|
send me the latest question! advance thx..
|
Question 1. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. ABC.com has recently opened a new satellite office in Miami. You have been tasked with making sure that users in the Miami office are able to install operating systems on their workstations using boot images. You decide to modify the settings of the site system in the Configuration Manager to answer requests for boot images from workstations in the Miami office. Which of the following actions should you take? A. You should consider creating a new site system, and installing the PXE Boot Service on a DHCP server in ABC.com’s environment. B. You should consider creating a new site system, and granting it the Fallback status point role. C. You should consider creating a new site system, and installing the State Migration Service on a DHCP server in ABC.com’s environment. D. You should consider creating a new site system, and granting it the PXE Service Point role. Answer: D Explanation: Question 2. You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have received instruction from the CIO to prepare for the deployment of new OS to all workstations on the ABC.com network office. You are then informed that for the boot images to perform adequately, it needs added network drivers. You navigate to the properties of the boot image, and choose the Select a Driver option. When you try to add the required drivers, you notice that there aren’t any drivers available. Which two of the following actions should you take? A. You should consider importing the relevant drivers into the Drivers node of the Configuration Manager console. B. You should consider importing the relevant drivers into the Driver Packages node of the Configuration Manager console. C. You should also consider choosing the relevant drivers and adding it in the boot image properties. D. You should also consider choosing the relevant package and adding it in the boot image properties. Answer: A, C Explanation: Question 3. You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. After configuring Network Access Protection (NAP) on ABC.com’s network, you are instructed to make sure that users on ABC.com’ network are able to access options for remediation in the event of remediation failing. You create a Web site in the restricted network Which of the following actions should you take? A. You should consider having a Web site created in the restricted network. B. You should consider having a Web site created in the public network. C. You should consider having the Troubleshooting URL setting configured on the network policy for computers that are not compliant. D. You should consider having the Troubleshooting URL setting configured on the network policy for computers that are unidentified. Answer: A, C Explanation: Question 4. You work as a Configuration Manager 2007 administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have been tasked with making sure that all workstations on the ABC.com network can be located by which office they reside in. To achieve this, you plan to insert a custom element in the hardware inventory data. Which of the following actions should you take? A. You should insert a NOIDMIF file, which hosts the office location data, on each workstation. You should then set up the Configuration Manager 2007 to gather NOIDMIF files from workstations. B. You should modify the Configuration.mof file. You should then insert a NOIDMIF file, which hosts the office location data, on each workstation. C. You should modify the Configuration.mof file. You should then set up the sms_def.mof file. D. You should set up the sms_def.mof file. You should then set up the Configuration Manager 2007 to gather NOIDMIF files from workstations. Answer: A Explanation: Question 5. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. You have recently deployed a custom application to all workstations on the ABC.com network. You are instructed to view the registry values for the new application for all ABC.com workstations. To achieve this, you have to send a query to Configuration Manager 2007 for the relevant information. Which of the following actions should you take? A. You should consider configuring hardware inventory, and setting the SMS_Def.MOF file on every site to query for the registry values. B. You should insert a NOIDMIF file on each workstation, and set up the Configuration Manager 2007 to gather NOIDMIF files from workstations. C. You should consider amending the sitectrl.cto file at the primary site. D. You should consider amending the sitectrl.cto file at the secondary site. Answer: A Explanation: Question 6. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. All workstations on the ABC.com network have a custom application, named ABCApp, installed. You have been instructed to monitor the amount of software used by ABCApp. Furthermore, you have to make sure that you are able to achieve this even if the name of the ABCApp executable is changed. You need to achieve this with as little administrative effort as possible. Which of the following actions should you take? A. You should consider configuring a software metering rule, and specify the new file name every time that it is changed. B. You should consider configuring a software metering rule, and specifying the Original file name for ABCApp. C. You should consider having a customized report configured on the Reports node. D. You should add all workstations that run ABCApp to a collection, and then configure a configuration baseline that is applied to the collection. Answer: B Explanation: Question 7. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. You have been instructed to make sure that a range of inventoried names for an application named TestApp can be viewed as a single display name in a Resource Explorer. To do this, you have to consolidate the different inventoried names for TestApp. You have verified that the Software Inventory client agent has been enabled. Which of the following actions should you take? A. You should consider having the SMSCIient.mof file modified. B. You should consider configuring the properties of the Software Inventory client agent to assemble several products into one product name. C. You should consider having the CollectionSettings.mof file modified. D. You should consider configuring the properties of the Software Inventory client agent to have a product name for each and every product. Answer: B Explanation: Question 8. