent up from the store room. You wonder who had the foresight to have a backup machine on hand while the Backup Administrator pleads with you to help her restore the system; she's new after all. You have a backup place in place and the last five backups have been done as follows:
  1. DAILY backup tape from Friday
  2. DAILY backup tape from Saturday
  3. NORMAL backup tape from Sunday
  4. DAILY backup tape from Tuesday
  5. DAILY backup tape from Monday
What order do you tell her to perform the Restore operating in?

A. 4, 5, 3, 2, 1
B. 1, 2, 3, 5, 4
C. 3, 5, 4
D. 4, 5, 3
E. 3, 1, 2, 5, 4

>> !
Answer: C

In this situation you would need to restore the NORMAL tape first, as this would have all data current and up-to-date through the time the backup was run on Sunday. After this, you restore the DAILY tape for Monday, followed by the DAILY tape for Tuesday. The replacement file server will now be current up to the time the backup was run Tuesday, changes made after that will be lost. A NORMAL backup copies all selected files and marks each as having been backed up. NORMAL backups are the easiest to use for restoring files because you need only the most recent backup to restore all backed up files, however NORMAL backups take the most time because every selected file is backed up, regardless of whether or not it has been changed. A DAILY backup copies all selected files that have been modified on the day the DAILY backup is performed, however the files are not marked as backed up.


25. Having finally finished getting your Windows 2000 Active Directory domain up and running, you have been tasked with implementing software distribution via Group Policy. Which of the following software distribution methods does not exist?

A. Assigning software to users.
B. Publishing software to computers.
C. Assigning software to computers.
D. Publishing software to users.

>> !
Answer: B

You can assign software to users (software can be set to install either the next time the user logs onto a computer or install via document invocation), you can assign software to computers (the software will be installed the next time the computer starts up and will then be available to all users), or you can publish software to users (software packages will show up in the Add or Remove Programs applet of the Control Panel).


26. In your small office, you only have six machines, all workstations arranged in a peer-to-peer arrangement. Because money is tight you only have one Internet connection. You have a broadband connection to the Internet because your company does Web site design and often times transfers several hundred MB of data in a single day up or down. You would like to configure Windows XP to allow all six computers to be able to access the Internet without buying any extra hardware. You do have several extra network adapter cards sitting in the closet for a rainy day. All of your computers set up to obtain an IP address automatically, which results in them making use of APIPA and are connected to each other via an 8 port hub. Additionally, you would like to enable some sort of firewall protection for your network. How can you enable all six computers to connect to the Internet in the most economical and easy to administer way?

A. Install Windows 2000 Server on one of the workstations and then install and configure NAT. Install a second network adapter card in the Server and connect one adapter to the hub and the second adapter to the broadband connection. Install and configure Internet Security and Acceleration Server 2000 on the machine.
B. Move the CAT5 cable from the broadband modem to each computer as required to enable each one to connect to the Internet.
C. Install a second network adapter in one of the workstations. Connect one adapter to the broadband modem and the other one to the hub. Configure Internet Connection Sharing on this computer. Configure Internet Connection Firewall on the ICS Host machine.
D. Install a second network adapter in one of the workstations. Connect one adapter to the broadband modem and the other one to the hub. Configure Internet Connection Sharing on this computer. Configure Internet Connection Firewall on each machine in your workgroup.
E. Sign up for six accounts on one of the 'Premier' free Internet dial-up companies. Connect all computers to the Internet via their dial-up accounts.
F. Connect the broadband modem to the uplink port on the hub and then connect the six computers to six other ports on the hub.

>> !
Answer: C

The best solution (remember, the best solution is usually the cheapest, easiest one that gets the problem solved) here is to install the second adapter card in one machine and configure it for ICS and ICF. You should never configure ICF on any machine on the internal network except for the ICS host, as this will prevent any traffic in or out of the machine (which in turn defeats the entire purpose). Installing Windows 2000 Server and ISA Server 2000 is a valid solution for this problem, although it's overkill and also unlikely that the company has that software sitting on the shelf, going unused. Moving CAT5 cables around the office is certainly not ever going to happen unless you are down on your luck and have no other choice or you want to connect a machine that is not normally connected, say to update its Operating System or such. Connecting the modem directly to the uplink port and then connecting the other computers to the hub will not solve the problem either, as you only have one IP address (most likely) and most broadband connections require the machine name and MAC address in order to get the DHCP lease. Setting up six dial-up accounts is not a viable solution either unless you want to install more phone lines. (Microsoft: 'Set up and Use Internet Connection Sharing', 'Use the Internet Connection Firewall to Secure Your Small Network')


27. You just installed an unsigned driver (shame on you!) and now your computer is acting like it has a hemorrhage. You have the following options available to you to correct the problem. Which one should you not use?

A. Reboot the computer into Safe Mode and uninstall the driver that you know is causing the problem.
B. Reboot the computer, log in and use the Driver Rollback feature of Windows XP.
C. Reboot the computer into Safe Mode and use the Last Known Good Configuration option.
D. Without rebooting the computer, use the Driver Rollback feature of Windows XP.
E. Reboot the computer and apply the last backup to it.
F. Reboot the computer and apply the last System Restore to it.

>> !
Answer: B

The key here is that once you complete the logon process that that configuration now becomes the Last Known Good Configuration. Hence, you have not lost that option. The best solution to this problem is too not install unsigned drivers if you can avoid it. Unsigned drivers are often poorly written and can quickly bring a system to its knees. If you have installed a driver that you suspect is causing troubles, the best solution is to perform a Driver Rollback during the same session (note that this will only work if a previous version of the driver exists). You cannot roll back drivers for printers, as they are not controlled via the Device Manager. If this is unsuccessful, you next best option is a Safe Mode restart with removal of the driver. After rebooting again, your system should be back to normal again. Applying the last Windows Backup or System Restore to your computer, while solving the problem, are most likely above and beyond in this case; however, they still remain as valid recovery options nonetheless.


28. It's a tragedy-it really is. After working for Vogon Heavy Industries for 3 years straight (straight = no days off), your boss granted you two days of personal leave. It seems that over this time, your snow skiing skills have certainly degraded. While screaming downhill on the a double diamond run (doing your best imitation of Sonny Bono), you abruptly remember what it feels like to wipe out. Three days later you wake up in your bed, both legs in casts, and see your girlfriend shaking her head and muttering something about how is she supposed to make her Lamborghini payment now? The phone rings and you hear your boss, Mr. Smiles, saying that you have been granted permission to work from home via Remote Desktop-but only if you make it as secure as possible. You tell Mr. Smiles what you plan to do to make this happen. What do you not tell him?

A. Set the 'Set client connection encryption level' Group Policy setting to HIGH LEVEL.
B. Set the 'Always prompt client for password upon connection' Group Policy setting to ENABLED.
C. Set the 'Do not allow clipboard redirection' Group Policy setting to ENABLED.
D. Set the 'Do not allow keyboard shortcuts ' Group Policy setting to ENABLED.
E. Set the 'Do not allow client printer redirection' Group Policy setting to ENABLED.
F. Set the 'Do not allow driver redirection' Group Policy setting to ENABLED.

>> !
Answer: D

'Do not allow keyboard shortcuts' is not a valid Group Policy setting. The other five Group Policy settings listed are valid, and should be used in all together or in some combination, as required, to secure the Remote Desktop connection. Note also, that though not asked here, you must take steps to open port 3389 on your firewall to allow Remote Desktop to function. If you are using Internet Connection Firewall on a machine between the host and remote computer, ensure that the 'Remote Desktop' service option is enabled.


29. You want to optimize the security on your files and folders that are stored on a file server in your department so you encrypt the files using the encrypting file system. You want to work on these files at home, so you email them to your private email address so that you can pick up the mail when you get home. A couple days later your credit card company calls you about a number of unauthorized purchases that had been made with your credit card number. This number was included in the spreadsheets. How did the hacker access the information in your private files?

A. The hacker intercepted the email message as it moved over the public network
B. The hacker must have cracked the EFC algorithm
C. Files with the .eml file extension cannot be encrypted
D. You cannot email files that are encrypted, you must decrypt the file manually, and then attach the file to an email message

>> !
Answer: A

EFS files are only encrypted on disk. If you send EFS files over a network connection, the data contained within these files are not encrypted. You must use other technologies, such as SSL/TLS or IPSec to ensure that files are encrypted over a network connection. Note that WebDAV is able to encrypt the file locally and transmit it in encrypted form.


30. You like to spend your spare time reading (when your not playing network games of Quake III or sitting in your hot tub). Today, you've been reading about NTFS under Windows XP. Which of the following did you not read about?

A. File encryption
B. Multiple data streams
C. File compression
D. Sparse file support
E. NTFS change journal
F. Compatible with Windows NT 4.0 SP 3
G. Volume shadow copy

>> !
Answer: F

Windows NT 4.0 cannot use a Windows 2000 or Windows XP NTFS volume until it has been upgraded to at least SP 4. Even with SP 4 or later installed, the Windows NT 4.0 installation will not be able to take advantage of the advanced features of NTFS v5, such as: Reparse points, Disk quotas, File encryption, Spare file support and the NTFS change journal.


31. Your boss, Mr. Hand, has asked you to research how the uninstall feature of Windows XP Professional works. After you have completed your research for Mr. Hand, which item will you not be able to truthfully tell him?

A. The uninstall feature works if the hard-drive has been converted to NTFS or to a dynamic disk.
B. The uninstall feature is supported for Windows 98.
C. The uninstall feature is supported for Windows Millennium Edition.
D. The uninstall feature requires about 300 MB of free hard-drive space.
E. If an application has been installed after the installation of Windows XP, it will have to be reinstalled following the restoration of the previous Operating System.

>> !
Answer: A

The following events will prevent the uninstall feature from working: converting a disk to the NTFS file system, converting the disk to a dynamic disk, or creating or deleting a volume. Uninstall is supported when upgrading from Windows 98 or Windows Millennium Edition. The process requires about 300 MB of free space on the hard-drive and the Setup process will check to see if this space exists during the installation of Windows XP Professional. Windows XP will ask you 30 days after the upgrade if you want to remove the backup files to free up hard-drive space.


32. Between network games of Quake III Arena you decide to run to the employee lounge to get a caffeine fill-up. While there, you overhear someone talking about a new feature of Windows XP called 'Volume Shadow Copy'. You decide you should do some research on this topic as you must maintain the god-like appearance in the company. What information do you find out about Volume Shadow Copy during your research?

