Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "JN0-520" Exam

i have got 95%

 I have just pass the JN-520 exam. I've got 95%The Dump posted here is like the itcertkeys!!! 

Thanks to all!! 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 642-446 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "642-446" Exam

Implementing Cisco Unified Communications IP Telephony Part 1 (CIPT1)

 Question 1.
DRAG DROP
Drag the definition of the resource on the left to the media resource type on the right No1 all media resources are used.
 

Drag and drop question. Drag the items to the proper locations.
Drag the definition of the resource on the left to the media resource type on the right No1 all media resources are used.

Answer:
 

Explanation:
 

Drag and drop question. Drag the items to the proper locations.

Question 2.
Which three steps need to be performed on a third party SIP phone device when adding it to Cisco Unified Communications Manager 6.0? (Choose three.)

A. Select XML as the method to send the third party SIP phone its configuration file.
B. Add the MAC address of the Cisco Unified Communications Manager server to the SIP phone 
    configuration.
C. Set the directory numbers to match the directory numbers configured in Cisco Unified 
    Communications Manager.
D. Set the digest user ID in the SIP device to match the digest user ID in Cisco Unified 
    Communications Manager.
E. Set the TLS user ID and password in the SIP phone to match the TLS user ID and password in 
    Cisco Unified Communications Manager.
F. Set the proxy address in the SIP phone to match the IP address or fully qualified domain name 
    of Cisco Unified Communications Manager.

Answer: C, E, F

Question 3.
Which two gateway configuration statements are required in order to enable Cisco Unified Communications Manager to control a T1 PRI in an MGCP gateway? (Choose two.)

A. mgcp
B. ccm-manager config
C. pri-group configuration on the controller
D. mgcp call-agent pointing to tftp server
E. isdn 13-backhaul ccm-manager on the serial interface
F ccm-manager config server {TFTP ip_address}

Answer: B

Question 4.
DRAG DROP
Click and drag the XML application service information field name on the left to its Answer: description on the right
 

Drag and drop question. Drag the items to the proper locations.
Click and drag the XML application service information field name on the left to its description on the right

Answer:
 

Question 5.
If a service is currently deactivated, how can the service be reactivated from the Cisco Unified Communications Manager Serviceability Control Center page?

A. by clicking on the radio button to the left of the service on theControl Center page
B. by selecting Cisco Unified CM Serviceability > Service Activation and then clicking on the radio 
    button to the left of the service to activate it
C. by selecting Tools > Service Activation, selecting the Answer:server, and clicking on the radio 
    button to the left of the service to activate it
D. by selecting Cisco Unified CM Serviceability > Tools, clicking on the radio button to the left of 
    the service that needs to be activated, and then returning to the Control Center to activate the 
    service

Answer: C

Question 6.
Which two of these media resources are available only in hardware? (Choose two.)

A. trans coding
B. audio conferencing C. MTP
D. annunciator
E. MOH
F. voice termination

Answer: A

Question 7.
DRAG DROP
Click and drag the MoH server parameter on the left to its description on the right. Not all parameters apply.
 

Drag and drop question. Drag the items to the proper locations.

Answer:
 

Explanation:
 

Question 8.
Which three steps are necessary in order to configure DHCP for phone support using the GUI in Cisco Unified Communications Manager 6.0? (Choose three.)

A. add the DHCP server IP address to the device pool
B. activate DHCP Monitor Service
C. add and configure the DHCP server
D. start the application on an external server
E. configure the DHCP subnet
F. download the DHCP server application from the plug-in page

Answer: B, C, E

Question 9.
Which two of these are characteristics of multicast music on hold? (Choose two.)

A. point-to-multipoint, two-way audio stream
B. separate audio stream for each connection
C. multiple audio streams that require multiple multicast IP addresses
D. support for all codecs that are also supported by Cisco Unified Communications Manager 
     servers 
E. conservation of system resources and bandwidth
F. the requirement that there always be a dedicated MOH server

Answer: C

Question 10.
Which three determinations are possible when using the Presence feature in a Cisco Unified Communications network? (Choose three.)

A. Determine if an IP phone has been unplugged if the phone is in the same Cisco Unified 
    Communications cluster as the watcher.
B. Determine if an IP phone is on hook or off hook if the phone is outside the Cisco Unified 
    Communications cluster of the watcher.
C. Determine if an IP phone is on hook or off hook if the phone is in the same Cisco Unified 
    Communications cluster as the watcher.
D. Determine if a set of IP phones is on hook or off hook if the phones are in the same Cisco 
    Unified Communications cluster as the watcher.
E. Determine if an IP phone has been moved or the user has been changed if the phone is in the 
    same Cisco Unified Communications cluster as the watcher.
F. Determine if an IP phone has been off hook beyond a specified period of time if the phone is in 
    the same Cisco Unified Communications cluster as the watcher.

Answer: B, C, D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-089 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-089" Exam

Planning, Deploying, and Managing Microsoft Systems Management Server 2003

 Question 1.
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2.0 hierarchy is configured as a single primary site. All the servers on the ITCertKeys.com network run Windows Server 2003 and the client computers run Windows XP Professional, Windows 2000 Professional, Windows 98, Windows NT 4.0 and Novell Netware 5.0.

ITCertKeys.com acquires another company named TestLabs.com. TestLabs.com has a single Active Directory domain named testlabs.com and a single SMS 2003 SP1 site. The client computers on the TestLabs.com network run Windows XP Professional and Windows 2000 Professional. You have been instructed to configure the TestLabs.com SMS site as a child site of the ITCertKeys.com site. You plan to accomplish this by upgrading the ITCertKeys.com site to SMS 2003 SP1. You need to identify the client computers that must be upgraded so that they can be managed by SMS 2003 SP1.

Which of the following client computers must be upgraded?

A. The Windows NT 4.0 client computers.
B. The Windows NT 4.0 and Novell Netware 5.0 client computers.
C. The Windows 2000 Professional client computers.
D. The Windows 98 and Novell Netware 5.0 client computers

Answer: B

Explanation:
The SMS 2003 does not support all the operating systems, network operating systems, or processor types that were supported by SMS 2.0 and do not support Novell Netware 5.0 and Windows NT 4.0 client computers. These will have to be upgraded.

Incorrect Answers:
A: SMS 2003 does not support Windows NT 4.0 client computers but it also does not support Novell Netware 5.0 client computers.
C: SMS 2003 supports Windows 2000 Professional client computers.
D: SMS 2003 supports Windows 98 client computers but does not support Novell Netware 5.0 client computers.

Question 2:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional with SMS Advanced Client. The ITCertKeys.com network contains 5 Windows Server 2003 servers and 10, 000 Windows XP Professional client computers. One of the servers in the SMS site named ITCertKeys-SR10 is configured as management point, client access point, distribution point, and server located point. 

To guarantee that the management point is assured of data from the Windows XP Professional computers, you decided to configure another server named ITCertKeys-SR13 with management point and configure a type of clustering designed for stateless Applications in which each node has a duplicate copy of the server data and incoming client requests are distributed among the cluster nodes. When you install the management point on ITCertKeys-SR13, it was unsuccessful. You need to ensure that you can install management point on ITCertKeys-SR13.

What should you do?

A. On ITCertKeys-SR13, enable Background Intelligent Transfer Service (BITS) and install and enable Internet Information Services (IIS).
B. Upgrade ITCertKeys-SR13 to Windows Server 2003 Service Pack1 (SP1) and enable Background Intelligent Transfer Service (BITS).
C. On ITCertKeys-SR13, enable WebDAV extensions for IIS and enable Background Intelligent Transfer Service (BITS).
D. On ITCertKeys-SR13, ensure that the Task Scheduler and Distributed Transaction Coordinator (DTC) services.

Answer: A, D

Explanation: 
To configure a management point, you need IIS and Windows 2000 SP3. You also need ISS and BITS enabled on a Windows Server 2003 computer otherwise the management point will fail. The hard disk of the system must be configured as NTFS to act as a management point.

Incorrect Answers: 
B: BITS is needed when you install a management point on a Windows Server 2003 on a computer. Not just BITS is needed, you need IIS also. Furthermore, to configure management point, you need at least Windows 2000 Server with Service Pack3. With Windows Server 2003 you do not need a Service Pack.
C: WebDAV is inappropriate here. WebDAV is used to set up a distribution point. You do need BITS when you install a management point on a Windows Server 2003 on a computer. Not just BITS is needed, in addition you also need IIS.

Question 3:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. You have been instructed to implement SMS 2003 SP1 for the ITCertKeys.com network. You must list the business and technical requirements on which the SMS sites and the hierarchy will be based. To this end you begin by analyzing the ITCertKeys.com network infrastructure.