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. System Center Configuration Manager 2007 has been configured to run in mixed mode. The site server, named ABC-SS01, in ABC.com’s central site is configured as a device management point. You have recently configured a compulsory task to distribute a software package to portable devices. While performing routine monitoring, you notice the failure of software distribution to portable devices on the LAN. You have to make sure that software can be deployed to portable computers via Configuration Manager 2007. You have confirmed that Internet Information Services (IIS) is running, and that Web Distributed Authoring and Versioning (WebDAV) extensions for IIS has been enabled. Which combination of the following options would allow you to achieve this? (Choose all that apply.) A. You should choose the Allow clients to transfer content from this distribution point using BITS, HTTP, and HTTPS option on the General tab of the ConfigMgr distribution point Properties Dialog box. B. You should deselect the Allow clients to transfer content from this distribution point using BITS, HTTP, and HTTPS option on the General tab of the ConfigMgr distribution point Properties Dialog box. C. You should deselect the Allow clients to connect anonymously (Required for mobile device clients) option on the General tab of the ConfigMgr distribution point Properties dialog box. D. You should choose the Allow clients to connect anonymously (Required for mobile device clients) option on the General tab of the ConfigMgr distribution point Properties dialog box. Answer: A, D Explanation: Question 9. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com recently introduced System Center Configuration Manager 2007 on their network. You have been asked to make sure that all computers in the ABC.com environment are linked to System Center Configuration Manager 2007. You are at present preparing for the installation of the Configuration Manager client software. Which of the following actions should you take? A. You should create a deadline for the installation. B. You should have the logon script configured to execute the ccmsetup.exe command. C. You should have the logon script configured to execute the Capinst.exe command. D. You should have the system health validator (SHV) point enabled. Answer: A Explanation: Question 10. You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com makes use of System Center Configuration Manager 2007 on their network. The ABC.com network also contains a server, named ABC-SR15, which runs Windows Server Update Services (WSUS) 3.0. ABC.com’s workstations receive software updates from ABC-SR15. You have been instructed to make sure that software update point client installation is adequately configured. Which of the following actions should you take? A. You should consider configuring the WSUS server to make use of a proxy server via the Configuration Manager console. You should also consider importing a Group Policy object (GPO), configuring it to identify command lines for the installation, and then assign it. B. You should consider importing a Group Policy object (GPO), configuring it to identify command lines for the installation, and then assign it. You should also consider configuring the WSUS server as a ConfigMgr software update point. C. You should consider specifying the fully qualified domain name (FQDN) for the WSUS server on a public DNS server. You should also consider configuring the WSUS server as a ConfigMgr software update point. D. You should consider configuring the WSUS server to make use of a proxy server via the Configuration Manager console. You should also consider configuring the WSUS server as a ConfigMgr software update point. Answer: B Explanation:
|
Question 1. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The new ITCertKeys.com directive states that all departments in ITCertKeys.com should install Microsoft Windows Vista Business Edition on their respective workstations. You have been assigned to the Research department. To this end you are thus tasked with the responsibility to install Microsoft Windows Vista Business Edition on the Research Department's workstations. Following is a list of the workstation specifications as at present in the research department: 1. 1.2 GHz processor. 2. 256 MB of RAM. 3. 10 GB hard drive. 4. SVGA video card. 5. Integrated sound card. 6. 10/100 integrated network adapter. These computers are not ready to have Microsoft Windows Vista Business Edition installed. They lack certain minimum hardware requirements. You now need to identify these and upgrade the workstations accordingly so as to comply with the new ITCertKeys.com directive. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should upgrade the processor. B. You should upgrade the RAM. C. You should upgrade the video card. D. You should upgrade the hard drive. E. You should upgrade the network adapter. Answer: B, D Explanation: You must have at least 512 MB of RAM and a minimum 20 GB hard drive with 15 GB of free space to successfully install Windows Vista. Incorrect Answers: A: Windows Vista requires an 800 MHz CPU, so the current 1.2 GHz processor will be adequate and will thus not need to be upgraded. C: Windows Vista will function with an SVGA video card, although improvements in the user experience with Aero would require a Windows Display Driver Model (WDDM) capable video card. E: Windows Vista does not have a minimum network adapter requirement, making this option irrelevant in the circumstances. Question 2. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The new ITCertKeys.com directive states that all departments in ITCertKeys.com should install Microsoft Windows Vista Business Edition on their respective workstations. You have been assigned to the Research department. However, there is another company policy that states that all new installations and upgrades should be done on test computers prior to mass deployment. The Research department has a test computer named ITCertKeys-WS620. Following are the ITCertKeys-WS620 specifications: 1. Drive C (system drive) has 10 gigabytes (GB) of free space. 2. Drive D (programs drive) has 40 GB of free space. 3. Two memory slots exist, but only one is occupied with a 512 megabyte (MB) memory stick. 