A. A computer can be backed up while applications and services are running.
B. Files are not skipped during the backup process as they are during a normal backup procedure.
C. Files open at the time of the shadow copy appear closed on the shadow copy volume.
D. The need for scheduling a backup window is eliminated.
E. None of the above.
F. All of the above.

>> !
Answer: F

The Volume Shadow Copy is a new (and really cool) feature in Windows XP. Volume shadow copy provides an instant copy of the original volume. A shadow copy of the volume is made at the time the backup is initiated. Data is then backed up from the shadow copy instead of from the original volume (cool!). The original volume can change during the backup process, but the shadow copy remains the same. This is extremely useful for busy machines that are in use all of time, even during scheduled backups. You must be using NTFS to be able to take advantage of the Volume Shadow Copy service.


33. Match the following access control terms with their definitions:
a. Security Principal
b. Security Identifier
c. Access Token
d. Object
e. Inheritance
f. Owner
g. ACL
h. Security Descriptor
i. Security Groups
  1. Any resource that can be manipulated by a program or process, such as the user interface, files, folders, printers, Active Directory entries and sessions, processes, threads and access tokens.
  2. An ordered list of access control entries (ACEs) that define the permissions that apply to an object and its properties.
  3. Any entity that can be authenticated, such as a user, computer, group or service.
  4. A data structure containing the security information associated with a securable object. It contains the DACL and SACL for an object.
  5. A data structure containing the SID for a security principal, SIDs for the groups that the security principal belongs to, and a list of the security principal's rights on the local computer.
  6. A value that uniquely identifies a user, group, service, or computer account within an enterprise.
  7. The only security principal who has an inherent right to allow or deny permission to access an object.
  8. Can be used to organize users and domain objects, thus simplifying administration.
  9. A mechanism for propagating access control information down through a tree of objects.
A. a - 2, b - 4, c - 6, d - 8, e - 9, f - 5, g - 7, h - 3, i - 1
B. a - 3, b - 6, c - 1, d - 5, e - 9, f - 7, g - 2, h - 4, i - 8
C. a - 1, b - 6, c - 5, d - 3, e - 9, f - 7, g - 2, h - 4, i - 8
D. a - 8, b - 7, c - 6, d - 3, e - 5, f - 6, g - 4, h - 2, i - 1
E. a - 3, b - 6, c - 5, d - 1, e - 9, f - 7, g - 2, h - 4, i - 8
F. 42. The answer is always 42.

>> !
Answer: E


34. You have installed Windows XP onto a FAT32 partition. You later decide to convert the FAT32 partition into an NTFS partition. The conversion to NTFS completes without incident. You want to apply high security to the computer by using security templates. Which template should you apply first?

A. hisecdc.inf
B. setup security.inf
C. compatws.inf
D. securedc.inf

>> !
Answer: B

When Windows XP is installed on a non-NTFS partition, the default NTFS permissions are not set on the file system and registry entries. This continues to be the case even after you convert the file system to NTFS. In order to set the default permissions on the file system and registry, you must run the setup security.inf security template. All the other templates mentioned are incremental templates. These incremental templates should be applied only after the setup security.inf template settings are applied.


35. You wish to use the Plus! Pack MP3 converter to convert some licensed music files in .wma format to the MP3 format. You also want to increase the bit rate from 128kbps to 64kbps during the conversation to reduce the files size, and place the new files in a different folder. However, as you attempt the conversion, you find that it fails. Why did the conversion of the files fail?

A. You cannot convert files from .wma to MP3 format
B. The licensed files cannot be copied to another files, regardless of conversion
C. You cannot convert licensed files to a lower bit rate and place the converted files into a different folder
D. The Plus! Pack converter only converts to higher bit rates

>> !
Answer: C

The Plus! Pack audio convert does not actually convert licensed audio files. When you specify a bit rate lower than the original, you will see an error message that informs you that Digital Right Management is preventing the conversion. If you specify the same or higher bit rate, it appears that the files are converted, but in fact they are just copied into a different folder.


36. Which one of the computers below cannot be directly upgraded to Windows XP?

A. Computer One: Pentium II 400, 128 MB RAM, 4.1 GB hard-drive with 2.4 GB free space, Windows Millennium Edition
B. Computer Two: Pentium 233, 64 MB RAM, 2 GB hard-drive with 1.5 GB free space, Windows 98
C. Computer Three: Pentium II 450, 128 MB RAM, 6.4 GB hard-drive with 4.5 GB free space, Windows NT 3.51
D. Computer Four: Pentium 300, 64 MB RAM, 3.2 GB hard-drive with 1.8 GB free space, Windows NT 4.0

>> !
Answer: C

Computer Three. Although this computer meets all the required minimum hardware requirements (Pentium 233 or higher, 64 MB RAM or higher, 2 GB hard-drive with 1.5 GB free space minimum or better, VGA graphics or better, keyboard, mouse, CD-ROM and network card for network installations), it does not support direct upgrade due to its operating system. Windows NT 3.51, Windows 95 and Windows 3.x and older Operating Systems do not support direct upgrades to Windows XP.


37. You are attempting to troubleshoot TCP/IP on your Windows XP desktop machine. Using the IPCONFIG command, what can be done?
  1. Display all TCP/IP configuration for all adapters.
  2. Renew the DHCP lease on all adapters at the same time.
  3. Set IP address for each adapter, one adapter at a time.
  4. Renew the DHCP lease for each adapter, one adapter at a time.
  5. Release the DHCP lease on an adapter.
  6. Set DHCP class information for each adapter.
  7. Change DNS settings for each adapter.
  8. Display the contents of the DNS client resolver cache.
  9. Clear the contents from the DNS client resolver cache.
A. You can perform all of the functions using the IPCONFIG command.
B. 1, 2, 4, 5, 6, 8, 9
C. 1, 2, 5, 6, 7, 8, 9
D. 2, 3, 4, 5, 6, 7, 8

>> !
Answer: B

The IPCONFIG command line utility is perhaps the most useful tool for troubleshooting basic TCP/IP configuration problems. You can not adjust DNS settings applicable to the adapter, this must be done from the DNS tab of the Advance Properties page for TCP/IP configuration for each adapter. Setting of IP address information is done from the TCP/IP properties page for TCP/IP configuration for each adapter.


38. You've been reading recently about the new security features of Internet Explorer 6.0. You are really interested in preventing your users from using ActiveX controls and also from downloading files from certain web sites. What configuration options do you have to prevent the downloading, installing and running of all ActiveX controls and also preventing your users from downloading files from web sites you specify?
  1. Set 'Download all ActiveX controls' to DISABLE.
  2. Set 'Download signed ActiveX controls' to DISABLE.
  3. Set 'Download unsigned ActiveX controls' to DISABLE.
  4. Set 'Initialize and script ActiveX controls not marked as safe' to DISABLE.
  5. Set 'Run ActiveX controls and plug-ins' to PROMPT.
  6. Set 'Font download' to PROMPT.
  7. Set 'File download' to DISABLE.
A. All of the above
B. 1, 2, 3, 4, 5, 6
C. 1, 2, 3, 4, 7
D. 1, 2, 3, 5, 6, 7
E. 1, 2, 3, 4, 6

>> !
Answer: C

The safest way to prevent users from doing something is most definitely to disable it. Setting an option to PROMPT gives the user the option, which does not meet the requirement of the scenario. Font download was never mentioned as criteria to be considered. (Internet Explorer 6.0, Setting Up Security Zones)


39. Your company sells construction equipment. It's not the normal, every day type of construction equipment that you can find everywhere else though. Your company sells specialty equipment used to build hyper-space bypasses, and thanks to the Vogons recent galactic expansion plans, business is good. Your bosses, Frankie and Benjy (their white mice, by the way), are security fanatics and have decided to implement Smart Card usage for all traveling sales people; after all, not all species take kindly to having their planet destroyed to make room for another hyper-space bypass. Which of the following statements are untrue when talking about Smart Cards?
  1. Smart Cards use a PIN instead of a password. The user inserts the card into the reader and then enters a PIN to allow access to the card.
  2. Smart Card readers are standard Windows devices that can be installed via the Hardware Wizard.
  3. When logging in via a Smart Card, two encryption keys are used. When logging in normally, only one encryption key is used.
  4. A user with a Smart Card uses the standard CTRL+ALT+DEL key combination to start the login process.
  5. Smart Cards can be used for Remote Access authentication.
  6. Smart Cards provide isolation of security critical computations from other parts of the system.
  7. The entire Smart Card logon process is identical to that of the normal logon process.
A. All of the above statements are true concerning Smart Cards.
B. 4, 7
C. 2, 3, 5, 6
D. 3, 4, 7
E. 5, 7
F. 1, 3, 6, 7

>> !
Answer: B

Smart Cards provide the following benefits to users: They provide a tamper resistant means of storing private keys from other forms of identification information; They isolate security-critical computations involving authentication, digital signatures and key exchanges from the rest of the system; They are portable and be taken with the user to use on any computer system equipped with a Smart Card reader. The logon process involved when using a Smart Card is significantly different than that of the normal logon process. To commence the process, a user simply inserts their Smart Card into the reader. After doing so, the user will be prompted for their PIN. The PIN allows access to the Private Key contained on the Smart Card itself, and the logon process continues. The CTRL+ALT+DEL key combination is not required when using Smart Cards.


40. You are in the early stages of planning an upgrade from Windows 98 desktops to Windows XP Professional. You have done all of your homework and decided now is the time to upgrade; the Group Policy Objects are just to tempting to pass up. Besides you are past being tired when it comes to dealing with Windows 98's most famous feature: the Blue Screen of Death. A large part of the migration will be to migrate users settings over to the new Operating System. To do this, you decide to make use of the User State Migration Tool (USMT). Which of the following items is not true concerning USMT?

A. USMT can be used to migrate settings from Windows 95, Windows 98 and Windows Millennium Edition.
B. USMT can be used to migrate settings from Windows NT 4.0 and Windows 2000.
C. USMT cannot be used in command line scripts, as it is a GUI driven utility.
D. USMT requires a network store to hold the temporary files created during the migration process.
E. You can customize what files and settings USMT migrates.

>> !
Answer: C

The User State Migration Tool is entirely command line driven utility, and thus it can take advantage of the tremendous power that scripting can yield-especially when used to migrate a large number of users. Note that if you are migrating only a handful of users, you can use the Files and Settings Transfer Wizard (included on the Windows XP Setup CD-ROM) to perform this task via a GUI.


41. Barney wants to add some old 2 GB hard drives to his existing Windows XP box, and would like to test out XP's software RAID capabilities. Which of the following commands should he use to make sure he has the right sized sectors when converting from a Basic disk to a Dynamic disk?