What should you do?

A. Include the Dynamic Host Configuration Protocol (DHCP) in your list.
B. Include the Internet Protocol (IP) in your list.
C. Include the Cisco Discovery Protocol (CDP) in your list.
D. Include the Simple Mail Transfer Protocol (SMTP) in your list

Answer: B

Explanation: 
The SMS 2003 requires an IP address. To have a strong deployment strategy for SMS 2003, you need to take into consideration the network infrastructure, organizational structure, server environment, client environment, and security.

Incorrect Answers:
A: You do not need the DHCP for the SMS 2003 to work. It will perform satisfactory with an IP address.
C: The CDP protocol runs on Cisco switches and routers. SMS 2003 does not require CDP.
D: SMTP is an application layer protocol to facilitate the transfer of e-mail. It is not needed by SMS 2003.

Question 4:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2.0 SP4 hierarchy is configured as a single primary site. All the servers on the ITCertKeys.com network run Windows Server 2003 and the client computers run Windows XP Professional, Windows 2000 Professional, Windows 98, Windows 95, and Windows XP Home Edition. Due to security concerns, you need to improve the security of the single SMS 2.0 SP4 site and upgrade the site to SMS 2003 SP1.

What should you do?

A. Run the SMS software inventory feature to determine which client computers do not support SMS 2003 SP1.
B. Run the SMS hardware inventory feature to determine which client computers do not support SMS 2003 SP1.
C. Run the Systems Management Installation Wizard to determine which client computers do not support SMS 2003 SP1.
D. Run the Deployment Readiness Wizard to determine which client computers do not support SMS 2003 SP1.

Answer: D

Explanation: 
This wizard, the Deployment Readiness Wizard allows you to verify the steps that you should carry out to prepare the site for an upgrade. This wizard will also show if the site meets the required requirements.

Incorrect Answers:
A: You should not use the SMS software inventory. This is used to collect detailed file 
    information. It is also used to copy files from the client computer to the SMS site or SMS site server.
B: You should not use the SMS hardware inventory. This will give you the information of the hardware characteristics of the client computer in an SMS hierarchy. It will not identify the client computers that is not supported by SMS 2003 SP1
C: The Systems Management Installation Wizard is used to install the Legacy client software.

Question 5:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site.  The ITCertKeys.com network contains a Windows 2000 Server SP1 computer named ITCertKeys-SR15 which is the SMS site server and a Microsoft SQL Server 7.0 SP3 computer named ITCertKeys-SR16. 

You have configured a standard security mode for the SMS site. You have been instructed to improve the security of the SMS site. To this end you decide to migrate the site from the standard security mode to the advance security mode. You want to accomplish this task using the minimum administrative effort.

What should you do?

A. Migrate the SMS site to advanced security mode. No further action is required
B. Upgrade ITCertKeys-SR16 to SQL Server 2000 with Service Pack3 (SP3) and migrate the SMS site to advanced security mode.
C. Upgrade ITCertKeys-SR15 to Windows 2000 Server with Service Pack3 (SP3) and migrate the SMS site to advanced security mode.
D. Upgrade ITCertKeys-SR15 to Windows Server 2003 and migrate the SMS site to advanced security mode.

Answer: B

Explanation: 
To configure an advanced security mode, you need to upgrade from the SQL Server to SQL Server 2000 with SP3. Before you migrate to the advanced security mode, you need to assign the appropriate rights to the relevant computer accounts.

Incorrect Answers:
A: You cannot migrate from the standard security to the advanced security mode. You first need to upgrade to SQL 2000 Server SP3 as the minimum requirements.
C: You should not upgrade ITCertKeys-SR15 to Windows 2000 Server SP3. You need to upgrade CertK NG-SR16 to SQL Server 2000 SP3 or better to migrate for a standard security mode to an advanced security mode.
D: You should not upgrade ITCertKeys-SR15 to Windows Server 2003. You need to upgrade ITCertK NG-SR16 to SQL Server 2000 SP3 or better to migrate for a standard security mode to an advanced security mode.

Question 6:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. The ITCertKeys.com SMS 2003 site is not configured to use Active Directory. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional.

The ITCertKeys.com network contains a server named ITCertKeys-SR32 that contains the SMS site database. The SMS site is configured to use advance security mode. You have been given the instruction to configure the SMS to publish data in Active Directory.

Which group membership is needed?

A. SMS Admins group is needed to extend the Active Directory schema for SMS.
B. Schema Admins group in the local domain where SMS is located is needed to extend the Active Directory schema for SMS.
C. SMS Admins group in the root domain is needed to extend the Active Directory schema for SMS.
D. Domain Administrators group in the local domain where SMS is located is needed to extend the Active Directory schema for SMS.

Answer: C

Explanation: 
To publish data in Active Directory, you should extend the Active Directory schema to enable SMS to use Active Directory.

Incorrect Answers:
A: To publish data in Active Directory, you should extend the Active Directory schema to enable SMS to use Active Directory.
B: You should not extend the Schema Admins group in the local domain where SMS is located. You should extend the Active Directory schema to enable SMS to use Active Directory.
D: You should not extend the Domain Administrators group in the local domain where SMS is located. You should extend the Active Directory schema to enable SMS to use Active Directory.

Question 7:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional.

The SMS site is configured to use advance security mode with the all the roles enabled on ITCertKeys-SR42. You need to deploy the Client Push Installation method to install the Advanced Client on all the client computers on the network. You create an account with the appropriate rights to install software on all the client computers. You need to prepare the client computers so that the Advanced Client software can be installed using the Client Push Installation method.

What should you do? (Each correct answer presents part of the solution. Choose two.)

A. Start the Server service and enable file sharing.
B. Start the Telnet service and enable file sharing.
C. Create and specify an installation script to run the SMSMan.exe file as the startup script for all the new computers.
D. Make sure that the ADMIN$ share exists.

Answer: A, D

Explanation: 
You need to enable file sharing and ensue that the ADMIN$ share exists, to start the Server services on the client computers. The Client Push Installation should be created manually, in Active Directory and must have the appropriate permissions to install software. If you want ITCertKeys-SR42 to install the SMS client software, you need to create an account with the suitable rights to install software on the client computers.

Incorrect Answers:
B: You do need to enable file sharing to guarantee that the ADMIN$ share exists. Telnet services enable a remote client to log on to a client computer. Client Push Installation needs the Server services.
C: The SMSMan.exe file runs the System Management Installation Wizard to install Legacy Client software. You cannot use this file to start the Client Push Installation method.

Question 8:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional.

The SMS site is configured to use Advanced Security mode. The SMS site server is named ITCertKeys-SR89. All the roles on the SMS site server are enabled. To enable the Client Push Installation method to install the Advanced Client on all the computers on the network, you created an account and assign it the required rights to install software on all client computers. You need to ensure that ITCertKeys-SR89 will install the Advanced Client on new client computers as soon as they are discovered.

What should you do?

A. Use the Heartbeat Discovery method and run SMSMan.exe as the startup script for all new computers.
B. Use the Active Directory System Discovery method and run Active Directory Discovery to poll data.
C. Use the Active Directory System Group Discovery method and run SMSMan.exe as the startup script for all new computers.
D. Use the Windows User Account Discovery method and run Active Directory Discovery to poll data.

Answer: B

Explanation: 
You should use the Active Directory System Discovery to discover computers by polling active directory containers. With this you can collect the computer name, IP address and Active Directory sites.

Incorrect Answers:
A: Heartbeat Discovery is used to refresh SMS client computer discovery data in the SMS site directory. Furthermore, the SMSMan.exe file is used to install Legacy Client, not Advanced Client.
C: Active Directory System Group Discovery is used to discover groups of computer systems. Furthermore, the SMSMan.exe file is used to install Legacy Client, not Advanced Client.
D: You cannot use the Windows user account Discovery to discover client computers.

Question 9:
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com SMS 2003 hierarchy is configured as a single primary site. All servers on the ITCertKeys.com network run Windows Server 2003. Half the client computers run Windows 2000 Professional, and the rest run Windows XP Professional. You need to configure the SMS discovery method for the SMS site and ensure that the client computers which are on the network are discovered when they are powered on.

What should you do?

A. Use the Heartbeat Discovery method and the Active Directory System Discovery method so that the client computers must be turned on, to be discovered.
B. Use the Active Directory System Group Discovery method so that the client computers must be turned on, to be discovered.
C. Use the Windows User Account Discovery so that the client computers must be turned on, to be discovered.
D. Use the Network Discovery method so that the client computers must be turned on, to be discovered.