4. One 1.5 gigahertz (GHz) 32-bit processor is installed. To comply with the company policy and follow the new directive you thus plan to install Microsoft Windows Vista Business on ITCertKeys-WS620. Now you need to change the hardware configuration so that the computer can run Windows Vista Business. What should you do? A. You should install Windows Vista on Drive D. B. You need to free up space on Drive C. C. You should add more memory to the computer. D. You should add a faster processor to the computer. Answer: B Explanation: Operating systems must be installed on the system drive. In this scenario, the system drive on ITCertKeys-WS620 has only 10 GB of free space. Thus you should free up space on Drive C because Windows Vista requires 15 GB of free space for installation purposes. Incorrect Answers: A: You must install operating systems on the system drive. In this scenario, Drive C is the system drive. Thus you should not install Windows Vista on Drive D. C: The minimum memory capacity for a computer running Windows Vista is 512 MB and ITCertKeys-WS620 has 512 MB RAM. Thus you do not need to add more memory to the computer. D: There is no need to add a faster processor to the computer. The minimum processor speed for a computer running Windows Vista is 800 megahertz (MHz). Question 3. You work as the Desktop support technician at ITCertKeys.com. You have been instructed to deploy Microsoft Windows Vista operating system on all the ITCertKeys.com client computers. ITCertKeys.com is planning to deploy two sites: a primary and a secondary site. You want to carry out your duty be using the System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack. Consequently you need to install the SMS 2003 OSD Feature Pack and thus you need to take you first action. What should you do? A. SMS 2003 should be installed on the primary site server. B. SMS 2003 should be installed on the secondary site server. C. Windows Deployment Service (WDS) should be installed on the primary site server. D. Business Desktop Deployment (BDD) 2007 should be installed on the primary site server. Answer: A Explanation: Installing SMS 2003 on the primary site server will enable you to install SMS 2003 OSD Feature Pack. The System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack can be used to create a custom image to deploy Windows Vista operating system on the target computers. Incorrect Answers: B: SMS 2003 must be installed on the Primary site server and not on the secondary site server. You are however able to install SMS 2003 on all the site servers to support SMS 2003 OSD Feature Pack. C: WDS is used to deploy Windows Operation System on target computers using PXE network boot. It is in essence an enhanced version of Remote Installation Services (RIS) as it was used in previous versions of the Windows operating systems. You should not first install WDS on the primary site server. D: BDD 2007 is installed on the deployment server after SMS 2003 OSD Feature Pack is installed. Question 4. You work as the Desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been instructed to deploy Microsoft Windows Vista operating system on all the ITCertKeys.com client computers. You plan to make use of System Management Server (SMS) 2003 on a primary site server. You then use System Management Server (SMS) 2003 operating system deployment (OSD) Feature Pack to create a custom Windows Vista image. You need to deploy the Windows Vista image on the ITCertKeys.com client computers. The ITCertKeys.com client computers are currently using a mix of 32- and 64-bit processors. This means that you will need to take certain steps prior to deploying the image to the client computers. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. Check the size of the deployment logs. B. Identify the differences in 32- and 64-bit deployment. C. Verify that SMS 2003 OSD Feature Pack is installed on the client computer. D. Verify that the ITCertKeys.com computers have the appropriate system resources. E. Verify that the Windows Deployment Service (WDS) is installed on the ITCertKeys.com client computer. Answer: B, D Explanation: The ZTIvalidate.wsf file is used to determine that the target computer has the available resources required to deploy Windows operating system. Prior to deploying an SMS 2003 OSD Feature Pack on a target computer, you should verify that the computer has the appropriate system resources. You should also identify the differences in 64-bit and 32-bit deployment. BDD 2007 only supports only EM64T-enabled processors and the AMD 64 type processors. Incorrect Answers: A: Deployment logs are used to store information regarding the image installation process on each client computer. You should determine the storage capacity required for storing the deployment logs during the image installation process. One does not first determine the size of the deployment logs. C: The SMS 2003 OSD Feature Pack is installed on the primary site server and is used to create custom Windows image for Windows deployment on the target/client computers. You should thus not install it on the client computer. E: WDS is used to deploy Windows Operation System on target computers using PXE network boot. It is in essence an enhanced version of Remote Installation Services (RIS) as it was used in previous versions of the Windows operating systems. WDS is not installed on the client computer. Question 5. You are employed as an administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All client computers on the ITCertKeys.com network run Microsoft Windows Vista. A ITCertKeys.com policy states that all client computers should be configured to obtain all of the latest operating system updates. A new computer named ITCertKeys-WS624 was recently purchased. You received instructions to verify whether ITCertKeys-WS624 can obtain all of the latest operating system updates. What should you do? A. You need to confirm that ITCertKeys-WS624 has a Microsoft Windows Experience Index base score above 3.0. B. You need to configure Windows Defender to detect updates before scanning. C. You need to validate your Windows installation from the Microsoft Windows Genuine Advantage Web page. D. You need to run Microsoft Windows Vista Upgrade Advisor. Answer: C Question 6. You are employed as a network administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network is divided into several departments of which the Sales department is one. The Sales department was assigned a client computer named ITCertKeys-WS622. Certkiller-WS622 has the following hardware configuration: 1. 512 MB of RAM 2. 10-GB hard disk 3. 933-MHz processor 4. 64-MB video adapter. You have received instructions from the manager to install Microsoft Windows Vista on ITCertKeys-WS622. Which hardware component fails the minimum hardware requirements? A. Memory. B. Hard disk. C. Processor. D. Video adapter. Answer: B Question 7. ITCertKeys.com has employed you as a desktop technician. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network is divided into several departments of which the Marketing department is one. The Marketing department was assigned a client computer named ITCertKeys-WS625. ITCertKeys-WS625 is currently running Microsoft Windows XP Professional. All the applications that are used in the Marketing department are third- party applications which are used daily in the department. You have received instructions from the CIO to upgrade ITCertKeys-WS625 to Microsoft Windows Vista. The CIO wants all the applications in used to be operational after the upgrade. You must comply with the CIO's request and thus need to determine whether the hardware and software on ITCertKeys-WS625 will support the upgrade and still leave all the applications operational. What should you do? A. You need to run the winnt32.exe /checkupgradeonly command. B. You need to run the mbsacli.exe command. C. You need to run the Microsoft Windows Vista Upgrade Advisor application. D. You need to compare ITCertKeys-WS625 system's hardware against the Microsoft Windows Vista Hardware Compatibility List (HCL). Answer: C Question 8. DRAG DROP You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com has a client computer named ITCertKeys-WS626. ITCertKeys-WS626 has a hard disk that has been partitioned in two equal parts of 50 Gigabytes (GB) each. Microsoft Windows XP Home has been installed in the primary partition. The second partition is yet to be formatted. You have been instructed ensure that ITCertKeys-WS626 has dual booting abilities. You need to accomplish this task with the least amount of administrative effort. What should you do? (Choose the correct options in the column on the left and place them in the correct order of execution in the work area on the right.) Answer: Explanation: The correct method would be to first format the second partition with NTFS, then boot the computer with the Windows Vista DVD and then installing Windows Vista on the second partition. This order of procedure would result in the least administrative effort since one should first install the oldest version of the Windows operating system first, then install each newer version in order because every new Windows version preserves backward compatibility for starting earlier Windows versions. Incorrect Answers: Do not change the file system on the second partition: If one does not change the file system then one will not be able to install Windows Vista on the computer. You need to either convert the file system to NTFS or format the partition with NTFS to accommodate the installation of Windows Vista. Create two partitions in the extended partition: This would be superfluous since there are already two partitions and you would not require more partitioning. First install Windows Vista on the primary partition: This will not work since you need to install the older version of the Windows operating system first and then install the newer version. First install Windows XP Home on the second partition: This is not the correct method to dual booting the computer. You should begin with installing the Windows XP Home on the primary partition first. Question 9. DRAG DROP You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. There is currently only one workstation that has been installed with Microsoft Windows Vista Business Edition. This workstation is named ITCertKeys-WS622. You have received instructions from the ITCertKeys.com manager to install Microsoft Windows Vista Business Edition on all the new workstations that has just been purchased. These new workstations must have the same build of Microsoft Windows Vista Business Edition as that deployed on ITCertKeys-WS622. You want to complete your task with the least amount of administrative effort. To this end you need to create an image of ITCertKeys-WS622 to deploy to the new workstations. Thus you take the bootable Windows PE CD that includes all the required deployment tools. What should you do next? (Choose the correct options in the column on the left and place them in the correct order of execution in the work area on the right.) Answer: Explanation: the correct plan of action would be as follows: 1. Use Sysprep to seal the master. Sysprep prepares an installed OS to be created into a deployable image by removing some computer specific information such as the workstation's Security Identifier (SID), which must be unique. 2. Boot the master with the Windows PE CD. Windows PE is a bootable OS that has many tools that can be used for creating and deploying images. Tools such as ImageX and Diskpart are run from Windows PE. 3. Use ImageX on the master to create the image file. ImageX is the Windows PE tool that is used to capture (and apply) OS images. 4. Boot the target with the Windows PE CD. 5. Use Diskpart to format the drive. Diskpart is a PE tool that is used to configure the hard drive on a PC. 6. Use ImageX to apply the image to the target. Question 10. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All the ITCertKeys.com workstations run Microsoft Windows 2000 Professional. You are responsible for the installation of operating systems on the ITCertKeys.com computers. You want to make use of the Microsoft Windows Vista DVD to perform a clean installation on the ITCertKeys.com workstations. To this end you place the DVD into the drive and start the first workstation only to find that it boots straight to Windows 2000 without starting the install of Microsoft Windows Vista. You have run checks on the BIOS of the workstations and to boot from DVD-ROM is not allowed, though you need to perform a clean install. What should you do? A. You should install new hard drives on these workstations. B. The BIOS settings of these workstations should be changed to boot from the local hard drive. C. You should update all the workstations' BIOS. D. You should use the Windows Vista floppy boot disk. Answer: C Explanation: If you attempt to boot from the DVD ROM drive and it does not work, the first place to check is the computer BIOS. Alternatively, (though not mentioned as an option to choose from) you can also start the computer with a network boot floppy disk or PXE and connect to the installation files on the DVD or over the network. Incorrect options: A: You should not install a new hard drive. Installing a new hard drive will not solve this problem because the Windows Vista setup files on the DVD still needs to be accessed to allow for this install. B: You should not change the BIOS settings to boot from the local hard drive. Changing the BIOS settings to boot from the local hard drive will only boot to the installed operating system. D: You cannot use the Windows Vista Setup floppy boot disk. Windows Vista does not come with a Setup floppy boot disk.