A. autochk
B. chkdsk
C. diskpart
D. fixprnsv

>> !
Answer: B

The disk sector size must be 512 bytes to convert a Basic disk to a Dynamic disk, so he would use the chkdsk command to make sure he had the correct sized sectors on the 2 GB drives. There must be 1MB of free space on a disk to convert it from Basic to Dynamic.


42. Kent has added a new 64MB AGP video card to his new Windows XP computer. He would like to tweak the setting for it and review the configurations. Where can he access this in Windows XP? (Choose all that apply)

A. Advanced Configuration and Power Interface
B. Device Manager
C. Sound and Video Devices
D. Advanced button on Display Properties Settings Tab
E. Unknown Device Wizard

>> !
Answer: B & D

The properties of a Video card can be accessed through Device Manager as well as the Advanced button on the Display Properties Settings Tab. Accessing it through Display Properties can also give you access to custom brand-specific settings. Device Manager can be accessed via the Control Panel as well as under the Computer Management interface.


43. Abe has an Athlon 1.2 GHz / 512 MB RAM / 60 GB HDD machine with Windows XP. He keeps his PC running 24 hours a day as he keeps an erratic office schedule. He is constantly working on projects away from his desktop, and is sometimes on the road. Shutting off his PC completely is detrimental to Abe's work, as he is too much of a workaholic to wait for it to boot back up. However, since you are trying to keep costs down for the IT department, you'd like him to turn off the PC, as well as keep the PC from too much wear and tear. What is the most efficient solution for this issue?

A. Use the Always On power scheme, and have Abe turn off the monitor when he is away from his desk.
B. Set the computer on Standby so that the computer uses less power.
C. Set the computer to hibernate automatically at midnight every day of the week so it consumes less power.
D. Use the Minimal Power Management power scheme, so that the monitor will turn off, but the hard disk doesn't.

>> !
Answer: B

Setting Abe's computer on Standby will consume less power by turning the monitor and hard drives off after a set amount of time; it can be restored quickly in order for fast access to the desktop. Hibernation mode saves the desktop state to disk before shutting down. While it will save anything stored to the desktop, it is not applicable in this case because it shuts the machine down completely.


44. You are the network administrator at the headquarters for a toy manufacturer in Chicago, Illinois. The manufacturing plant is in South Bend, Indiana. You need to manage disks on a computer in the plant; so you must first create a custom console. What do you need to do in order to create a custom console?

A. Start --> Run --> DISKADMIN
B. Start --> Run --> DISKMAN
C. Start --> Run --> MMC
D. Start --> Run --> CON

>> !
Answer: C

Like in Windows 2000, the Microsoft Management Console is the command used to create custom administrative consoles.


45. A user calls the helpdesk complaining that their new installation of Windows XP has a "funny looking Start Menu" that is too big and that he can't find his programs. The user wants you to fix the problem so that his Start Menu looks like the one he had on his Windows 98 system. How would you fix it?

A. Unlock the Taskbar
B. Unpin extra items from the Start Menu to make it smaller
C. Set the system to use the Classic Start Menu
D. Set the system to use the Windows XP Start Menu

>> !
Answer: C

Changing to the Classic Start Menu will allow the user to have the same menu they're used to from older Windows operating systems. This setting can be changed by Right-clicking on the taskbar then go to properties and finally go to the Start Menu tab in the Properties box. It may also be applied through Group Policy.


46. A user calls the helpdesk complaining that their clock has disappeared from their taskbar. They are running a Windows XP Professional desktop that is participating in Active Directory. When you take control of their desktop using Remote Assistance the clock is indeed missing. You try to restore it by right-clicking on the Taskbar and choosing Properties, but the option for "Show the clock" is missing from the Taskbar tab of the Taskbar and Start Menu Properties dialog.

A. The clock was not installed during Windows XP setup. Add the clock through Add or Remove Programs in the Control Panel
B. If the "Show the clock" option is missing the option has been disabled through Group Policy and cannot be enabled on the desktop
C. This option can only be configured through the Date, Time, Language, and Regional problems applet in the Windows XP control panel
D. The clock is not available in many Windows XP desktop themes - suggest to the user that they use the Windows Classic scheme instead

>> !
Answer: B

When the clock has been disabled through Group Policy the "Show the clock" option will be removed from the Taskbar and Start Menu Properties dialog box.


47. You are responsible for providing technical support for a publicly accessible computer lab at Springfield Community College. One evening a visually disabled student comes to you to ask for help. She has been using a Windows XP desktop that has been specifically configured with a high-contrast color scheme and enlarged text through Windows Accessibility Options. She is a diabetic and has to leave the computer occasionally to inject insulin or check her blood sugar. Her problem is that the computer seems to reset itself while she is gone and the Accessibility Options turn off. How can you stop the computer from doing this?

A. Increase the amount of time before the Windows Screen Saver activates
B. Increase the amount of time before the Accessibility Options are disabled through the Accessibility Wizard
C. Increase the amount of time before the Accessibility Options are disabled through the Utility Manager
D. Increase the amount of time before the Accessibility Options are disabled through the Accessibility Options in the Control Panel

>> !
Answer: D

The easiest fix is to change the deactivation time for the Accessibility Options through the Control Panel. Microsoft recommends that this feature be configured to turn itself off on publicly accessible computers. While you can change this setting through the Accessibility Wizard, it's a LOT of work. This feature cannot be configured through the Display Settings applet or the Utility Manager.


48. You work for a company located in Montreal, Quebec, Canada. While French is the official language where your company is located, the majority of your company's clients prefer to receive their business communications in English. You need to configure all Windows XP computers in the company so that they can be toggled back and forth between English and French easily depending on which language and keyboard the user needs at the time. Which approach is the least troublesome for your users?

A. Install both English (Canada) and French (Canada) as input languages with English as the default. Place a language icon in the Notification Area and instruct your users to toggle between languages using this icon
B. Install both English (Canada) and French (Canada) as input languages with French as the default. Place a language icon on the taskbar and instruct your users to toggle between languages using this icon
C. Install both English (Canada) and French (Canada) as input languages with English as the default. Instruct your users to toggle between languages using the Regional and Language options applet in the Control Panel
D. Install both English (Canada) and French (Canada) as input languages with French as the default. Instruct your users to toggle between languages using the Regional and Language options applet in the Control Panel

>> !
Answer: A

English should be the default language as the majority of communications are in English. Placing the language icon in the Notification Area is much easier for your users than having them try to change languages through the Regional and Languages applet in the Control Panel.


49. A user complains that every time she opens more than four or five Web browser windows at the same time they all group onto one button on the Taskbar. She wants to know how to stop the buttons from automatically grouping together on her Windows XP system as it makes it much harder for her to toggle between Windows quickly. What should you recommend to her?

A. Unlock the Taskbar to prevent the buttons from "locking" to each other
B. Choose the Windows Classic scheme to revert to pre-Windows XP desktop behavior
C. Uncheck the "Group similar buttons" option in the Taskbar properties
D. This is default behavior in Windows XP - it cannot be changed

>> !
Answer: C

Grouping of similar buttons can be disabled in the Taskbar properties dialog box. Simply right-click on the taskbar, choose Properties, and uncheck this option when the dialog box appears.


50. Your manager has asked you to prevent the staff in your department from modifying their desktop settings. All desktops are running Windows XP Professional and are members of a Windows NT 4.0 security domain. Users all logon with their own accounts as each has varying levels of access to domain resources including a file server named FILE1. You want to put your new policy in place with the minimum amount of effort. What should you do?

A. Force all users to login with the same account. Set the profile path on that account to \\FILE1\UserProfiles\%Username%. Login as a user and configure the desktop as desired. Next, rename the USER.DAT file you find in the profile path folder to USER.MAN
B. Set the profile path on all user accounts to \\FILE1\UserProfiles\%Username%. Login as a user and configure the desktop as desired. Next, rename the USER.DAT file you find in the profile path folder belonging to the account you just used, rename it to USER.MAN, and copy it to the other user profile folders.
C. Force all users to login with the same account. Set the profile path on that account to \\FILE1\UserProfiles\%Username%. Login as a user and configure the desktop as desired. Next, rename the NTUSER.DAT file you find in the profile path folder to NTUSER.MAN
D. Set the profile path on all user accounts to \\FILE1\UserProfiles\%Username%. Login as a user and configure the desktop as desired. Next, rename the NTUSER.DAT file you find in the profile path folder belonging to the account you just used, rename it to NTUSER.MAN, and copy it to the other user profile folders.

>> !
Answer: B

The most efficient way to do this is to set the profile path for all user accounts to \\FILE1\UserProfiles\%Username%, logging in as a user and configuring the desktop as desired. Next, rename the USER.DAT file you find in the profile path folder belonging to the account you just used to USER.MAN, and copy it to the other user profile folders.


51. A user phones the helpdesk to complain that icons keep appearing and then disappearing out of the bottom right-hand corner of her computer screen. She's worried that somebody may have slipped a virus onto her system and that it is doing things to her computer when the icons move around. What should you do?

A. Run a virus scan on her system immediately
B. Have her take notes on which program icons are appearing and disappearing to help you diagnose the problem
C. Have her take notes on which programs are running when the icons appear and disappear to help you diagnose the problem
D. Explain that Windows XP automatically hides the icons for programs that aren't being used in order to avoid cluttering up the Notification Area

>> !
Answer: D

Windows XP automatically hides inactive programs in the Notification Area (formerly called the System Tray) in order to free up as much real-estate on the Taskbar as possible. This is the default behavior of the operating system and is nothing to worry about.


52. You need to deploy Microsoft Excel to the Windows XP Professional desktops in your accounting department. It must be installed on each machine regardless of who is using it. All machines are members of a Windows 2000 domain and belong to the Accounting OU. How can you install the software with the minimum required effort?

A. Make sure all computers that must receive the software are in the Accounting OU. Assign an .MSI installer package for Excel to all machines in the Accounting OU through Group Policy
B. Make sure all users that must receive the software are in the Accounting OU. Assign an .MSI installer package for Excel to all users in the Accounting OU through Group Policy
C. Make sure all computers that must receive the software are in the Accounting OU. Publish an .MSI installer package for Excel to all machines in the Accounting OU through Group Policy
D. Make sure all users that must receive the software are in the Accounting OU. Publish an .MSI installer package for Excel to all users in the Accounting OU through Group Policy

>> !
Answer: A

The question specifies that the software installation is tied to the machines rather than the users; therefore, answers B and D are incorrect. Answer C is incorrect because you can only publish applications to users, not machines.