Answer: A

Explanation: 
You need to use the client computers needs to be turned on to be discovered. Heartbeat Discovery method and the Active Directory System Discovery method Heartbeat Discovery method can also be used to refresh SMS client computer discovery data in the SMS site directory. The Active Directory System Discovery is use to discover computers by polling active directory containers

Incorrect Answers:
B: The Active Directory Group Discovery method is used to discover system groups for computer systems. The information you will get is organizational units, global groups, universal groups, nested groups and Windows distribution groups.
C: You cannot use the Windows user account Discovery to discover client computers.
D: The Network Discovery method allows you to discover computers on the network, even when not turned on.

Question 10.
You work as the SMS administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all the client computers running Windows XP Professional. The ITCertKeys.com network contains a server named ITCertKeys-SR22. The SMS site is configured to use advanced security mode with the entire roles on ITCertKeys-SR22.

ITCertKeys.com has its head office in London and branch offices in Paris, Berlin and Athens. The head office in London has a primary SMS site server and each branch office have a secondary SMS site server. The SMS Advanced Client is installed on all client computers in the ITCertKeys.com network. During routine monitoring you find out that SMS Advanced Client at the branch offices are consuming large amounts of network bandwidth by sending client status and inventory data to the London office. You need to make sure that the Advanced Clients send inventory, software metering data and status data to the SMS site server located at their branch offices respectively.

What should you?

A. Configure each secondary SMS site server as a server locator point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server.
B. Configure each secondary SMS site server as a Client Access Point (CAP) to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server.
C. Configure each secondary SMS site server as a distribution point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server.
D. Configure each secondary SMS site server as a proxy management point to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server to ensure that the Advanced Clients send inventory, software metering data and status data to the local SMS site server.

Answer: D

Explanation: 
It is best to configure each SMS site server as a proxy management point. The role that there is in SMS 2003 is: client access point, distribution point, server locator point and reporting point.

Incorrect Answers: 
A: You can use the server locator point to deploy Legacy Clients or Advanced Clients or to assign automatically Advanced Clients to sites. The server locator point can also be used to locate Client Access Point (CAP) for Legacy Clients.
B: The server locator point is the point of contact between Legacy Clients and SMS site server.  You should not configure it.
C: You should not configure a distribution point; it is installed on a site server by default.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-431 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-431" Exam

Microsoft® SQL Server 2005 - Implementation and Maintenance

 Question 1.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. ITCertKeys-DB01 contains a database named ITK_Sales.

ITCertKeys.com intends migrating ITCertKeys-DB01 to SQL Server 2005 in the near future. To prepare for the migration, you decide to install SQL Server 2005 Express on a server named ITCertKeys-SR31. You verify that ITCertKeys-SR31 exceeds the minimum recommended hardware requirements for SQL Server 2005. 

What should you do next?

A. Upgrade ITCertKeys-SR31 to Windows Sever 2003 and install Service Pack 1.
B. Install and run the SQL Server Upgrade Advisor on ITCertKeys-SR31.
C. Install SQL Server 2000 on ITCertKeys-SR31.
D. Download and install the .NET Framework 2.0.

Answer: D

Explanation: 
SQL Server 2005 requires the.NET Framework 2.0. This is automatically installed when SQL Server 2005 is installed but is not automatically installed when SQL Server 2005 Express is installed.

Incorrect Answers:
A: You do not need to upgrade ITCertKeys-SR31 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 Express can be installed on Windows 2000 Server. You will need to install Service Pack 4 for Windows 2000 Server though.
B: You should run the SQL Server Upgrade Advisor when you want to upgrade an instance of a SQL Server 2000 database to SQL Server 2005.
C: You do not need to install SQL Server 2000 before installing SQL Server 2005 Express.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server Express, before installing

Question 2.
You work as a database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 with the latest Service Packs and Hotfixes, while the client computers run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5. 

You have received instruction to prepare for a new installation of SQL Server 2005 on a member server named ITCertKeys-SR21. ITCertKeys-SR21 will host a database named CK_Sales. All ITCertKeys.com users must be able to connect to ITCertKeys-SR21 by computer name. A ITCertKeys.com network administrator named Rory Allen must ensure that the client computers will be able to connect to ITCertKeys-DB01.

Which protocols can ITCertKeys.com users use to ITCertKeys-SR21?

A. TCP/IP and Named Pipes
B. TCP/IP and IPX/SPX
C. Virtual Interface Adapter (VIA)
D. Shared Memory

Answer: A

Explanation: 
By default, clients have TCP and Named Pipes as available protocols. You can manipulate the protocol ordering by using the SQL Server Client utility. The client application uses the protocols in the order specified on the client computer. If you are using SQL Server 2005, the protocol order is stored in the ProtocolOrder registry entry under the following registry subkey:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSSQLServer\Client\SNI9.0

Incorrect Answers:
B: SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
C: The Virtual Interface Adapter (VIA) can be used only by VIA hardware.
D: Shared Memory can only be used on the local computer and cannot be used as a network protocol.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: client connections [SQL Server], about client network connections, choosing a network protocol

Question 3.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. ITCertKeys-DB01 contains a database named ITK_Sales.

ITCertKeys.com intends migrating ITCertKeys-DB01 to SQL Server 2005 in the near future. To prepare for the migration, you decide to install SQL Server 2005 Express on a server named ITCertKeys-SR23. ITCertKeys-SR31 was used for previously used by application developer and contains Microsoft Visual Studio 2003, .NET Framework 1.2 and Internet Explorer 5.5. You verify that ITCertKeys-SR23 exceeds the minimum recommended hardware requirements for SQL Server 2005.

What should you do next? (Each correct answer provides part of the solution. Choose THREE.)

A. Upgrade ITCertKeys-SR23 to Windows Sever 2003 and install Service Pack 1 for Windows Sever 2003.
B. Install Service Pack 4 for Windows 2000 Sever on ITCertKeys-SR23.
C. Upgrade the .NET Framework 1.2 to .NET Framework 2.0 on ITCertKeys-SR23.
D. Uninstall the .NET Framework 1.2 and install the .NET Framework 2.0 on ITCertKeys-SR23.
E. Upgrade Internet Explorer 5.5 to Internet Explorer 6.0 and install Service Pack 1 for Internet Explorer 6.0 on ITCertKeys-SR23.
F. Upgrade Microsoft Visual Studio 2003 to Microsoft Visual Studio 2005 and install Service Pack 1 for Microsoft Visual Studio 2005 on ITCertKeys-SR23.

Answer: B, D, E

Explanation: 
SQL Server 2005 requires Service Pack 4 for Windows 2000 Sever, Internet Explorer 6.0 with Service Pack 1 and the .NET Framework 2.0. The .NET Framework 2.0 is automatically installed with other versions of SQL Server 2005 but is not automatically installed with SQL Server 2005 Express. You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework 2.0 but .NET Framework 1.2 must be uninstalled first.

Incorrect Answers:
A: You do not need to upgrade ITCertKeys-SR31 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 Express can be installed on a Windows 2000 Server once you install Service Pack 4 for Windows 2000 Server.
C: You can upgrade .NET Framework 1.0 and upgrade .NET Framework 1.1 to .NET Framework 2.0 but .NET Framework 1.2 must be uninstalled first.
F: SQL Server 2005 Express does not require any version of Microsoft Visual Studio.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: installing SQL Server Express, before installing

Question 4.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 2000 database server named ITCertKeys-DB01 that runs on Windows 2000 Server Service Pack 4. ITCertKeys-DB01 contains a database named ITK_Trading.

ITCertKeys.com wants to migrate ITCertKeys-DB01 to SQL Server 2005 but wants to retain the ITK_Trading database with the same instance name. You decide to perform an in-place upgrade to SQL Server 2005. You verify that ITCertKeys-DB01 exceeds the minimum recommended hardware requirements for SQL Server 2005.

What should you do next?

A. Upgrade ITCertKeys-DB01 to Windows Sever 2003 Service Pack 1.
B. Run the SQL Server Upgrade Advisor on ITCertKeys-DB01.
C. Detach the ITK_Trading database on ITCertKeys-DB01.
D. Run the SQL Server 2005 Setup utility.

Answer: B

Explanation: 
Before you perform an in-place upgrade of an existing database, you should run the SQL Server Upgrade Advisor. The SQL Server Upgrade Advisor produces a list of items that must be addressed before and after performing the upgrade. This list of items is specific to the existing installation. 