|
Question 1. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been assigned to the ITCertKeys.com help desk to aid all the ITCertKeys.com users who experience problems with their workstations. There are both desktop and laptop workstations in operation at ITCertKeys.com. Amy Wilson works as the Marketing manager at ITCertKeys.com. You have received instruction from the CIO to verify whether the workstation of Amy Wilson can obtain the most recent operating system updates. What should you do? A. To check whether your operating system can obtain the latest updates you need to run Microsoft Windows Vista Upgrade Advisor. B. To check you need to validate your Windows installation from the Microsoft Windows Genuine Advantage Web page. C. You have to make sure that your workstation has a Microsoft Windows Experience Index base score above 3.0. D. Windows Defender should be configured to detect updates before scanning. Answer: B Question 2. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been assigned to the ITCertKeys.com help desk to aid all the ITCertKeys.com users who experience problems with their workstations. The administrator instructs you to execute a clean installation of Microsoft Windows Vista on the first partition. Thereafter, you need to install Microsoft Windows XP Professional on the second partition of the same machine. A senior support technician informs you that he is able to log on to Windows XP Professional. However, he does not have the option to boot to Windows Vista. You need to ensure that you are able to dual boot the computer. What should you do? A. To achieve this you should edit the boot.ini file. Then you should the subsequent line: Multi(0)Disk(O)Rdisk(0)Partition(1)\Microsoft Windows B. You need to run the bootcfg.exe application with the /fastdetect option in order to dual boot computer. C. To ensure that you are able to dual boot the computer you should perform a clean installation of Windows Vista on the first partition. D. The msconfig.exe application should be run and the order of the operating systems in the boot.ini file should be changed. Answer: C Question 3. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been assigned to the ITCertKeys.com help desk to aid all the ITCertKeys.com users who experience trouble with their computers. A ITCertKeys.com employee named Andy Booth works as the accountant in the Finance department. Andy Booth uses a client computer named ITCertKeys-WS621. ITCertKeys-WS621 has the following hardware configuration: 1. 512 MB of RAM 2. 10-GB hard disk 3. 933-MHz processor 4. 64-MB video adapter. You have received instruction from the CIO to install Microsoft Windows Vista on ITCertKeys-WS621. The CIO also requests that you determine which hardware component fails to meet the minimum hardware requirements. Identify the hardware component you should choose? A. The processor will fail to meet the minimum hardware requirements. B. You should choose the hard disk since it will fail to meet the minimum hardware requirements. C. The video adapter will fail to meet the minimum hardware requirements. D. You need to choose the memory since it will fail to meet the minimum hardware requirements Answer: B Question 4. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been assigned to the ITCertKeys.com help desk to aid all the ITCertKeys.com users who experience problems with their workstations. ITCertKeys-WS622 is configured to run Microsoft Windows XP Professional. ITCertKeys-WS622 also runs 20 third-party applications. You receive a memo from management informing you of their plans to upgrade ITCertKeys-WS622 to Microsoft Windows Vista. The functionality of the existing 20 applications must be maintained after you upgrade your computer. The administrator asks you to determine whether the hardware and software on ITCertKeys-WS622 will support the upgrade. What should you do? A. You need to run the Microsoft Windows Vista Upgrade Advisor application in order to check whether the hardware and software will support the upgrade. B. To check whether the hardware and software will support the upgrade you need to run the mbsacli.exe command. C. The Microsoft Windows XP Professional system hardware needs to be compared to the Microsoft Windows Vista Hardware Compatibility List (HCL). D. To check if the hardware and software will support the upgrade you need to run the winnt32.exe /checkupgradeonly command. Answer: A Question 5. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains two workstations named ITCertKeys-WS620 and ITCertKeys-WS622. ITCertKeys-WS620 is configured to run Microsoft Windows XP Media Center Edition. ITCertKeys-WS622 is joined to a domain and is configured to run Microsoft Windows XP Professional. You have received instruction from the CIO to upgrade both computers to Microsoft Windows Vista. You need to accomplish this goal while keeping the existing information, functionality and applications. What actions should you perform? (Choose all that apply) A. To achieve this goal you need to upgrade ITCertKeys-WS622 to Microsoft Windows Vista Business Edition. B. This goal can be accomplished if you upgrade ITCertKeys-WS620 to Microsoft Windows Vista Business Edition. C. In order to keep the existing data, functionality and applications you should upgrade ITCertKeys-WS622 to Microsoft Windows Vista Home Premium Edition. D. In order to keep the existing data, functionality and applications ITCertKeys-WS620 should be upgraded to Microsoft Windows Vista Home Premium Edition. Answer: A, D Question 6. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. The workstations on the ITCertKeys.com network are all configured to run Windows XP. You receive a memo to upgrade the workstations to Windows Vista. You make use of Windows Update Agent to download the new updates. You notice that the update files are corrupted. You receive instruction from the CIO to force Windows Update Agent to download the entire update again. What actions should you take? A. The first step should be to stop the Windows Update service and rename the C:\Program Files\WindowsUpdate folder. Thereafter you can restart the Windows Update service. B. To accomplish this you should run the wuauclt.exe /detectnow command. C. To download the entire update again you should stop the Windows Update service. You then rename the %systemroot%\SoftwareDistribution folder. Thereafter you can restart the Windows Update service. D. To download the entire update again you run the wuauclt.exe /resetauthorization /detectnow command. Answer: C Question 7. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have received instruction from the CIO to deploy Windows Vista on a computer by making use of a DVD. The DVD contains Windows Preinstallation Environment (WinPE) stored in winpe.wim, Imagex.exe. The DVD also contains a custom Windows Vista image stored in vista.wim. You need to apply the custom Windows Vista image to the computer. Identify the command you should use? A. You should make use of the imagex /append c: D:\vista.wim "Drive D" command. B. You should make use of the imagex /apply D:\vista.wim 1 C:\ command C. You should make use of the imagex /export D:\winpe.wim 1 C:\vista.wim "Image" command. D. You should make use of the imagex /apply D:\winpe.wim 1 C:\ command. Answer: B Question 8. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. Your duties include administering the ITCertKeys.com network. The client computers of ITCertKeys.com are all configured to run Microsoft Windows Vista. A ITCertKeys.com employee named Andy Reid reports that he is unable to install an application. You have received instruction from the CIO to install the application. What should you do? A. To be able to install the application you need to copy the contents of the CD-ROM to the local hard disk. Thereafter you will be able to run the application installation from the local hard disk. B. While Andy Reid is logged on you need to click Continue and install the application at the consent prompt. C. While Andy Reid is logged on at the credential prompt you have to provide him with administrative credentials. D. A .pwl file should be created that will store administrative credentials. Thereafter you can double-click the installation file. Answer: C Question 9. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. You have been assigned to the ITCertKeys.com help desk to aid all the ITCertKeys.com users who experience problems with their workstations. The workstations of ITCertKeys.com are all configured to run Windows Vista. A ITCertKeys.com user named Andy Booth contacted the Help desk to report some problems that prevent him from carrying out his duties. He informs you that an error message is received when he attempts to start Windows. You discover that his workstation automatically downloads and installs a critical patch for the vulnerability in a system DLL file. You have received instruction from the CIO to restore the workstation of Andy Booth to a bootable state without installing the earlier update files. You need to accomplish this by using the least amount of administrative effort. How can you restore the workstation to a bootable state? A. The first step will be to execute a system restore from the Windows Vista installation DVD. B. You have to access the recovery console. Thereafter you should run fixmbr c: C. This can be accomplished by accessing the recovery console from the Windows Vista installation DVD and extracting the original system DLL file. Thereafter you can overwrite the faulty file. D. You should restart the workstation in safe mode. Thereafter you can restore the original system DLL file. Answer: A Question 10. You work as the desktop support technician at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. All the computers on the ITCertKeys.com network are configured to run Windows XP. These computers are all upgraded to Windows Vista. New updates are downloaded by making use of the Windows Update Agent. You discover that the update files are corrupted. You have received instruction from the CIO to force Windows Update Agent to download the entire update again. What should you do? A. You need to run the wuauclt.exe /resetauthorization /detectnow command. B. The wuauclt.exe /detectnow command should be run to accomplish this. C. You need to stop the Windows Update service and rename the %systemroot%\SoftwareDistribution folder. Thereafter you need to restart the Windows Update service. D. The Windows Update service should be stopped. Then you rename the C:\Program Files\WindowsUpdate folder. Thereafter you restart the Windows Update service. Answer: C
|