53. The vice president of sales wants your help configuring his Windows XP Professional laptop to use the DualView feature so that he can expand his display across both the LCD projector in the meeting room and his computer laptop display. You configure DualView for the VP and see him off to his meeting. After the meeting he calls to ask if there is any way to set the LCD Projector as the primary display at the next meeting instead of his laptop display. What should you tell him?

A. He can only choose the primary display when using DualView on a desktop computer
B. He can only choose the primary display if both video adapters use the AGP interface
C. He can configure the primary display through the Display applet in Control Panel
D. He cannot configure a primary display when using DualView

>> !
Answer: D

From the Windows XP Help and Support Center: "On many portable computers and some desktop computers (those with two video ports on one video card), you can expand your display to a second monitor by using Dualview. DualView is very similar to the multiple monitor feature, with the exception that you cannot select the primary display. On a portable computer, the primary monitor is always the LCD display screen. On a desktop computer, it is the monitor attached to the first video out port."


54. Tori has XP Professional on her PC. She is the network administrator for a piano company with 236 clients: 100 Windows 2000, 10 Windows 95, 100 Windows 98, 20 NT 4 with SP6 boxes, and 6 XP machines. She would like to use Remote Desktop to manage end-user desktop issues without having to run all over the company. What is the most likely scenario?

A. She will only be able to use Remote Desktop on the six XP clients
B. She will have to install a Terminal Server to reach all the clients
C. She can install the Remote Desktop Connection software from the XP CD but only on the Windows 98, 2000, and XP clients
D. She can install the Remote Desktop Connection software from the XP CD to all the clients

>> !
Answer: D

The Remote Desktop Connection will run on 32-bit computers: Windows 95, Windows 98, Windows NT 4.0, Windows 2000, and Windows XP. The original XP media has the software necessary to install RDC on these clients.


55. You have a user that works at different computers in a department but requires the same desktop settings at each computer. What kind of profile would you create to allow the user to keep her settings regardless of which computer she uses? All computers run Windows 2000 Professional or Windows XP Professional.

A. Roaming profile
B. Mandatory profile
C. Hardware profile
D. Recognition profile

>> !
Answer: A

Roaming profiles are stored on a central server and associated with a user account. The user will receive the settings associated with their profile whenever they log on to a different machine.


56. An arthritic user in your organization is having trouble logging onto his system because his condition makes it impossible to use the CTRL-ALT-DEL key combination. You want to configure his system to allow him to enter key combinations one key at a time. Which Accessibility Option feature should you configure?

A. Mouse keys
B. Sticky keys
C. Filter keys
D. On-screen keyboard

>> !
Answer: B

Configuring sticky keys will allow the arthritic user to enter key combinations one key at a time.


57. You are responsible for a Windows XP Professional computer. The computer is used by several users and belongs to a local workgroup. The system contains corporate information and you do not want the any users other than yourself to have access to network resources while using the system. What group policy can be used to restrict users from browsing the network and using My Network Places?

A. No My Network Places
B. No "Entire Network" In My Network Places
C. No "Network Connections:" In My Network Places
D. No "Virtual Private Network" in Network Connections

>> !
Answer: D

The No "\Computer Near Me" in My Network Places policy removes computers form the user's workgroup and domain from the list of network resources in Windows Explore and My Network Places. The No "Network connections:" In My Network Places removes all computers outside the user's workgroup or local domain from the list of network resources in Windows Explorer and My Network Places.


58. You are the network administrator for Burns Enterprises. You have been asked to setup a closed network that is not accessible from the Internet; you want to use a network protocol other than TCP/IP. There are only seven Windows XP Professional systems on the network and the users of this new network are in two different offices.

Proposed Solution:
Setup the network using the NetBEUI networking protocol
Configure a Cisco 2600 router to connect the two groups of computers

Which statement is true of the proposed solution?

A. The proposed solution would not meet requirements
B. The proposed solution will allow users to share files, but is accessible from the Internet
C. The proposed solution meets the requirements
D. The proposed solution would allow users on the far side of the router to browse the network only

>> !
Answer: A

NetBEUI is a LAN transport protocol and does not support routing; hence, it will not travel over the 2600 router. The proposed solution would not meet the requirements


59. You have one computer on your network that uses an unqualified computer name of Saturn in the primary domain. The fully qualified computer name doesn't exist in the parent domain of Sales.com. You must set your Windows XP systems to resolve the computer name of Saturn. What should be configured in the TCP/IP advanced settings on the Windows XP systems to do this?

A. Append Primary And Connection Specific DNS Suffixes
B. Append Parent Suffixes Of The Primary DNS Suffix
C. Append These DNS Suffixes
D. DNS Server Addresses, In Order Of Use

>> !
Answer: A

In Windows XP the Append Primary and Connection Specific DNS Suffixes resolves unqualified computer names in the primary domain.


60. In TCP/IP, what are the numbers of bits used for the network and host portions of a Class B IP address?

A. 8, 24
B. 24, 8
C. 16, 24
D. 16, 16

>> !
Answer: D

Class A address have 8 bits in the network portion and 24 bits in the host portion; Class B addresses have 16 bits in the network portion and 16 bits in the host portion; Class C addresses have 24 bits in the network portion and 8 bits in the host portion.


61. You are responsible for laptops on your corporate network. Your users work on laptop computers with Windows XP Professional at both their office and at home. Users often complain that when they get home the files that are setup for use offline are not the most current version. What can you do to resolve this problem?

A. Create a local folder for synchronized files and use Windows Explorer to copy them before you go home each day.
B. Use Offline Files and configure synchronization for full mode.
C. Make sure the files you have setup to synchronize do so when you log on and log off.
D. Use the Windows task scheduler the copy the files locally every day 15 minutes before you leave.

>> !
Answer: B

Offline files allow users to synchronize files from a remote computer to a local one. Full mode synchronization checks the file contents and file dates to determine whether file s should be synchronized or not.


62. You need to install Windows XP Professional on a computer that contains Windows 98. You want to configure the system to dual boot both operating systems. What must you do to allow this?

A. Install Widows XP Professional in a separate directory and do nothing. The computer will automatically allow a dual boot.
B. Install Windows XP Professional in a separate directory and add the option to boot to Windows 98 in the boot.ini file.
C. Install Windows XP Professional in a separate directory and delete the old boot.ini file.
D. Create a new directory in the existing system folder called I386 and do nothing. The computer will automatically allow dual boot.

>> !
Answer: A

Windows XP supports dual boot configuration between other operating systems provided that the boot partition is formatted in FAT or FAT32. Windows 95/98/ME does not support NTFS.


63. Your company, Krusty Enterprises, has purchased several new computers with Windows XP Professional. The computers are going to be stand-alone systems and are not going to be connected to the corporate network. When setting up the systems what should you choose to make the computers a member of when prompted?

A. Domain
B. Workgroup
C. Peer to peer workgroup
D. Local Domain

>> !
Answer: B

You must specify a workgroup or domain setting for the system. Because in this case the computers are to be stand-alone systems and do not belong to a network, the setting in the Computer Name tab of System Properties should be set to workgroup.


64. You are the administrator of a peer-to-peer network consisting of all Windows XP Professional computers. One computer is setup to store all your database files for the network. You will be adding 10 new users and are unsure how much drive space you will need to accommodate all the users. What is the best way to configure storage on the system that contains the database files?

A. Install one or more new hard drives on the system and create a spanned volume.
B. Create a RAID 5 and add additional hard drives when necessary.
C. Create a RAID 0 and add additional hard drives when necessary.
D. Create a new folder on the system and have all users copy their data to the new folder. When the data is copied compress the folder.

>> !
Answer: A

A spanned volume includes disk space from up to 32 multiple disks and writes data to a spanned volume on the first disk completely filling the space and continues through each disk that is included in a spanned volume. In this case a spanned volume is appropriate when adding additional drives.


65. You need to move some files from one computer to another in a peer-to-peer network. Both systems run Windows XP Professional and both of the folders you are copying from are formatted in NTFS. What will happen to the NTFS permissions of the files moved?

A. The original NTFS permissions will be retained until the administrator takes ownership of the file and removed the original permissions.
B. All files moved will keep their original NTFS permissions.
C. The files cannot be copied until all of the NTFS permissions are removed.
D. All files moved will lose all of their original NTFS permissions and inherit all of the inheritable NTFS permissions from the new folder.

>> !
Answer: D

When moving files from one NTFS partition to another NTFS partition the files always gain permissions from the existing NTFS partition.


66. You are the administrator of a Windows 2000 network that uses static IP addressing. You want to modify your structure and have a DHCP server assign IP addresses automatically. How can you modify the workstations running Windows XP Professional in order to be configured to use the new DHCP server?

A. Setup APIPA on each workstation.
B. Right click on My Network Places icon and choose properties then choose the Local Area Connection icon and select Client for Microsoft Networks and choose properties; then check Obtain an IP address automatically.
C. Logon to the DHCP server and force all clients to accept new IP address broadcasts.
D. Use the ipconfig /release and ipconfig /renew command from the command prompt.
E. Right click on My Network Places icon and choose properties then choose the Local Area Connection icon and select Internet Protocol (TCP/IP) and choose properties; then check Obtain an IP address automatically.

>> !
Answer: E

IPconfig is a diagnostic command that displays all current TCP/IP network configuration values. Ipconfig /release discharges the current IP address on the system and ipconfig /renew restores a system's IP address from a valid DHCP server. As this is a temporary fix that will not carry over when the machine is restarted this answer would be incorrect. This can only be done from the TCP/IP properties of the Local Area Connection by checking the box for Obtain an IP address automatically.


67. You are the administrator of a network that runs Unix servers and Windows XP Professional workstations. You need to implement smart card logon process for the workstations that use dial-in connections. What is the appropriate protocol to use for your mixed network?

A. TCPIP
B. EAP-TLS
C. PPTP
D. SPAP

>> !
Answer: B

EAP is a general protocol for authentication that also supports multiple authentication methods, including smart cards.


68. You are the administrator of a Windows XP Professional workstation and suspect that an unauthorized individual is trying to guess the passwords of your users. You want to setup your computers so if someone does not correctly logon to the system within the specified number of login tries they are locked out until the administrator unlocks the account. How should this be configured?

A. Set the Account Lockout Duration policy setting to 3.
B. Set the Account Lockout Time to 1.
C. Set the Account Lockout Duration policy to NULL.
D. Check the Account Lockout Reset only by Administrator check box in the Account Lockout Duration policy window.