Incorrect Answers:
A: You do not need to upgrade ITCertKeys-DB01 to Windows Sever 2003 Service Pack 1 as SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You need to detach a database when you need to move the database to another database instance or another database server. You do not need to detach the database before performing an in-place upgrade.
D: You should run the SQL Server Upgrade Advisor before you run the SQL Server 2005 Setup utility. The SQL Server Upgrade Advisor produces a list of items that must be addressed before and after performing the upgrade. This list of items is specific to the existing installation.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: updating databases, detaching and attaching databases

Question 5.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows 2000 Server. The ITCertKeys.com network contains a SQL Server 7.0 database server named ITCertKeys-DB01 that runs on Windows 2000 Server. 

Service Pack 4 for Windows 2000 Server id installed on ITCertKeys-DB01. ITCertKeys.com wants to migrate ITCertKeys-DB01 to SQL Server 2005. You decide to perform an in-place upgrade to SQL Server 2005. You verify that ITCertKeys-DB01 exceeds the recommended hardware requirements for SQL Server 2005.

What should you do next?

A. Upgrade ITCertKeys-DB01 to Windows Sever 2003.
B. Install Service Pack 4 for SQL Server 7.0 on ITCertKeys-DB01.
C. Upgrade SQL Server 7.0 on ITCertKeys-DB01 to SQL Server 2000.
D. Run the SQL Server 2005 Setup utility on ITCertKeys-DB01 and upgrade directly to SQL Server 2005.

Answer: B

Explanation: 
You can upgrade from SQL Server 7.0 with Service Pack 4 directly to SQL Server 2005. Thus you need only install Service Pack 4 for SQL Server 7.0. 

Incorrect Answers:
A: You do not need to upgrade ITCertKeys-DB01 to Windows Sever 2003 as SQL Server 2005 can be installed on Windows 2000 Server with Service Pack 4.
C: You do not need to upgrade ITCertKeys-DB01 to SQL Server 200 as SQL Server 7.0 with Service Pack 4 can be upgraded directly to SQL Server 2005. Besides, you will need to install Service Pack 3 for SQL Server 2000 before you can upgrade it to SQL Server 2005.
D: You need to install Service Pack 4 for SQL Server 7.0 before you can upgrade it directly to SQL Server 2005.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: upgrading SQL Server, upgrading to SQL Server 2005

Question 6.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains two SQL Server 2000 database servers named ITCertKeys-DB01 and ITCertKeys-DB02 that are configured fro log shipping. ITCertKeys-DB01 is the primary server and hosts a database named ITK_Trading. 

Both ITCertKeys-DB01 and ITCertKeys-DB02 have Service Pack 3 for SQL Server 2000 installed. ITCertKeys.com wants to upgrade ITCertKeys-DB01 and ITCertKeys-DB02 to SQL Server 2005 Enterprise Edition but the ITK_Trading database must remain available during the upgrade process. You verify that both ITCertKeys-DB01 and ITCertKeys-DB02 exceed the recommended hardware requirements for SQL Server 2005 Enterprise Edition. You then install Service Pack 1 for Windows Server 2003 on ITCertKeys-DB01 and ITCertKeys-DB02.

What should you do next?

A. Install Service Pack 4 for SQL Server 2000 on both database servers.
B. Enable failover in the SQL Server 2000 log shipping configuration and upgrade ITCertKeys-DB02 to SQL Server 2005.
C. Run the Database Maintenance Plan Wizard on ITCertKeys-DB01 to upgrade it to SQL Server 2005.
D. Upgrade ITCertKeys-DB02 to SQL Server 2005 and then upgrade ITCertKeys-DB01 to SQL Server 2005.

Answer: B

Explanation: 
SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005. To upgrade log shipping to SQL Server 2005, you must migrate the database servers to SQL Server 2005. If you want the database to remain available during the migration process, you must migrate with failover. To migrate with failover you must enable failover and upgrade ITCertKeys-DB02. Then you need to failover to ITCertKeys-DB02 and upgrade ITCertKeys-DB01. Then configure log shipping with the ITCertKeys-DB02 becoming the primary server and ITCertKeys-DB01 becoming the secondary server.

Incorrect Answers:
A: You do not need to install Service Pack 4 for SQL Server 2000 on the database servers as SQL Server 2000 with Service Pack 3 can be upgraded to SQL Server 2005. However, SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005.
C: SQL Server 2005 does not support the Database Maintenance Plan Wizard which was integral to log shipping in SQL Server 2000. Hence, log shipping stops functioning when you upgrade a SQL Server 2000 log shipping configuration directly to SQL Server 2005. 
D: Removing log shipping from ITCertKeys-DB02 and upgrading ITCertKeys-DB01 to SQL Server 2005 will not ensure that the CK_Trading database remains available.

Reference:
Microsoft SQL Server 2005 Books Online (2006), Index: log shipping [SQL Server], upgrading

Question 7.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run Windows Server 2003. The ITCertKeys.com network contains a Domain Controller named ITCertKeys-DC01 and a member server named ITCertKeys-SR21. 

ITCertKeys.com wants to implement a SQL Server 2005 database that will store sales data. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to install SQL Server 2005 on ITCertKeys-SR21 and to create a database named Sales_DB. You need to ensure that ITCertKeys.com users and applications can connect to the database instance by using only the computer name. 

What should you do during the installation of SQL Server 2005 on Certkiller-SR21?

A. Select the Named Instance and use MSSQLSERVER as the instance name.
B. Select the Named Instance and use ITCertKeys-DC01 as the instance name.
C. Select the Default Instance and accept the default instance name.
D. Select the Named Instance and use ITCertKeys-SR21 as the instance name.

Answer: C

Explanation: 
To ensure that users and applications can connect to the instance using the computer name, you should select the Default Instance and accept the default instance name, MSSQLSERVER.

Incorrect Answers:
A, B, D: You cannot use a Named Instance as users and applications will need to specify the server name and the instance name when connection to the database.

Reference:

Question 8.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run on Windows Server2003 while the client computers run Windows XP Professional, Windows 98 Second Edition, and Novell NetWare 6.5. All computers are members of the ITCertKeys.com Active Directory domain. The ITCertKeys.com network contains a SQL Server 2005 database server named ITCertKeys-DB01 that hosts a database instance named MSSQLSERVR. 

ITCertKeys.com wants to implement another SQL Server 2005 instance for a database named Sales_DB. Sales_DB will store sales data for the company. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to create the SQL Server 2005 instance for the Sales_DB database. You need to ensure That all users will be able to connect to the Sales_DB database. You cannot make configuration changes to the client computers. Your solution must optimize network traffic.

What should you do?

A. Install the instance as a Named Instance and configure it to support Mixed Mode 
    Authentication. The enable TCP/IP for the instance.
B. Install the instance as a Default Instance and configure it to support Windows
    Authentication. The enable TCP/IP for the instance.
C. Install the instance as a Named Instance and configure it to support SQL
    Authentication. The enable IPX/SPX for the instance.
D. Install the instance as a Default Instance and configure it to support Windows
    Authentication. The enable IPX/SPX for the instance.

Answer: A

Explanation: 
The default instance is named MSSQLSERVER. This instance name is already in use; therefore you should use a Named Instance. You should use Mixed Mode Authentication to support NetWare users.

Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use. Furthermore, you need to use Mixed Mode Authentication as Windows Authentication does not support NetWare users.
C: You can use SQL Authentication, but this will require that you create SQL Logins for all users and groups. It would be easier to use Windows Authentication for clients that user Windows XP Professional and Windows 98 SE, and create SQL Logins for the NetWare 6.5 users. Also, SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.
D: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use. Furthermore, you need to use Mixed Mode Authentication as Windows Authentication does not support NetWare users. Also, SQL Server 2005 does not support IPX/SPX. The newer versions of NetWare, such as NetWare 6.5, support TCP/IP which makes it the common protocol for all clients.

Reference:

Question 9.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run on Windows Server2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains two SQL Server 2005 database servers that are configured in a cluster with two nodes named NodeA and NodeB. NodeA hosts a default database instance named MSSQLSERVR.

ITCertKeys.com wants to implement another SQL Server 2005 instance for a database named Sales_DB. Sales_DB will store sales data for the company. All ITCertKeys.com users will require access to the Sales_DB database. You have been instructed to create the SQL Server 2005 instance for the Sales_DB database on Node 

A. You need to ensure that all users will be able to connect to the Sales_DB database.

What should you do?

A. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the Sales_DB database.
B. Run the SQL Server 2005 Setup utility on NodeA and select the Default Instance for the Sales_DB database.
C. Move the existing instance from NodeA to NodeB. Run the SQL Server 2005 Setup utility on Node

A. Select the Default Instance and accept the default instance name
D. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the Sales_DB database.