Question 1. ITCertKeys.com has an IPv6 network which has 25 segments. As an administrator, you deploy a server on IPv6 network. What should you do to make sure that the server can communicate with systems on all segments of the IPv6 network? A. Configure the IPv6 address on the server as 0000::2c0:d11f:fec8:3124/64 B. Configure the IPv6 address on the server as ff80::2c0:d11f:fec8:3124/64 C. Configure the IPv6 address on the server as fe80::2c0:d11f:fec8:3124/64 D. Configure the IPv6 address on the server as fd00:: 2c0:d11f:fec8:3124/8. Answer: D Question 2. You are a network administrator at ITCertKeys.com. You have upgraded all servers in the company to Windows Server 2008. ITCertKeys.com wants you to configure IPv6 addresses on all computers in the network. A global address prefix is assigned to you. The prefix is 3FFA:FF2B:4D:B000::/41. ITCertKeys.com has four departments. You have to assign a subnet to each department. In this way, which subnetted address prefix will you assign to the fourth department? A. 3FFA:FF2B:4D:C800::/43 B. 3FFA:FF2B:4D:B400::/43 C. 3FFA:FF2B:4D:C000::/43 D. 3FFA:FF2B:4D:F000::/45 E. None of the above Answer: A Explanation The option 3FFA:FF2B:4D: C800::/43 is correct. The subnetting in IPv6 is performed by determining the number of bits used for subnetting and the itemization of the new subnetted address prefixes. Usually the number of bits for subnetting is s, where 2^s = number of subnets to be created. In this scenario 2^s = 4 and therefore s=2. Then the itemizations of the new subnetted address prefixes are done. In this scenario, the correct subnetted address prefix is 3FFA:FF2B:4D:C800::/43. So option A is the correct answer. Question 3. Exhibit: ITCertKeys has decided to re-design its public network. The network will employ an IPv4 addressing. The range would be 129.108.10.0/21. The network must be configured in segments as shown in the exhibit. You have to configure the subnets for each segment in the network. You need to ensure that your solution must support all computers in each segment. Which network addresses should you assign to achieve this task? A. Segment A: 129.108.10.109/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.109/25 B. Segment A: 129.108.10.0/22, Segment B: 129.108.10.0/23, Segment C: 129.108.10.0/24, Segment D: 129.108.10.128/26 C. Segment A: 129.108.10.0/22, Segment B: 129.108.10.128/23, Segment C: 129.108.10.0/192, Segment D: 129.108.10.224/25 D. Segment A: 129.108.10.128/22, Segment B: 129.108.10.192/23, Segment C: 129.108.10.224/24, Segment D: 129.108.10.0/26 E. None of the above Answer: B Question 4. ITCertKeys network is configured to use Internet Protocol version (Ipv6). You installed a Dynamic Host Configuration Protocol (DHCP) server on a server named ITCertKeysDHCP1 running Windows 2008 server. You want to ensure that neither IP address nor other configuration settings are automatically allocated to DHCP clients on a subnet that does not use DHCPv6 from ITCertKeysDHCP1. How should you configure the Managed Address Configuration flag, and the other Stateful Configuration flag in the route advertisements? A. Set both Managed Address Configuration and Other Stateful Configuration flag to 0 B. Set both Managed Address Configuration and Other Stateful Configuration flag to 1 C. Set both Managed Address Configuration to 0 and Other Stateful Configuration flag to 1 D. Set both Managed Address Configuration to 1 and Other Stateful Configuration flag to Answer: A Explanation: This setting will ensure host will receive neither an IP address nor additional configuration information. Question 5. You have upgraded hardware of DNS servers in your network. You also added two new domain controllers to the domain. All client computers use DHCP. Users are not able to logon to domain after the upgrade of DNS servers. What should you do to ensure that users are able to log on to the domain? A. Restart the Netlogon service on the new DNS servers B. Run ipconfig/registerdns at the command prompt of new DNS servers C. Reconfigure the DHCP scope option 006 DNS name Servers with the new DNS servers IP addresses D. Configure the network settings for workstations to Disable NetBIOS over TCP/IP E. None of the above Answer: C Explanation: To ensure that the users are able to log on to the domain, you should reconfigure the DHCP scope option 006 DNS name Server with the new DNS servers IP addresses. Question 6. Exhibit: ITCertKeys company network consists of Windows 2008 server computers and Windows Vista client computers. You have the following eight Internet Protocol version 6 (Ipv6) sub netted address prefixes. Please refer to the exhibit. What would be the original prefix length for the global address prefix 3FFE:FFFF:0:C000:: ? A. 51 B. 52 C. 53 D. 54 E. None of the above Answer: A Explanation: The original prefix length for the globe address prefix 3FFE:FFFF:0:C000:: is 51. The eight Ipv6 subnetted address prefixes are the result of 3 bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51. To perform 3-bit subnetting of the global address prefix 3FFE:FFFF:0:C000::/51 we use the following calculations: Hexadecimal value of the subnet ID being subnetted, F = oxC000 Subnetting bits, s = 3 Question 7. ITCertKeys Company has IPV6 network. The IPV6 network has 25 segments. You deployed a new Windows 2008 server on the IPV6 network. What should you do to ensure that the server could communicate with systems on all segments of the IPV6 network? A. Configure the IPV6 address as fd00::2b0:d0ff:fee9:4143/8 B. Configure the IPV6 address as fe80::2b0: d0ff:fee9:4143/64 C. Configure the IPV6 address as ff80::2b0: d0ff:fee9:4143/64 D. Configure the IPV6 address as 0000::2b0: d0ff:fee9:4143/64 E. None of the above Answer: A Explanation: To ensure that the server communicates with systems on all segments of the IPV6 network, you need to configure the IPV6 address as fd00::2b0:d0ff:fee9:4143 /8 because this address is the local unicast address type and is not routed on the Internet. It is generally filtered inbound. Reference: IPv6 Unicast Address Information http://www.netcraftsmen.net/welcher/papers/ipv6part02.html Question 8. You are an administrator at ITCertKeys.com. ITCertKeys.com has opened a new Branch office at a new location. Windows Server 2008 is implemented on the servers. The initial network has 20 computers. You are asked to configure an appropriate IP addressing scheme in the network. Which