>> !
Answer: A

Setting the Account Lockout Duration policy to 3 will allow the user to retry the password three times before it locks the account. Once the account is locked, the system will have to be unlocked by an administrator before THAT user can use system again.


69. You are the local administrator of a Windows XP Professional computer that is a member of a domain. You have configured a local security policy but the policy is not effective. What could cause this problem?

A. The security policies of the domain are overriding the system's local security policy.
B. You do not have the correct permissions to modify local security policies.
C. Local security policies cannot be configured if the computer is part of a domain.
D. The system must be rebooted for the new local security to take effect.

>> !
Answer: A

Domain policies override local system policies on computers that belong to domains.


70. What address class would an IP address with a bit sequence in the first octet of 110 would belong to?

A. Class A
B. Class B
C. Class C
D. Class D

>> !
Answer: C

Class C addresses use a three-bit identifier, Class B addresses use a two-bit identifier and Class A addresses use a single one-bit value.


71. You run a Windows XP Professional computer. You have been asked to download some encrypted files form a third party FTP site that is outside of your network and are given a user name and password with appropriate permissions to download the files. You use Internet Explorer 6 with default settings and want to use it to download software from the FTP site. You connect to the FTP site at 192.92.140.84 but are unable to view the contents of the FTP site. What could correct this problem?

A. You do not have the appropriate access permissions to access the FTP site.
B. Your configure your Internet Explorer Internet options to enable folder view for FTP sites and configure browser security with user administration to prompt for user name and password.
C. You must configure a custom security level for Internet Explorer to allow FTP use and configure Internet Explorer Internet options to enable folder view for FTP.
D. The IP address of 192.92.140.84 is a private IP address and your computer must be setup as a SecureNat client for the third party's network.

>> !
Answer: B

Internet Explorer is not configured to allow for log-in and folder view for FTP sites by default. You will need to go to File --> Login As... and use the appropriate username and password.


72. You are an administrator of a Windows XP Professional computer and your system receives its TCP/IP configuration information from a DHCP server. When receiving DHCP information you cannot connect to any host on a remote subnet. What could cause this problem?

A. Your system has an incorrect default gateway specified.
B. Your system is not configured to resolve NetBIOS names.
C. Your system has incorrect WINS server specified.
D. You system has incorrect DNS server specified.

>> !
Answer: A

If the default gateway information on a Windows XP system is incorrect, then access to remote subnets will not be possible. WINS and DNS entries will provide information for name resolution.


73. You are manually configuring a Windows XP Professional system. The system has 1,024MB of RAM with two 4GB hard drives. How big should the paging file be?

A. 512MB
B. 1,024MB
C. 1,536MB
D. 2,048MB

>> !
Answer: C

The paging file is a hidden file that XP uses as if it were RAM. The recommended pagefile.sys for Windows XP is 1.5 times the amount of RAM in a system. Anything larger may cause excessive paging on the hard disk. Virtual RAM is the equal to the paging file + the amount of physical RAM.


74. You are the network administrator for Fife Security. There is a stand-alone workstation installed with Windows XP Professional that multiple users log in to. What is the best way to configure the system so that proxy settings are applied to all users of your system?

A. Check for policy box in Group Policy settings.
B. Set an additional policy that assigns proxy settings per user.
C. Set an additional policy that assigns proxy settings per machine rather than per user.
D. Give Proxy permissions to all accounts that log in to the stand-alone machine.
E. Set an additional policy that assigns proxy settings per group.

>> !
Answer: C

You can set an additional policy that assigns proxy settings per machine rather than per user. When this is enabled, proxy settings apply to all users of the same Windows XP computer and users cannot set their own proxy settings. Group Policy settings can be accessed via Start -> Run -> gpedit.msc.


75. You are using a multihomed Windows XP Professional box to share a broadband connection to the world wide web. You work for a small office that can't spend much money; however, you still want to protect your network from hackers and other malicious users on the outside. How would you configure the network to offer the most efficient protection?

A. Enable the Internet Connection Firewall on the LAN NIC that is on your multihomed Windows XP Professional system.
B. Enable the Internet Connection Firewall on the WAN NIC that is on your multihomed Windows XP Professional system.
C. Enable the Internet Connection Firewall on the NICs of each of the systems that connect to your multihomed Windows XP Professional box.
D. Enable the Internet Connection Firewall on all NICs in your network.

>> !
Answer: B

You would only need to enable the Internet Connection Firewall on your WAN interface. It will act as a NAT server and protect your internal LAN from outside attacks.


76. You are the IT director of Waterborne Distilleries. You want to allow certain employees telnet access to the server after business hours, so you add them to the TelnetClients group. The next morning you receive numerous complaints from users in this group stating that they were not able to connect. You test it yourself both from home as well as the office and can connect successfully. What is most likely the problem?

A. The telnet server on Windows XP is limited to only 2 concurrent users.
B. The telnet server needs to be configured to accept anonymous calls.
C. The modem failed, and needs new drivers.
D. You didn't configure port 25 for telnet access.

>> !
Answer: A

Users must belong to the TelnetClients group. Port 25 is for SMTP traffic; telnet uses port 23. If the modem had failed, you wouldn't be able to connect.


77. You are the System Administrator of MiniMoles, a small enterprise. You get home and realize that you needed to perform additional tasks on a XP Professional box you have as a server. You call into the office and ask one of your work mates to start the telnet service on the XP box. You tell him to go to Start, Run and type in ______.

A. Net start remote
B. Net start telnet
C. Net start tlntsvr
D. Net start telnet server

>> !
Answer: C

Windows XP telnet server services can be started at the Run prompt using the net start tlntsvr command.


78. You are the IT Supervisor for New Ideas, Ltd. You decide that in order to make administrative tasks less cumbersome, you need to centralize all resources. Since this isn't really possible, (your resources are distributed over 10 different servers) you need to simulate a centralized environment. What should you implement?

A. NDS
B. Active Directory
C. DFS
D. Centralized Resource Manager

>> !
Answer: A

AD services provide a single point of network management.


79. You are the IT Supervisor for New Ideas, Ltd. You currently have 11 Domain Controllers on your network. Controller #7 had problems and has gone down. What is the effect to the network and its users?

A. The entire network will fail.
B. All workstations that used controller 7 to access the rest of the network will be cut off.
C. Nothing, all DCs in and AD environment are peers, therefore the network is fault tolerant.
D. All users will receive a message stating that controller 7 has failed and its resources will be unavailable.

>> !
Answer: C

There is no master controller in the Active Directory Environment. All DCs with the environment are peers.


80. You are the IT Supervisor for New Ideas, Ltd. You are designing a scheme for password requirements. Which of the following is a characteristic of a strong password? (Choose all that apply)

A. Passwords must be 8 to 10 characters long.
B. Passwords must be changed every 90 days.
C. Passwords must be greater than 15 character.
D. No consecutive numbers or letters.
E. Passwords should contain a user's first name.
F. Passwords should contain a user's last name.

>> !
Answer: A, B & D

There are many different conditions that can be put on user passwords. Some of the most common are: the password must contain at least 1 number, no consecutive or repeated numbers or letters, and force the user to change the password every 90 days.


81. You are the IT Supervisor for New Ideas, Ltd. You designate a small group of people whose job will be to backup and restore data on workstations. Each user is responsible for a certain department. You want them to have ONLY the permission needed to carry out this task. What built-In local groups should they be a part of on each of the computers in their area?

A. Administrators
B. Power Users
C. HelpServicesdGroup
D. Backup Operators

>> !
Answer: D

Backup Operators are able to use Windows Backup to backup and restore data to computers.


82. You are the IT Supervisor for New Ideas, Ltd. You have implemented Group Policies on all workstations running Windows XP Professional. You have a handful of workstations that are using Windows 98. Can you apply those same policies to those machines?

A. Only on the most basic level.
B. You must manage polices using Poledit.exe.
C. You will be able to manage the Group policies on the older system without any problems.
D. Windows 98 doesn't support policies.

>> !
Answer: B

Group policies can only be applied to Windows 2000 or XP machines. If you wish to manage policies on older systems you must use poledit.exe.


83. You are the System Admin of MiniMoles, a small enterprise. You have a Windows XP Professional box as a server. You want to configure the telnet service to only accept connections from you or your technicians. How do you configure the security settings of the telnet service?

A. Run the tlntadmin admin tool.
B. Run the telnet config tool.
C. Run the telnet sec tool.
D. Run the telnet services config tool.

>> !
Answer: A

To set security on a Windows XP telnet server run the admin tool tlntadmin.


84. What is the default cipher-strength of Internet Explorer 6.0 included with Windows XP in the U.S.?

A. 32-bit
B. 64-bit
C. 128-bit
D. 256-bit

>> !
Answer: C


85. You own a small business with a peer-to-peer network composed of 12 workstations, all running Windows XP Professional. One of the machines is multihomed as you have shared out a DSL connection with Internet Connection Sharing. You have activated the built-in firewall service, however, your employees are reporting that they cannot browse the internet or receive email. What should you do first?

A. Make sure the required services are still running on the server.
B. Ensure that POP3 and Web Server are selected in the services tab of the setting section of the Internet Connection Firewall page.
C. Ensure the POP3 and Web Server are not selected in the block services tab of the setting section of the Internet Connection Firewall page.
D. Ensure that all your LAN clients have the XP Internet Connection Firewall enabled.

>> !
Answer: B

The Windows XP Internet Connection Firewall is a stateful firewall, so all communications between your LAN clients and the Internet are monitored. Specific access for various services (for example POP3, FTP Server, Remote Desktop) must be configured under the connection's Advanced tab. Only the system sharing its Internet connection needs to have the firewall enabled. Enabling ICF on LAN clients will disrupt communications on your internal network.


86. You own a small business with a peer-to-peer network composed of 7 workstations, all running Windows XP Professional. One of the machines is multihomed as you have shared out a broadband connection with Internet Connection Sharing and enabled Internet Connection Firewall. You would like to enable ICF to log all unsuccessful connection attempts that come across the internet. How do you configure this?

A. Under Network Tasks for the WAN connection click Settings under the Advanced tab; select Log dropped packets.
B. Under Network Tasks for the WAN connection click Settings under the Advanced tab; select Log successful connections.
C. Under Network Tasks for the LAN connection click Settings under the Advanced tab; select Log dropped packets.
D. Under Network Tasks for the LAN connection click Settings under the Advanced tab; select Log successful connections.