Answer: A

Explanation: 
The default instance is named MSSQLSERVER. This instance name is already in use on NodeA; therefore you should use a Named Instance.

Incorrect Answers:
B: You cannot use the Default Instance as the default instance is named MSSQLSERVER and is already in use.
C: You do not need to move the existing instance as you can install up to 50 instances on a SQL Server 2005 database server.
D: You need to install the instance on NodeA not NodeB. You can install a new instance on NodeA if you use a Named Instance.

Reference:

Question 10.
You work as the database administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All servers on the ITCertKeys.com network run on Windows Server2003 and all client computers run Windows XP Professional. The ITCertKeys.com network contains two SQL Server 2005 database servers that are configured in a cluster with two nodes named NodeA and NodeB. NodeA contains two physical hard disk drives, one of which hosts the Quorum resource and contains a single partition while the other contains two logical partitions. NodeB also has two physical hard disk drives each of which contain asingle logical partition. 

None of the hard disks in the cluster have any unallocated space left. The SQL Server 2005 cluster currently hosts four database instances. ITCertKeys.com wants to implement another SQL Server 2005 instance for a database named Manufacturing_DB. Manufacturing_DB will store data from the ITCertKeys.com Manufacturing department. You have been instructed to create the
SQL Server 2005 instance for the Manufacturing_DB database.

What should you do?

A. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the Manufacturing_DB database.
B. Create a second logical partition on one of the physical disk drives on NodeB. Run the SQL Server 2005 Setup utility on NodeB and select a Named Instance for the Manufacturing_DB database.
C. Add a third physical disk drive on one of the nodes. Run the SQL Server 2005 Setup utility on that node and select Named Instance for the Manufacturing_DB database.
D. Run the SQL Server 2005 Setup utility on NodeA and select a Named Instance for the Manufacturing_DB database.

Answer: C

Explanation: 
A single SQL Server 2005 database server can host up to 50 instances but a clustered SQL Server 2005 configuration can only host one instance per logical disk drive. There are currently five logical disk drives in the cluster but one is used for the Quorum resource this leaves you with four logical disk drives that can support a total of four instances. To add another instance, you would need to add another logical disk drive. As none of the hard disks have unallocated free
space, you would need to add another hard disk to the cluster.

Incorrect Answers:
A, D: You cannot add another instance to any of the two nodes as a clustered SQL Server 2005 configuration can only host one instance per logical disk drive. There are currently five logical disk drives in the cluster but one is used for the Quorum resource this leaves you with four logical disk drives that can support a total of four instances. To add another instance, you would need to add another logical disk drive. As none of the hard disks have unallocated free space, you would need to add another hard disk to the cluster.
B: You cannot create another partition on any of the physical drives on NodeB as none of the hard disks in the cluster has unallocated free space that you can use to create another partition. You will need to add another hard disk to the cluster for the new instance.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 70-526 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "70-526" Exam

Microsoft .NET Framework 2.0 - Windows-Based Client Development

 Question 1.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS035 as developing collateral. You are busy developing a Microsoft Windows Forms application. The applications that you are developing are using shared assemblies that must be installed into the Global Assembly Cache (GAC).

What should you do to develop a deployment strategy?

A. You should create a CAB project that contains the application.
B. You should use the XCOPY to deploy the application.
C. You should use the ClickOnce to deploy the application.
D. You should create a Window Forms Setup application

Answer: D

Explanation: 
The Window Forms Setup application can accomplish this by creating and configuring a Setup project to deploy a Microsoft Windows Installer package.

Incorrect Answers:
A: The CAB Project is used to package components.
B: The XCOPY cannot install assemblies into the GAC by using XCOPY.
C: The ClickOnce cannot be used to install shared assemblies into the GAC.

Question 2.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS205 as developing collateral. You are busy developing a Microsoft Windows Forms application. You want the users to download or run a Microsoft Windows Installer package from ITCertKeys.com's Web site to install the application.

Which of the following deployment project should you create?

A. Setup Project
B. CAB Project
C. Merge Module Project
D. Web Setup Project

Answer: A

Explanation: 
The Setup Project allows you to install Window-based applications.

Incorrect Answers:
B: The CAB Project is used to package components.
C: The Merge Module Project allows you to install shared components.
D: The Web Setup Project allows you to install Web applications.

Question 3.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS009 as developing collateral. You are busy developing a Microsoft Windows Forms application. You then change the default configuration to package files as loose uncompressed files. You also need to make sure that the .NET Framework 2.0 redistributable component exits after you build the Setup project.

Which of the following components should look for in the Setup project's output directory?

A. RegSvcs.exe
B. Dotnetfx.exe
C. InstallUtil.exe
D. RegAsm.exe

Answer: B

Explanation:
The Dotnetfx.exe needs to exits in the output directory, which uses the .NET Framework 2.0 redistributable package.

Incorrect Answers:
A: The RegSvcs.exe is the .NET Services Installation tool. It allows you to register an assembly for use with COM+.
C: The InstallUtil.exe allows you to execute custom installers that are associated with an assembly. .
D: The RegAsm.exe allows you to register an assembly for use with COM+.

Question 4.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS209 as developing collateral. You are busy creating a class that derives from Installer. The class that you created is used by Microsoft Windows Forms application to install a custom component which uses an existing Microsoft Access database.

Which exception type should you use if the database does not exist at installation time and you need to throw an exception and have the installation rolled back?

A. You should install InstallException
B. You should install ApplicationException
C. You should install SqlException
D. You should install FileNtFoundException

Answer: A

Explanation: 
The InstallException passes information to the Microsoft Windows Installer and causes the installation to be rolled back.

Incorrect Answers:
B: The ApplicationException will not cause the installation to roll back.
C: The SqlException will not cause the installation to roll back.
D: The FileNtFoundException will not cause the installation to roll back.

Question 5.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS209 as developing collateral.

You are busy creating a class that derives from Installer. The class that you created is used by Microsoft Windows Forms setup application to install a custom component which uses an existing Microsoft SQL Server 2005 database. The component throws a SqlException instance when it cannot connect to the database during installation.

What should you do to automatically rollback the installation is the component throws a SqlException instance?

A. You should catch the SqlException instance and create an instance of InstallException and pass the SqlException instance as the inner exception and then throw the InstallException instance.
B. You should catch the SqlException instance and create an instance of ApplicationException and pass the SqlException instance as the inner exception and then throw the ApplicationException instance.
C. You should catch the SqlException instance and re-throw it.
D. You do not nee to catch the SqlException instance as it will propagate up the call stack.

Answer: A

Explanation: 
This action will pass information to the Microsoft Windows Installer and causes the installation to be rolled back.

Incorrect Answers:
B: The ApplicationException will not cause the installation to roll back.
C: The SqlException will not cause the installation to roll back.
D: The FileNtFoundException will not cause the installation to roll back.

Question 6.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. You are busy to develop a Microsoft Windows Forms exam delivery application. This is going to be used to access the content of the exam via the Internet. A WebBrowser named testbrowser is added to the control to a form named ITCertKeys Form, which is define as follows:
[PermissionSet[SecurityAction.Demand, Name="FullTrust"]]
[System.Runtime.InteropServices.ComVisible[true]]
public ITCertKeys Form : Form
{
public ITCertKeys Form[]
{
InitializeComponent[];
}
public void Expire[]
{
}
}

The JavaScript-based timer that is used by the Web site for the exam has a function to inform the exam delivery application when the time has expired for the exam, which is the following:
window.external.Expire[];

What should you do to make sure that the Expire method of ITCertKeys Form is called when the JavaScrip function is carry out?

A. You should set the Document.DomDocument property of the browser instance to the current instance of the ITCertKeys Form class.
B. You should set the ObjectForScripting property of the browser instance to the current instance of the ITCertKeys Form class.
C. You should call the AttachEventHandler of the Document property of the browser instance.
D. You should call the ExecCommand method of the Document property of the browser instance.

Answer: B

Explanation: 
You must set the Object For Scripting for the browser instance to the current instance of the ITCertKeys Form class.

Incorrect Answers:
A: The property of the Document.Dom Document represents the true DOM object of an HTML document.
C: The AttachEventHandler allows you to attach a HTML Document Object Model event to an event handler.
D: The ExecCommand method allows you to execute commands against DOM documents.

Question 7.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. 

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS003 as developing collateral. You have received instructions to make sure that the PictureBox will display dynamically loaded images.

Which property will display a static image if any dynamic image fails to load?

A. BackgroundImage
B. Image
C. ErrorImage
D. InitailImage

Answer: C

Explanation: 
The Error Image property specifies the image that should be displayed. This will happened only if the image that you are trying to load dynamically fails.

Incorrect Answers:
A: The Background Image property specifies a background image which is used by the control.
B: The Image property specifies the image you want the PictureBox control to display.
D: The InitailImage specifies the image you want the PictureBox control to display while the other one is loading.

Question 8.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com.

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. You are developing a Web service for new updates to query automatically, by use of a Microsoft Windows Forms application. You then add a Notify Icon component named ITCertKeys notify to the application's main form. Whenever a new update is available you want the following balloon tip to display as seen in the exhibit for 5 seconds.
 
Which segment should you use to write a code to download the updates if the users click the balloon tip?

A. ITCertKeys notify.BallonTipClick +=delegate
    {
    // Download the updates
    }
    ITCertKeys notify.ShowBallonTip[5000, "New Update Available"; "Click here to download" , 
    ToolTipIcon.Info];
B. ITCertKeys notify.ShowBallonTip[5];
    ITCertKeys notify.BalloonTipIcon = ToolTipIcon.Info;
    ITCertKeys .Balloon TipTitle = "New Update Available";
    ITCertKeys .BalloonTipText = "Click here to download";
    ITCertKeys .Click += delegate
    {
    // Download the updates
    }
C. ITCertKeys notify.BalloonTipIcon = ToolTipIcon.Info;
     ITCertKeys .Balloon TipTitle = "New Update Available";
     ITCertKeys .BalloonTipText = "Click here to download";
     ITCertKeys .Click += delegate
     {
     // Download the updates
     }
     ITCertKeys notify.ShowBallonTip[5000];
D. ITCertKeys notify.ShowBallonTip[5, New Update Available", "Click here to download",
    ToolTipIcon.Info];
    ITCertKeys .BalloonTipClick += delegate
    {
    // Download the updates
    }

Answer: A

Explanation: 
You should use an event handler, attach the BalloonTipClicked to the event and call the Show Balloon Tip method of the NotifyIcon class. 

When a user clicks a balloon tip, a BalloonTipClicked event is raised.

Incorrect Answers:
B, C, D: You should not attach the BalloonTipClicked even to an event handler after you have called the ShowBalloonTip method. Also note that the event is raised when the icon is clicked and not the balloon tip.

Question 9.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. 

ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS020 as developing collateral. 

You are busy adding a MenuStrip control, which has an instance of a Tool Strip Menu item named testjobItem, to a form in a Microsoft Windows Forms application. This item's display text is Job. You have received instructions to add two menu items to the Job menu item. The first item's display text should be Create New Job, and the second one is Run Job.

Which code segment should you use to programmatically add the two menu items?

A. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New
    Job"];
    ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"];
    jobItem.Container.Add[createNewJobItem];
    jobItem.Container.Add[runJobItem];
B. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New
    Job"];
    ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"];
    jobItem.Owner.Items.Add[createNewJobItem];
    jobItem.Owner.Items.Add[runJobItem];
C. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New
    Job"];
    ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"];
    ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
    runJobItem}
    jobItem.DropDownItems.AddRange[items];
D. ToolStripMenuItem createNewJobItem = new ToolStripMenuItem["Create New
    Job"];
    ToolStripMenuItem runJobItem = new ToolStripMenuItem["Run Job"];
    ToolStripMenuItem[] items = new ToolStripMenuItem[]{create NewJobItem,
    runJobItem}
    jobItem.Owner.Items.AddRange[items];

Answer: C

Explanation: 
For the jobItem instance you should call the AddRange. The property of the DropDownItems represents a collection of child items of the jobItem instance, which allows you to add the two items to the job menu item.

Incorrect Answers:
A: This property returns an instance of IContainer, which represents a logical container for other components.
B: The Owner property returns the Menu script instance that owns the ToolStripMenuItem instance.
D: This action will add the two new menu at the same level as the Job menu item.

Question 10.
You are working as an application developer at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com uses Visual Studio 2005 as an application platform. ITCertKeys.com consists of a Development department. You as the developer of ITCertKeys.com use a client computer named ITCertKeys -WS050 as developing collateral. You were busy with a task to add a Context Menu Strip control to a form.

What should you do to display a custom control as a menu item of the ContextMenuStrip control?

A. Add a ToolstripContainer control to the form and add the custom control to the Controls collection residing on the toolStripContainer control. You should then add the ContextMeniStrip control to the controls of the ToolStripContainer control.
B. Of ToolStripControlHost, create an instance and specify your custom control instance as a parameter to the conductor. You should then the ToolStripControlHost instance to the Items collection of the ContextMeniStrip control.
C. Add a ToolstripContainer control to the form and add the custom control to the Controls collection residing on the toolStripContainer control. You should then add the ToolstripContainer control to the controls of the ContextMeniStrip controls.
D. Of ToolStripControlHost, create an instance and specify your custom control instance as a parameter to the conductor. You should then the ContextMeniStrip controls to the collection of the ToolStripControlHost instance.

Answer: B

Explanation: 
The ToolStripControlHost class to host a custom control as a menu item in the ContextMeniStrip. You should also the custom control instance as the parameter to the constructor.

Incorrect Answers:
A, C, D: The ToolstripContainer should not be used to reach your goal. Furthermore, you cannot host a ToolstripContainer control as the menu item in a ContextMeniStrip controls.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 220-701 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "220-701" Exam

A+ Essentials

 Question 1.
You are working as a technician at ITCertKeys.com. You have just finished updating the system on a workstation, but the workstation seems to have become unstable.

Which of the following will allow you to return the system to the original state?

A. Boot in safe mode and re-install the system from NTBACKUP.
B. Restore the system from a known working restore point.
C. Boot from the Last Known Good configuration.
D. Determine recent changes as recorded in the System Information application.

Answer: B

Explanation: 
System Restories a component of Microsoft's Windows Me, Windows XP and Windows Vista operating systems that allows for the rolling back of system files, registry keys, installed programs, etc., to a previous state in the event of a failure.

Question 2.
You are working as a technician at ITCertKeys.com. You are asked to see if you can optimize the performance of the computers in the computer lab. 

Which of the following should you schedule to run at a regular interval in order to optimize system performance in the computer lab? (Select THREE).

A. backup of data
B. run a registry backup program
C. deletion of temporary files
D. defragment the hard drive
E. run MSCONFIG
F. run anti-spyware/malware program

Answer: C, D, F

Explanation: 
Backing up data or registry entries will not speed up a computer as the backup will not change anything on the computer itself. But a backup might be a good idea before doing any other performance raising tasks. MSConfig, or System Configuration Utility, is a system configuration utility bundled with all Microsoft Windows operating systems released after 1995 except Windows 2000. Windows 2000 users can download the utility separately, however. This tool modifies which programs run at startup, edits certain configuration files, and simplifies controls over Windows services.

Question 3.
You are working as a technician at ITCertKeys.com. A user that is working with layout needs a printer that is directly connected to his computer in order to preview prints before sending them to reproduction. The user is sending quite large printouts to the printer and is concerned about the data transfer rate between the computer and the printer. 

Which of the following provides the fastest interface for printing from his workstation?

A. USB 2.0
B. Bluetooth
C. IEEE 802.11g
D. IEEE 802.11b

Answer: A

Explanation: 
USB 2.0 can handle speeds up to 480 Mbit/s. A version 1.2 Bluetooth device can handle speeds up to 1 Mbit/s. IEEE 802.11b and IEEE802.11g is for wireless Ethernet networks and can handle maximum 11Mbit/s respectively 54 Mbit/s

Question 4.
You are working as a senior network technician at ITCertKeys.com. You are learning a trainee about different kinds of broadband. When you come to broadband delivered over satellite you tell the trainee about the delay that occurs when communicating over satellites. 

What is this delay called?

A. impedance.
B. attenuation.
C. latency.
D. echo.

Answer: C

Explanation: 
Communications latency is the time taken for a packet of data to be sent from one application, travel to, and be received by another application. This includes transit time over the network, and processing time at the source and the destination computers. Specifically, this is the time for encoding the packet for transmission and transmitting it, the time for that serial data to traverse the network equipment between the nodes, and the time to get the data off the circuit.

This is also known as "one-way latency". A minimum bound on latency is determined by the distance between communicating devices and the speed at which the signal propagates in the circuits (typically 70-95% of the speed of light). Actual latency is much higher, due to packet processing in networking equipment, and other traffic.

Question 5.
You are working as a network technician at ITCertKeys.com. You are installing a Wireless LAN at a branch office. The WLAN will comply to the IEEE 802.11g standard. A user at the branch office wants to know what the maximum connection speed of the wireless connection will be. 

What will you answer him?