>> !
Answer: A

From Network Connections, click on the WAN (Internet) connection. This is the connection that should have ICF enabled. Under Network Tasks, pick Change settings of this connection; choose the Advanced tab and then Settings. Under Logging Options the Security Logging tab enabling the Log dropped packets option will log unsuccessful inbound connection attempts. Successful outbound connections are logged under Log successful connections.


87. You have enabled Internet Connection Sharing for your small network. You have implemented a VPN for users who will be on the road and need to connect to the network. Which protocol would provide the best level security? (Choose all that apply)

A. L2TP
B. PPTP
C. SLIP
D. CHAP

>> !
Answer: A & B

L2TP and PPTP create an encrypted tunnel through an untrusted network such as the Internet. SLIP, and CHAP do not provide any encryption.


88. You administer a small office network in Columbus and have been sent to support one of the company's customers in Atlanta. You have set up a VPN for your office network, and need to access an XP workstation in order to download some files for the customer; however, the workstation you need to connect to doesn't have a share on its system folder. How do you access this machine remotely?

A. Use the Admin# share
B. Use the Admin$ share
C. Use the Admin% share
D. User the Admin! Share

>> !
Answer: B

Windows XP automatically creates a system folder share named "Admin$". The "$" is what hides this share from users browsing the computer. It can be accessed by anyone with Administrator rights on that particular workstation.


89. You are the network administrator for Delicious Chocolates, Incorporated (DCI). You need to evaluate Windows XP to determine if DCI should migrate its existing desktops to it. You have a variety of Pentium-class, Pentium II class, and AMD K6s at your disposal, each with single 64 MB memory sticks in them. You decide to borrow a 64 MB stick from one of the machines so you can have 128 MB of RAM in the box you are building. Which of the following processors meets the minimum requirements for your evaluation box? (Choose all that apply)

A. 486sx 133 MHz
B. Pentium class 133 MHz
C. Pentium class 233 MHz
D. Pentium II 300 MHz
E. AMD K6 233 MHz

>> !
Answer: B, C, D & E

Windows XP Professional recommends a 300 MHz or higher processor; a 233 MHz processor is the minimum requirement to run XP.


90. You are working on your XP laptop in order to get a presentation done for the following morning. You have already ignored a previous system warning; suddenly, your computer shifts into hibernation mode because you computer's power levels are too high. Which of the following alarms has your computer used to inform you of high energy levels?

A. Low Battery power scheme has put your laptop into hibernation.
B. Max battery alarm has gone off and put your laptop into hibernation, as the maximum amount of battery power has been consumed.
C. The Critical battery alarm has gone off and put your laptop into hibernation, as there is not enough battery power left for it to continue running.
D. Min battery alarm.

>> !
Answer: C

The Critical battery alarm is the second warning you receive if you haven't shut down your computer after the Low battery alarm. It will either warn you again to shut down your computer or it will automatically shift into hibernation mode. When your system goes into hibernation mode, it will save everything in memory to the hard drive. The next time the system boots, the desktop will be restored as it was.


91. You are the network administrator and have been asked by your CEO to evaluate Windows XP in-house in order to determine if the company should migrate to it. You have an existing Pentium III 500 that you can use. What is the minimum amount of RAM required for running Windows XP Professional?

A. 32MB
B. 64MB
C. 128MB
D. 256MB

>> !
Answer: B

The minimum amount of RAM needed to run Windows XP Professional is 64MB. The recommended amount is 128MB; the maximum amount supported by XP Professional is 4GB.


92. You are the IT supervisor of Widgets, Incorporated. You are considering upgrading the workstations in your company to Windows XP. All workstations meet installation requirements, but you are still concerned about compatibility. How can you find any compatibility issues without actually installing the new system on the workstation? (Choose all that apply)

A. Run upgrade advisor from the Win XP install disk.
B. Run the Check Hardware utility included on the Win XP install disk.
C. Check the HCL on Microsoft's web site.
D. Run winnt32.exe /checkupgradeonly from the command line.
E. Run the chkupgrd.exe utility included on the Win XP install disk.
F. Check the Device Compatibility List on Microsoft's web site.

>> !
Answer: A, C & D

Microsoft recommends checking the HCL (Hardware Compatibility List) as well as running Windows XP's Upgrade Advisor before installing Windows XP. Upgrade Advisor can be run from the command line using winnt32.exe /checkupgradeonly .The HCL contains all the devices supported by Microsoft. The Upgrade Advisor checks hardware and software for any issues that may arise.


93. You are the IT supervisor of Widgets, Incorporated. The HR department has 12 identical workstations. Their specifications are as follows:

Processor: 233 MHz
Memory: 128MB
Free HD space: 1GB

You attempt to install Windows XP over the network, but it will not install successfully. What is most likely the problem?

A. Insufficient memory
B. Insufficient processor speed
C. Insufficient hard drive space
D. Incompatible network cards

>> !
Answer: C

Windows XP requires 1.5 GB of free HD space plus and additional 100 - 200 MB for to hold temporary files during the installation.


94. You are the IT supervisor of Widgets, Incorporated. You have installed Windows XP on a workstation in a dual-boot configuration with Windows 98. How can you ensure that applications will work in both Windows 98 and XP?

A. You must install each application twice. Once for each OS.
B. You won't have to do anything. The applications will work on both systems automatically.
C. You can't. The application will only work under one of the OSs.
D. Install the application on a partition accessible by both OSs.

>> !
Answer: A

In a dual boot configuration, you must install applications in each OS' separately. Almost all applications write entries to the registry during install. If you install an application while running Windows XP it will only add entries to the registry for Windows XP.


95. While performing a fresh install of Windows XP, you are prompted to input information pertaining to regional settings and system passwords. At which of the following Windows XP Professional installation stages are you?

A. Post Installation
B. Install Windows Networking
C. Setup Wizard (graphical mode)
D. Setup Program (text mode)

>> !
Answer: C

The Setup Wizard is the second stage of installation before Install Windows Networking and after the Setup program (text mode).


96. You started a new installation of Windows XP Professional from within Windows 2000. Which of the following switches is NOT part of the Modifying Setup using winnt32.exe? (Choose all that apply)

A. /udf:id[,UDF_file]
B. /cmd:command_line
C. /s[:sourcepath]
D. /m:folder_name
E. /copydir:folder_name

>> !
Answer: A & C

Choosing a New Installation from within an existing operating system will start the installation using winnt32.exe. The udf:id[,UDF_file] and /s[:sourcepath] are switches used with the winnt.exe setup program available when booting directly from the CD or a 16-bit platform like DOS. The /udf:id[,UDF_file] switch is used with winnt.exe to modify answers in the answer file for unattended installs. The /s[:sourcepath] switch is used to specify the location of the Windows 2000 files.


97. You are a network administrator for an attorney's office and are installing Windows XP Professional on a new laptop for a partner who recently broke her hand. She will need some modifications made to the way the keyboard reacts when she types, so you will need to enable the XP accessibility tools. Which of the following winnt.exe switches enables accessibility options?

A. /a
B. /s
C. /e
D. /r
E. /ao

>> !
Answer: A

The /a switch enables accessibility options; the /s switch specifies the source path for the setup files; the /e switch specifies a command that will be run at the end of the GUI-mode setup; /r specifies a source directory that installation copies from; and the /ao switch is currently fictional.


98. You are the network administrator, and want to automate the addition of Indexing Services and Message Queuing to your Windows XP installation. Which of the following winnt.exe switches specifies optional software to be installed, but deletes the folder after installation?

A. /m:folder_name
B. /r [:folder]
C. /copydir:folder_name
D. /rx [:folder]

>> !
Answer: D

The /rx [:folder] switch specifies optional software to be installed, but deletes the folder after installation while the /r [:folder] switch does not remove the folder after installation. The /m:folder_name specifies an alternate location for setup files, and /copydir:folder_name creates an optional folder within your Windows XP file folder. These switches occur during winnt32.exe Setup.


99. On a Pentium III 800 MHz PC, you boot from a boot disk and access the Windows XP Professional CD in order to perform a clean install of the operating system. You plan to alter installation specifics. Which of the following switches will not be available to you as part of your Modify Setup?

A. /t [:tempdrive]
B. /s:source_path
C. /u [:answer file]
D. /a

>> !
Answer: B

When booting into Dos, you need to run winnt.exe from the CD. The switch /s:source_path is a winnt32.exe switch that specifies the source path of installation files so it will not be available. The /t switch specifies the location for temporary install files as well as the location to install XP to on a partition; the /s switch specifies the source path for the setup files; /u specifies the answer file that will be used during installation; and the /a switch enables accessibility options. These are winnt.exe switches.


100. You are an administrator setting up multiple machines with XP Professional for offices in New York, Dallas, and Los Angeles. You have provided some details in an answer file for an unattended installation; however, you want each end-user to name her machine, provide her own login information, and set her own time zones. Which of the following interaction levels used during unattended installation of Windows XP Professional allows users only to interact with setup where the Administrator did not provide default information?

A. Fully Automated
B. Hide Pages
C. Provide Defaults
D. GUI Attended

>> !
Answer: B

The Hide Pages level allows users to interact with setup where the Administrator did not provide default information. The Provide Defaults level allows the user to accept or make changes to Administrator defaults. GUI Attended only automates the text portion of setup.


101. You are receiving some OEM machines pre-installed with Windows XP Professional. The OEM configured the PCs so that Windows Product Activation doesn't reset the grace period after you have received and deployed the new machines. Which of the following Sysprep switches were used in order to keep Sysprep from resetting the grace period of WPA?

A. -audit
B. -activated
C. -factory
D. -reseal

>> !
Answer: B

The switch for this function is: -activated. If the system was activated in the factory the -activated switch tells Sysprep not to reset the grace period for Windows Product Activation. Sysprep 2.0 for Windows XP and all related help files are located in the Deploy.cab in the \Support\Tools folder on the Windows XP Professional CD Rom.


102. You are receiving some OEM machines pre-installed with Windows XP Professional. Under Windows XP Professional, four modes were added to Sysprep; which mode is used by an OEM in order to prepare a system for delivery to a customer?

A. Audit
B. Factory
C. Reseal
D. Clean

>> !
Answer: C

Reseal mode is used after running Sysprep in factory mode to prep a system for delivery to customers. This switch clears the Event Viewer logs. It also sets up the Mini-Setup to start at next boot. If you have run sysprep with the -factory switch you must reseal the machine before sending it to customers. You can invoke it using the sysprep-reseal command.