A. 24 Mbps
B. 54 Mbps
C. 15 Mbps
D. 11 Mbps

Answer: B

Explanation: 
802.11g works in the 2.4 GHz band (like 802.11b) but operates at a maximum raw data rate of 54 Mbit/s, or about 19 Mbit/s net throughput (identical to 802.11a core, except for some additional legacy overhead for backward compatibility). 802.11g hardware is fully backwards compatible with 802.11b hardware. Details of making b and g work well together occupied much of the lingering technical process.

Question 6.
You are working as a network technician at ITCertKeys.com. You are asked to install a Wireless LAN at a branch office. 

In order to tighten security, which of the following default settings should be changed on the access point? (Select TWO).

A. SSID
B. MAC address
C. Infrastructure mode
D. DHCP addressing
E. password

Answer: A, E

Explanation: 
Most manufacturers has a default SSID and user/password combination on all access points that leave their factory. These SSID's and passwords are easily obtainable from internet and will be a hole in the security unless changed.

Question 7.
You are working as a network technician at ITCertKeys.com. You have been sent to a branch office to upgrade their network. You install a wireless access point that also acts as a router and DHCP server. 

Which of the following information needs to be configured on the computers with WLAN capabilities in the branch office in order for them to access the network?

A. IP address
B. default gateway address
C. WEP or WPA encryption key
D. SSID

Answer: D

Explanation: 
The SSID and in some situations also a PSK (Pre Shared Key) for encryption is needed in order to connect to the wireless access point.

Question 8.
HOTSPOT
Where on the following exhibit would you insert Random Access Memory (RAM)? 

 Answer:

 Explanation: 
On an ATX motherboard, the RAM expansion slots are located at 90° to the ISA and PCI expansion slots. They can also be identified by their retaining clips.

References:
David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex, Alameda, CA, 2001, pp. 63-72.

Question 9.
Which of the following components on the motherboard usually house the IDE connectors?

A. PCI bus.
B. North Bridge.
C. ISA bus.
D. South Bridge.

Answer: D

Explanation: 
The South Bridge is generally used for slower devices such as USB ports, IDE drives, and ISA slots.

Incorrect Answers:
A: The PCI bus is a sort of bridge between the processor and ISA bus.
B: The North Bridge is generally used for high-speed interface cards, such as video accelerators, Synchronous RAM (SRAM), and memory.
C: The ISA bus does not house the IDE connectors.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing,
Indianapolis, 2003, p. 80.

Question 10.
HOTSPOT
Where on the following exhibit would you insert Central Processing Unit (CPU)?
 
Answer:
 
Explanation: 
The CPU is usually white in color, square shaped, has a retaining level and a number of pins.

References:
David Groth and Dan Newland, A+ Complete Study Guide (2nd Edition), Sybex,
Alameda, CA, 2001, pp. 63-72.


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 220-702 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "220-702" Exam

IT Technician

 Question 1.
You are working as a senior network technician at ITCertKeys.com. A trainee asks you where in the OSI model layers the MAC address reside. 

What will you answer him?

A. data link
B. network
C. transport
D. session

Answer: A

Question 2.
You are working as a senior network technician at ITCertKeys.com. You have just installed a laser printer that is directly connected to your Windows XP workstation.

You wish to share the laser printer to the local workgroup consisting of the other technicians at ITCertKeys.com. You want to be able to control which users can access the printer but you can not find a permissions tab for the printer. 

Which of the following actions should you take?

A. Remove unwanted users from the Local Users and Groups.
B. Turn off Simple File Sharing and set the permissions for the shared printer.
C. Use the printer's operation panel menu to lock out unwanted users.
D. Set up a shortcut to the printer on the desktop and set the permissions for the shortcut.

Answer: B

Explanation: 
Windows XP lets you share a computer's disks and folders with other computers on the network, using a method called Simple File Sharing. And it really is simple. If a disk or folder is shared, everyone on the network can access it. There are no user permissions and no passwords. Because sharing in this way is so wide open, Windows XP tries to protect you from some potential security risks. 

Question 3.
You are working as a network technician at ITCertKeys.com. You are asked to install a new wireless network in one of ITCertKeys.com's branch offices. You have read about security flaws in wireless networks and therefore you are concerned with securing the wireless network as much as possible with reasonable amounts of administration. 

Which of the following would be the BEST method to maintain a secure wireless network?

A. Perform a network diagnostic.
B. Remove all 2.4 gigahertz telephones from the location.
C. Enable WEP.
D. Move wireless computers close to the router.

Answer: C

Explanation: 
Wired Equivalent Privacy or Wireless Encryption Protocol (WEP) is a scheme to secure IEEE 802.11 wireless networks. It is part of the IEEE 802.11 wireless networking standard.

Question 4.
You are working as a technician at ITCertKeys.com. You receive an call from a suspicious user that has received an email stating that the company's network administrators are attempting to validate the complexity of login passwords by requesting that users provide the password in a reply email. 

Which of following actions should recommend the user to take?

A. Send a reply message with an encrypted signature attached.
B. Send a reply message containing the password.
C. Deny the request by deleting the email.
D. Encrypt the reply and send the reply to the requestor.

Answer: C

Explanation: 
This is one of the numerous variants of a social engineering attack where someone asks to get your logon name and password by pretending to be someone who you normally would trust.

Question 5.
You work as a technician at ITCertKeys.com. You receive a telephone call from a user stating that he has forgotten the password and is unable to access company email.

What should you answer the calling person?

A. the password will be reset in several minutes.
B. the user should remember the password.
C. the telephone call is being recorded and give the user the password.
D. information confirming the user's identity is needed.

Answer: D

Explanation: 
It is easy to remain anonymous over a telephone call and therefore you should not trust the user being who he says he is without the user providing more reliable information concerning his or her identity

Question 6.
You are working as a technician at ITCertKeys.com. You are troubleshooting a computer that is experiencing strange troubles. After a little while you determine that the best solution would be to reload the operating system. 

Which of the following would be the BEST way to explain to a customer that the computer will need to have the operating system reloaded?

A. I need to rebuild the system.
B. I will need to restore the system and data loss may occur.
C. I need to kill the system and reload it.
D. I will need to format the hard drive and reload all software.

Answer: B

Question 7.
You are the ITCertKeys.com trainee technician currently installing 6 IDE devices in a computer. 

Which of the following is the minimum amount of IDE channels needed to accomplish this objective?

A. 1
B. 6
C. 4
D. 3

Answer: D

Explanation: 
Each IDE channel can support two IDE devices. Thus if you are installing 6 IDE devices you need 3 IDE channels.

Incorrect Answers:
A: 1 IDE channel is inadequate if you want to install 6 IDE devices.
B: 6 Channels would be too many since each channel is able to support two IDE devices.
C: 4 Channels would be too many since each IDE channel can support two IDE devices.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 321.

Question 8.
Which of the following components on the motherboard usually house the IDE connectors?

A. PCI bus.
B. North Bridge.
C. ISA bus.
D. South Bridge.

Answer: D

Explanation: 
The South Bridge is generally used for slower devices such as USB ports, IDE drives, and ISA slots.

Incorrect Answers:
A: The PCI bus is a sort of bridge between the processor and ISA bus.
B: The North Bridge is generally used for high-speed interface cards, such as video accelerators, Synchronous RAM (SRAM), and memory.
C: The ISA bus does not house the IDE connectors.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 80.

Question 9.
What is the minimum number of hard drives required for RAID level 0?

A. 1
B. 2
C. 3
D. 4

Answer: B

Explanation: 
RAID Level 0 (RAID 0) is not a fault-tolerance configuration. It is a striping process in which 64KB block data are in striped sets across two or more hard disks.

Incorrect Answers:
A: A minimum of two hard drives are required for RAID-0.
C, D: RAID 0 configuration can include 3 or 4 hard drives but it requires a minimum of two hard disks.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, p. 731.

Question 10.
Of the following options, which one is the only RAID level that uses disk mirroring?

A. RAID-0
B. RAID-5
C. RAID-3
D. RAID-1

Answer: D

Explanation: 
RAID 1 is the most common form of RAID at the moment and is often used in disk mirroring and disk duplexing.

Incorrect Answers:
A: RAID Level 0 (RAID 0) is the no-fault-tolerance process of using 64KB block storage areas in a striped set.
B: RAID-5 is a fault-tolerant volume with data and parity striped intermittently across three or more physical disks.
C: RAID 3 is disk striping with parity, with data being moved at the bit level rather than the block level.

Reference:
James G. Jones and Craig Landes, A+ Exam Cram 2 (2nd Edition), QUE Publishing, Indianapolis, 2003, pp. 731 and 732.