103. You are the administrator for a large insurance company that runs an application that was written in-house for NT 4. The programmers for the company are updating the code since it was written specifically for use on NT 4. They want to test it out on Windows XP as the corporate group has approved a migration to Windows XP Professional for all desktops. In the interim, you will need to set up programmer's boxes to dual-boot Windows NT 4 with XP Professional, since you have limited equipment available. Which of the following statements is not correct when trying to dual-boot Windows XP Professional and Windows NT 4?

A. All existing NTFS partitions will be updated to the version used by XP.
B. Windows NT 4 must be running Service Pack 4 or higher in order to dual-boot with XP.
C. Converted dynamic disks cannot be accessed by Windows NT 4.
D. Partitions formatted as NTFS by XP cannot be accessed by the Windows NT 4 operating system.

>> !
Answer: D

Partitions formatted as NTFS cannot be accessed by MS-DOS, Windows 3.x, or Windows 95/98/ME without the use of third-party utilities.


104. Penelope is the system administrator for The Computer Group, Inc. She is planning to upgrade all the Windows 2000 Professional desktops to Windows XP Professional in the entire company. Which of the following steps is not part of the upgrade process for Penelope?

A. Backup all files.
B. Uncompress any compressed files.
C. Use winnt/checkupgradeonly to run Windows Upgrade Advisor to make sure all hardware and software is supported on the system being upgraded.
D. Scan for viruses and then disable virus software.

>> !
Answer: B

The /checkupgradeonly switch is only available to use with the winnt32.exe setup program. Since the upgrade is from Windows 2000 Professional, winnt32/checkupgradeonly is what runs the Windows Upgrade Advisor to make sure all hardware and software is supported on the system being upgraded.


105. Arnold is upgrading 30 Windows 98 boxes to Windows XP Professional. He wants to enhance security and encryption as well as manage user quotas on each desktop. He would like to complete this project as efficiently as possible. Which of the following Windows XP Professional upgrade types is Arnold going to be able to best accomplish this with?

A. Recommended upgrade
B. Express upgrade
C. Professional upgrade
D. Custom upgrade

>> !
Answer: D

Custom upgrade allows the upgrade of file systems formatted with FAT32 to NTFS. Express upgrade maintains all current settings, which would keep FAT32 as the file system. NTFS supports disk quotas, encryption, and enhanced security; FAT32 does not.


106. You are upgrading a Pentium III 450 from Windows 2000 to Windows XP. You don't have the latest drivers for the video card and NIC, but know that they are on the HCL. You decide to use the Dynamic Update download feature from within the XP desktop. Which of the following Dynamic Update components will allow you perform this operation most efficiently?

A. Device Driver
B. Dynamic Driver
C. Replacement Driver
D. Disables Driver

>> !
Answer: A

Device Driver. Device drivers and Replacement files are the two file types associated with Dynamic Update downloads which is available from the Windows XP desktop. Dynamic Update is only available if Setup is initiated by Winnt32.exe. It does not work with Winnt.exe, booting off of the CD-ROM, booting off of the floppy disks, or RIS installations.


107. Joan is the system administrator at RIS, Incorporated. She administers a Windows 2000 Active Directory Domain. Joan needs to upgrade several existing Windows 98 desktops to XP Professional; however, she needs to make sure to keep each user's settings and preferences without losing any of the information. What command line utility would she use to efficiently migrate all users' Windows 98 settings to XP Professional?

A. ScanState.exe
B. USMT
C. LoadState.exe
D. She will not be able to do this without performing a fresh install of Windows XP.

>> !
Answer: D

A fresh install of Windows XP is needed in order to run USMT; upgrades are not supported. The User State Migration Tool (USMT) allows administrators to migrate settings from Windows 95/98/ME to Windows XP Professional without losing any of the user's preferences by moving them on to a server and then back to the XP installation. If an upgrade installation is performed, all personal settings and preferences must be manually migrated. The User State Migration tool is for administrators only. The client computer must be connected to a Microsoft Windows server-based domain controller. The USMT is similar to the Files and Settings Transfer Wizard, but permits administrators to fully customize specific settings such as unique modifications to the registry.


108. You are installing Windows XP for the accounting department. You decide to use the User State Migration Tool to prepare the desktops for this operation. You've created intermediate stores for your users' files on a server and configured a script that will deploy ScanState.exe at midnight, reformat the disks, and automate the installation of Windows XP images to your clients. What is the next step in the process?

A. The script creates a sub-folder called Scanstate on each of your clients.
B. The script invokes ScanState.exe again as the local administrator on the clients in order to complete the migration of users' settings and preferences.
C. The users are given read access to USMT so that they can finish the migration of their settings and preferences the next time they log in.
D. The script invokes LoadState.exe as the local administrator on the clients in order to complete the migration of users' settings and preferences.

>> !
Answer: D

ScanState.exe pulls settings and preferences from the source system; USMT requires an intermediate store on a network share for the files from the source system; and LoadState.exe migrates the settings and preferences onto the Windows XP clients. Next time users log on to their systems, the remainder of their user state data will be reset.


109. You are using the USMT to migrate users from a Windows 98 PC to one running XP. There are five steps to scanning the source computer during system migration. Which of the following is a step in this process?

A. Map the drive to the USMT folder on the client computer.
B. From the command prompt, Go to the USMT/Scan folder on the server.
C. Logon to the server once the program is finished.
D. Logon as power user to complete the migration.

>> !
Answer: B

Go to the USMT/Scan folder on the server from the command prompt after you map the drive to the USMT folder and before you run scanstate.exe. You will have to map the drive to the USMT folder on the server, not the client; in order to complete the migration, you will have to log in as the migrating client.


110. Maggie administers a network of 30 XP Professional machines. She would like to give each user file level security on each of their workstations, including the ability to encrypt files if needed. Which of the following provides optimum security with its ability to lock down individual files on a user-by-user basis and has advance features such as disk compression and encryption?

A. DOS
B. FAT32
C. FAT
D. NTFS

>> !
Answer: D

NTFS allows for higher security as well as encryption services, while FAT and FAT32 do not. FAT32 is commonly used with Windows Me/9x or earlier versions of Windows, and do not provide complex security functions.


111. Mary has installed a machine with Windows XP Professional to test out before upgrading her production workstation (currently running Windows 98SE). She has decided to format the XP machine with NTFS, since the hard drive is 40 GB. She creates a document, gives herself full permissions, removes permissions to all other users, and then copies it over the network to her production workstation. She logs in as Charlie at the production machine to see if she can access the document she copied over. What does she discover?

A. The file she created on the XP machine has been corrupted when she tries to open it on the Windows 98SE box.
B. Since the original format of the file is NTFS, she can't access it on the 98SE machine.
C. She can open the file without any problems.
D. She can't open the file as Charlie because she only gave the Mary account permissions.

>> !
Answer: C

Files moved from a NTFS partition to a NTFS partition retain their attributes and filenames - so they can only be accessed by the account with the appropriate permissions. Files moved from a NTFS partition to a FAT partition do not retain their attributes or permissions, but do keep their filenames - so the file would be accessible by anyone on the Windows 98SE machine.


112. Travis has been reviewing disk storage systems and has asked you to explain the difference between the two systems offered by Windows XP Professional. You explain there is a system that can be composed of primary partitions, extended partitions, and logical drives. That system is which of the following?

A. Basic storage
B. Logical storage
C. Dynamic storage
D. Active storage

>> !
Answer: A

Basic storage contains basic volumes: primary partitions, extended partitions, and logical drives; as well, it can consist of basic multidisk volumes: volume sets, stripe sets, mirror sets, and stripe sets with parity. However, Windows XP doesn't support multidisk basic volumes, so the disks must be converted to dynamic disks.


113. Your Assistant Systems Manager, Beth, tells you she can't find a mirrored set in her Windows XP Professional computer. You explain to her that XP does not support multidisk basic volumes (stripe set, mirrored set). Windows XP Professional does support primary partitions on a basic disk which is the same as what on a dynamic disk?

A. Active volume
B. Simple volume
C. Striped volume
D. Spanned volume

>> !
Answer: B

A simple volume on a Dynamic disk contains space from a single disk and is supported by Windows XP. However, Windows XP doesn't support multidisk basic volumes.


114. You have been explaining disk storage systems to your co-worker Michael. He asks which Dynamic volume types contains free space from multiple disks in one logical drive. What do you tell him?

A. Active volume
B. Simple volume
C. Striped volume
D. Spanned volume

>> !
Answer: C

A striped volume contains free space from across multiple disks in one logical drive. All data is lost if even a single disk in a striped volume fails. This configuration is best suited when redundancy is not a priority, but disk speed is. The minimum number of disks allowed in a striped volume is two. With Basic disks the equivalent to a striped volume was called a striped set.


115. You have a new Windows XP professional workstation that you work on at home. Lately, your city has been experiencing unpredictable power outages, so you buy an Uninterruptible Power Supply. You would like to configure and manage the UPS from within the XP desktop; what would be the best way to achieve this?

A. Windows XP will use Plug and Play technology to automatically detect and setup the UPS.
B. You will have to run the Add New Hardware Wizard in order to setup the UPS.
C. You will need to access the Power Option applet's UPS tab in order to configure and manage the UPS.
D. Under the Power Schemes tab in the Power Options applet, choose Minimal Power Management in order to integrate the UPS into Windows XP for configuration and management.

>> !
Answer: C

The Power Option applet in the Control Panel provides a tab for the UPS. You can select, configure and manage the UPS from here; however, you will need to use a serial cable for communication between the UPS and Windows XP.


116. Cynthia has just installed a new NIC into her Windows XP desktop, but is having some issues getting it to work; she believes it is a driver issue. How could she best troubleshoot driver problems?

A. She should use the Driver Verifier.
B. She should check her Device Manager.
C. Reload the Driver.cab file.
D. Configure Alarm settings for her NIC device and reboot so that XP can prompt her when it comes back up.

>> !
Answer: A

The Driver Verifier is the most efficient way for Cynthia to isolate and troubleshoot problems with the drivers. The Driver Verifier is located in the C:\Winnt\System32 folder of all Windows XP machines. It is called verifier.exe. If you run it in Windows XP then it will let you verify the drivers. The Device Manager will provide her with status for her devices; reloading driver.cab is unnecessary, as is configuring alarm settings.


117. The tech group at WiseGuy Enterprises is migrating all machines to Windows XP (fresh installs); however, they won't be adding NICs for another week. Curly, the network administrator, wants to keep driver issues to a minimum for the machines, so would like the techs to monitor and be aware of any potential issues during installation. What should Curly tell his tech group to configure the Driver Signing option to?