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 220-702 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "220-702" Exam

A+ Remote Support Tech designation pathway

 Question 1.
Which of the following types of batteries provides the longest running time for portable devices?

A. alkaline
B. nickel-cadmium (NiCd)
C. lithium ion (Li-ion)
D. nickel metal-hydride (NiMH)

Answer: C

Question 2.
A dual-layer DVD-R disc has a maximum data capacity of:

A. 4.7GB.
B. 2.1GB.
C. 700MB.
D. 9.4GB.

Answer: D

Question 3.
The standard measurement of resolution in printing is:

A. lines per millimeter.
B. dots per millimeter.
C. lines per inch.
D. dots per inch.

Answer: D

Question 4.
When using an ink jet printer, a user reports that some colors seem to be missing intermittently.

Which of the following is MOST likely the cause of the problem?

A. There is a problem with the document being printed.
B. The printer needs to be calibrated.
C. An incorrect paper type is being used.
D. The print head is clogged.

Answer: D

Question 5.
A user reports that jobs for a network printer are stuck in the print queue and will not print. The user has checked the printer display and the display shows ready.

Which of the following should be attempted FIRST?

A. Delete and recreate the printer on the users system.
B. lnstruct the user to shutdown and restart the system and attempt to print again.
C. Update the print driver on the users system.
D. Restart the print spooler on the system hosting the printer.

Answer: D

Question 6.
A user reports that a local ink jet printer is not printing. The user has a signed driver, the printer hardware is working, ink is full, print heads are clean, and the printer is connected correctly via USB. The print queue has 20 documents waiting for the printer. 

Which of the following is MOST likely the cause of the problem?

A. The print head has failed.
B. The printer is set to offline mode in Windows XP.
C. There is insufficient memory installed in the printer.
D. Windows firewall is blocking packets being sent to the printer.

Answer: B

Question 7.
Which of the following is MOST likely the cause of a printing problem if a user is receiving an error before a job is seen in the print queue?

A. Print spooler service is stopped.
B. Too many documents are being printed at once.
C. The size of the document being printed is too large.
D. There is a mechanical problem with the printer.

Answer: A

Question 8.
A user reports that a local printer attached to the workstation is not printing properly. Three jobs appear in the print queue when the user checks Printers and Faxes and the printer display shows ready. 

Which of the following should be attempted FIRST?

A. Cancel all jobs in the print queue.
B. Update the print driver on the user's system.
C. Delete and recreate the printer on the user's system.
D. Instruct the user to shut down and restart the system and attempt to print again.

Answer: A

Question 9.
Which of the following printers uses heat to fuse the toner onto the printed page?

A. impact
B. solid ink
C. laser
D. ink jet

Answer: C

Question 10.
Which of the following could be installed to increase the processing capacity of some office printers?

A. duplexer
B. ROM
C. memory
D. Ethernet card

Answer: C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 220-802 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "220-802" Exam

A+ Depot Technician

 Question 1.
Which of the following is MOST likely to be an infrared device?

A. printer
B. cellular telephone
C. headset
D. keyboard

Answer: D

Question 2.
Which of the following would be the BEST method to use to determine whether a laptop battery is seated correctly?

A. Shake the battery housing while the computer is on.
B. Remove the battery while the computer is plugged in.
C. Turn the computer on with the alternating current (AC) cord unplugged.
D. Change the advanced power management settings in the BIOS.

Answer: C

Question 3.
Which of the following would be the way to prevent the Num Lock LED from being turned on automatically when a laptop is booted?

A. Go into the Windows Keyboard applet and deselect the 'Num Lock on boot' option.
B. Create a Windows profile to disable the feature during power-on self test (POST).
C. Hold the function Num Lock key down during POST.
D. Turn the feature off in the BIOS.

Answer: D

Question 4.
When inserting a second hard drive into the laptop's external drive bay, the system will not boot.

The MOST likely cause is that the drive:

A. is not compatible with the laptop.
B. is disabled in Windows.
C. jumper is set as master.
D. is defective.

Answer: C

Question 5.
Which of the following would be the cause if a system utilizing a shared memory bus system that had its memory upgraded continues to have performance issues when using a graphic-intensive application?

A. The CPU acceleration needs to be configured to the maximum setting.
B. The screen refresh rate needs to be set to the minimum possible settings.
C. The shared system can only utilize a fixed amount of memory from system bus.
D. The Enable Write combining option needs to be selected in the Troubleshooting tab of the Advanced setting in the Control Panel Display applet.

Answer: C

Question 6.
A technician receives a laptop work order stating that the mouse pointer from the touchpad is moving randomly around the screen. 

Which of the following should the technician do FIRST?

A. Reboot the computer.
B. Replace the touchpad.
C. Clean the touchpad.
D. Update the driver.

Answer: C

Question 7.
A user reports that the display on the laptop appears blurred. 

Which of the following is MOST likely the cause?

A. More video memory needs to be allocated.
B. The LCD is not running in its native resolution.
C. The drivers are improperly installed.
D. LCD monitors do not appear blurred.

Answer: B

Question 8.
A technician is working on a laptop that is powered on but has a black LCD screen. 

Which of the following should the technician do to start troubleshooting the laptop?

A. Replace the LCD inverter.
B. Connect an external monitor to the laptop.
C. Replace the LCD screen.
D. Connect a video tuner to the laptop.

Answer: B

Question 9.
A technician is upgrading the memory on a laptop that has a front-side bus speed of 333MHz.

Which of the following memory module types has the minimum data transfer rate necessary to support this upgrade?

A. PC533
B. PC333
C. DDR333
D. DDR266

Answer: C

Question 10.
The display on a recently repaired tablet computer is not functioning but the VGA port is functioning. 

Which of the following is MOST likely the cause?

A. The digitizer needs replacing.
B. The wireless antenna is not shielded properly.
C. The system board needs replacing.
D. The video ribbon cable is not seated properly.

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for RF0-001 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "RF0-001" Exam

RFID+ Certification

 Question 1.
All of the following help solve multiple interrogator environment issues EXCEPT:

A. separate transmit and receive channels.
B. single side band modulation.
C. using multi-protocol interrogators.
D. using absorptive material.

Answer: C

Question 2.
Which of the following would be the BEST reason to use a hand-held rather than stationary interrogator?

A. User abilities
B. Aesthetic appeal
C. System support
D. Functional capabilities

Answer: D

Question 3.
Recent protocols have been written to support the reading of 1,700 tags per second with passive ultra high frequency (UHF) systems. To read this many tags in such a brief period of time, the interrogator should use:

A. tag isolation.
B. anti-collision.
C. passive backscatter.
D. a tag magnifier.

Answer: B

Question 4.
Anti-collision protocols in passive RFID systems allow:

A. antennas to operate without interfering with one another.
B. polite interactions between many interrogators in a single read zone.
C. random tags to collide into each other.
D. multiple tags to be read in a single pass through an interrogation zone.

Answer: D

Question 5.
Which of the following would be the reason for enabling Simple Network Management Protocol (SNMP) traps on installed interrogators?

A. Provide health status monitoring of the interrogator in question.
B. Encrypt data as it is released by the interrogator.
C. Catch intruders attempting to hack your interrogators.
D. Perform behavioral analysis of your operations workforce.

Answer: A

Question 6.
Desktop industrial RFID-enabled bar code printers handle an inoperative tag by.

A. sending an error to the host.
B. printing 'void' or some other marking on the label.
C. ejecting the label.
D. ignoring it and continuing.

Answer: B

Question 7.
When troubleshooting an interrogation zone, an operator observes that the interrogator is not responding to external input or reading tags. The lights are on indicating it has power and network connectivity. 

Which of the following would be the next step for the operator to take?

A. Replace the antenna cable.
B. Replace the interrogator.
C. Reboot the interrogator.
D. Reboot the antenna.

Answer: C

Question 8.
Loss of connection between an interrogator and the edgeware/middleware would result in which of the following?

A. Only active RFID tag data would be processed.
B. No tag data would be processed.
C. Tag data would be sent directly to the Warehouse Management System (WMS),
D. Only interrogator status would be tracked.

Answer: B

Question 9.
Which of the following conditions would be MOST likely to cause a ghost tag read?

A. The interrogator did not pass electronic product code (EPC) compliance testing.
B. There is a broken strap between the chip and the antenna on the tag.
C. There are too many tags within an interrogator zone.
D. There is RF interference in an interrogator zone.

Answer: D

Question 10.
Which of the following materials have absorptive properties in relation to ultra high frequency (UHF)? (Select TWO).

A. Damp cardboard
B. Glass
C. Conductive liquids
D. Metal

Answer: A, C


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.