A. Ignore
B. Advanced
C. Warn
D. Test
E. Block

>> !
Answer: C

Warn will prompt the user to choose an action during hardware installation. This option can be configured in the Driver Signing Options under the Hardware tab of the System Properties. The other available options are: Ignore (will install the software without approval) and Block (will not install any unsigned driver software).


118. Hermione has been running Windows XP for the last few months without any issues, however, lately she has noticed some anomalies with her machine. She recented with some third-party software and now she suspects this may have affected some of her system files. Which of the following System File Checker (sfc.exe) commands should she use to scan all protected files at the next startup?

A. She should run the System File Checker from the System Information interface and choose ScanOnce from the Tools menu.
B. She should run System File Checker (sfc.exe) with the /scanonce command from a dos prompt.
C. She should run the System File Checker from the System Information interface and choose Scanboot from the Tools menu.
D. She should run System File Checker (sfc.exe) with the /scanboot command from a dos prompt.

>> !
Answer: B

The System File Checker can be run from a dos prompt. The syntax Hermione would use is: sfc.exe /scanonce. The /scanonce command will allow her to scan all protected files at the next startup; /quiet would replace all incorrect file versions without any user prompting; and /scanboot scans all protected files after EVERY restart. The best solution for Hermione would be to use /scanonce, since this is an isolated incident.


119. Harry bought a 64 MB video card for his Windows XP computer installed it and loaded the default drivers; however, he decided to load up the latest drivers (which aren't XP certified). He has noticed some buggy behavior when running video intensive applications. What is the best solution for Harry to fix his issue?

A. Access the Driver Manager applet under the Control Panel, click the Configure tab, and choose the Certified Driver option.
B. Under Device Manager, access the Display adapter, choose the Driver tab and click Roll Back Driver.
C. Run sigverif from the command line.
D. Delete the driver from the \\winnt\system32\drivers\ directory and re-install the previous working version.

>> !
Answer: B

Roll Back Driver is possible if there is an existing copy of a previous driver. The only exception to this is with printer drivers, which are controlled through the Printers and Fax applet.


120. Jason is the network administrator for Crystal Lake Summer Camp. There have been problems with a few of the computers that he suspects could be linked to a bad memory chip. He would like be notified when any of the machines encounter a problem. How can he do this?

A. In the MMC, create a customized system monitor with a counter for Available Bytes; have the log sent to the administrator every time the clients boot.
B. Run bootcfg /query /s on the clients so they will notify the system administrator of issues at boot.
C. He should create an alert under the Performance snap-in of the MMC.
D. Run bootcfg /maxmem: n on the clients so they will notify the system administrator of memory issues at boot.

>> !
Answer: C

Creating an administrative alert under the Performance snap-in of the MMC will notify the administrator of specified objects. The administrator can configure these counters for performance issues with memory, processor, disk, etc. Bootcfg is a command line tool useful for configuring the boot.ini. /maxmem: n. /maxmem= n specifies the amount of RAM used by the system and can be used when a memory chip may have gone bad.


121. You are the IT Supervisor for Wassap Experiences, Incorporated. You have been tasked by your supervisor to install a brand new sound card into his XP machine, which has been running smoothly for the last two months. You install the card, but when you boot his computer up, you notice the only sound that comes out of the speakers is a high pitch whine. In order to troubleshoot the issue, what action would you take? (Choose all that apply)

A. Log on as administrator and disable the sound card.
B. Boot up off the Windows XP CD and run a repair.
C. In the Resources tab check for conflicts.
D. Disconnect the mouse; reboot.
E. Check for new drivers on the Manufactures web site.
F. Run the Device Driver Roll Back utility for the sound card.

>> !
Answer: A, C & E

The first action to take is to log on as administrator and disable the sound card to stop the whine. You then need to check for conflicts under the Resources tab of the sound card in Device Manager. Finally you can check for newer drivers for the sound card. There is no need to run a repair from the Windows XP CD; disconnecting the mouse and rebooting won't solve the issue. Since the sound card is brand new, there is no use in running the Device Driver Roll Back utility.


122. Which of the following files used in the Windows XP boot process is NOT located in the system partition root?

A. Hal.dll
B. Ntldr
C. Bootsect.dos
D. Ntdetect.com

>> !
Answer: A

Hal.dll is located in the %systemroot%\system32 folder. You boot from the System Partition and your system files are stored on the Boot partition. The Hal.dll files is used in the boot process, but is not considered one of the Windows XP "boot files".


123. Albert has installed Windows XP on a computer with two SCSI drives with BIOS Enabled. He has had to start the Recovery Console and invoked the Map command. The following is displayed:

multi(x)disk(x)rdisk(x)partition(x)

Which of the following Advanced RISC Computing path components defines the disk that the OS resides in?

A. multi (x)
B. disk (x)
C. rdisk (x)
D. partition (x)

>> !
Answer: C

Rdisk is used with multi. Use disk only when scsi is used instead of multi. (Remember you would say scsi disk in conversation, but not multi disk). SCSI is only used when the drives are older SCSI drives and have the SCSI Bios disabled. Partition is the partition that the OS resides on.


124. Archie has decided to install the Recovery Console as a startup option when he boots his XP box. He would like to create a directory and copy some startup files into it in case of emergency. Which of the following Recovery Console commands would he use to create a directory?

A. dir
B. md
C. rd
D. ren

>> !
Answer: B

The md command creates a directory, rd removes a directory, and dir lists the contents of a selected directory.


125. Reggie works for Riverdale Enterprises as a PC technician. He has been testing his company's in-house applications on a Windows XP box; apparently, they cause the system to crash and he would like to review the problem. Where can he find some information regarding the state of the PC before it crashed?

A. %SystemRoot%\winnt\recovery.log
B. %SystemRoot%\kernel.dmp
C. %SystemRoot%\memory.dmp
D. %SystemRoot%\winnt\bootstat

>> !
Answer: C

By default, a memory dump is created in %SystemRoot%\memory.dmp whenever the system crashes.


126. Veronica loaded up some third-party software on her XP Professional system, and has been experiencing some problems. She suspects the software she installed is the culprit; however, she has uninstalled it and still has problems on her system. How can she best resolve this issue?

A. Under System Tools, run the Backup Utility; choose Restore Wizard.
B. Under System Tools, run the Backup Utility; choose Automated System Recovery Wizard.
C. Under System Tools, run the System Restore wizard and choose Undo the last restoration to get her system back to a stable state.
D. Under System Tools, run the System Restore wizard and choose a restore point prior to the addition of the errant software.

>> !
Answer: D

The System Restore tool can be accessed from the System Tools menu or the Help and Support Center. Choosing a restore point prior to the addition of the faulty software will restore the PC back to the point it was before the installation of the third-party software. Undoing the last restoration is self-explanatory, and would only be beneficial if the last restoration included the errant program. System Restore must have be enabled and set to monitor the drive that the errant program was installed on.


127. Frodo has an Athlon 1.5 GHz, 256 MB system with two 40 GB hard drives that he dual-boots with XP and Linux Red Hat. He has configured each hard drive with a separate OS. He would like to enable System Restore, but doesn't want any problems on his Linux partitions. What is the best option for Frodo to take?

A. Because this is a dual boot machine and Linux uses a different file system, he cannot enable System Restore via XP.
B. He will have to enable the XP Backup Utility and choose Automated System Recovery Wizard in order to restore his XP system only.
C. He will have to access the System Restore tab, choose the drive he wants to exclude, and turn off system restore on that drive.
D. He will have to access the System Restore tab, and configure the disk space usage to 40 GB only, the size of the XP drive.

>> !
Answer: C

System Restore can be configured under the System Properties applet. System Restore must be enabled, and under Drive settings, the desired drive can be configured as "Turn off System Restore on this drive." Changes made on the drive will not be restored during a System Restore.


128. Sam has upgraded his existing Windows 98 computer, a 550 MHz PC with 256MB of RAM and a 30 GB hard drive to Windows XP Professional. He has been using a PS/2 mouse, but it has been acting erratically lately. He decides to buy a new optical USB mouse to replace it, since he would simply have to plug it in to one of two available USB ports on the front of his computer. He plugs it into the bottom USB port and boots his PC up, however, his mouse isn't working, and it isn't showing up in the Device Manager. What could best solve his issue?

A. He needs to go to the Control Panel and access the Add or Remove Programs applet in order to load up the software drivers for his new USB mouse.
B. He needs to go to the Control Panel and access the Mouse applet; under the Hardware tab, click on the Properties button, and uninstall the present mouse under the Driver tab.
C. He needs to restart his PC, go into the BIOS settings and enable USB.
D. He needs to plug the mouse into the top USB port as that is the first available port.

>> !
Answer: C

Since his device is not showing up under the System Manager, more than likely it is not enabled in the BIOS. He will need to change his BIOS settings to enable USB. A USB device will work regardless of the USB port it is plugged into. Windows XP has a plug and play feature that will automatically install the new optical mouse. You may have to logon as an Administrator first to get it to work initially though.


129. You are the IT supervisor for Widgets, Incorporated. You currently have 100 workstations actively in use throughout the company. You are concerned that users may install software drivers that may cause their systems to be unstable. What can you do to ensure that this does not happen?

A. Set the driver signing level on the hardware tab of the system properties utility to "stop"
B. Set the driver signing level on the hardware tab of the system properties utility to "ignore"
C. Set the driver signing level on the hardware tab of the system properties utility to "block"
D. Set the driver signing level on the hardware tab of the system properties dialog to "restricted"

>> !
Answer: C

Windows XP provides three driver signing levels: Ignore (least restrictive), Warn, and Block (most restrictive). If you want to make sure that users cannot install software drivers that are not signed by Microsoft, you need to set the level to Block.


130. You are the IT supervisor for Widgets, Incorporated. You need to install a more reliable hardware driver onto you users' workstations. This particular driver is produced by a company you don't normally deal with but you have tested it thoroughly and find it to be sound. When you try to install it on your workstations, Windows XP will not allow it. What should you do?

A. Set the Driver signing level to none.
B. Set the driver signing level to Ignore.
C. Set the driver signing level to Allow.
D. Set the driver signing level to Low.

>> !
Answer: B

Windows XP provides three driver signing levels: Ignore (least restrictive), Warn, and Block (most restrictive). Ignore will not inhibit you at all when installing non-published drivers. Warn, will warn you that the driver is not signed and will ask you if you want to continue. Block will completely restrict you from installing the driver. A non-signed driver is a driver that is not tested and authorized by Microsoft. However, most non-signed drivers will still work with Windows XP. You just need to test them thoroughly.