network address should you use to accomplish this task? A. 192.10.100.0/26 B. 192.10.100.0/30 C. 192.10.100.0/29 D. 192.10.100.0./31 E. None of the above Answer: A Explanation To configure an appropriate IP addressing scheme in the network, you should use 192.10.100.0/57. In this scenario, 50 computers have to be configured in a network. Network address is calculated as follows: 1. Class A networks has a default subnet mask of 255.0.0.0 and use 0-127 as their first octet 2. Class B networks has a default subnet mask of 255.255.0.0 and it can use 128-191 as their first octet 3. Class C networks has a default subnet mask of 255.255.255.0 and it can 192-223 as their first octet You need to configure the network address to accommodate at least 50 hosts per subnet. To calculate the number of host bits, use the formula: 2^n-2 where n=32 bits. To configure 50 hosts, you need 192.10.100/26 network address which has maximum 62 hosts per subnet. The formula to calculate the hosts per subnet is: 32-26= 6 2^6-2= 62 So according to this calculation, network address 192.10.100/26 will be able to accommodate 50 hosts per subnet. We have deducted 6 bits from the total of 32 bits. Question 9. You are an enterprise administrator for ITCertKeys. The corporate network of the company consists of servers that run Windows Server 2008 and client computers that run Windows XP Service Pack 2 (SP2), Windows 2000 Professional, or Windows Vista. The company has decided to use IPv6 protocol on its network. Which of the following options would you choose to ensure that all client computers can use the IPv6 protocol? A. Run the IPv6.exe tool on all the client computers. B. Upgrade the Windows 2000 Professional computers to Windows XP SP2. C. Upgrade all Windows 2000 Professional computers with Service Pack 4. D. Install the Active Directory Client extension (DSClient.exe) on all the client computers. Answer: B Explanation: To ensure that all computers can use the IPv6 protocol, you need to upgrade the Windows 2000 Professional computers to Windows XP SP2. IPv6 protocol is far superior to IPv4 protocol in terms of security, complexity, and quality of service (QoS). Therefore, all the new operating systems started using IPv6 protocol. The older operating systems such as Windows 2000 professional does not support Ipv6 therefore this needs to be upgraded to either Windows XP or Windows Vista. You can now get versions of Windows that fully support most aspects of IPv6 (namely Windows XP and Windows Server 2003) and you will soon be able to get versions of Windows that not only fully support IPv6 but also provide enhanced performance for IPv6 networking. Reference: IPv6 Support in Microsoft Windows/ Windows 2000 http://www.windowsnetworking.com/articles_tutorials/IPv6-Support-Microsoft-Windows.html Question 10. You are an enterprise administrator for ITCertKeys. The company consists of a head office and two Branch offices. The corporate network of ITCertKeys consists of a single Active Directory domain called ITCertKeys.com. The computers in the Branch office locations use IPv4 and IPv6 protocols. Each Branch office is protected by a firewall that performs symmetric NAT. Which of the following options would you choose to allow peer-to-peer communication between all Branch offices? A. Configure the use of Teredo in the firewall. B. Configure the external interface of the firewall with a global IPv6 address. C. Configure the internal interface of the firewall with a link local IPv6 address. D. Configure dynamic NAT on the firewall. Answer: A Explanation: To allow peer-to-peer communication between all Branch offices where each location is protected by a firewall that performs symmetric NAT, you need to configure the firewall to allow the use of Teredo. Teredo is an IPv6 transition technology that provides address assignment and host-to-host automatic tunneling for unicast IPv6 traffic when IPv6/IPv4 hosts are located behind one or multiple IPv4 network address translators (NATs). Teredo in Windows Vista and Windows Server "Longhorn" will work if one of the peers is behind a symmetric NAT and the other is behind a cone or restricted NAT. Reference: Teredo Overview http://technet.microsoft.com/en-us/liBRary/bb457011(TechNet.10).aspx
|
Question 1. ITCertKeys.com has a domain with Active Directory running on it. Windows Server 2008 is installed on all the servers. You plan to deploy an image to 50 computers with no operating system installed. For this you install Microsoft Windows Deployment Services on the network. When you install the image on a test computer, a driver error shows up on the screen. What would you do to change the image to include the correct driver? A. Configure and map the image file to the installation folder which hosts the correct driver B. Take the image file and mount it. Using the System Image Manager (SIM) utility, change the image file C. Open WDS server and update the driver through Device Manager D. Take the image file and mount it. Run the sysprep utility to get the correct driver E. None of the above Answer: B Explanation: To include the correct driver, you should mount the image file and change it using System Image Manager (SIM). You need to include the correct driver in the image file so it will install with all the correct drivers. You should not configure and map the image file to the installation folder hosting the correct driver because the image file is deployed in full. Windows Server 200 will not consider the contents of the folder where image file resides. It will deploy the image file only with all its content You cannot update the driver through Device Manager on WDS server. It has nothing to do with the image file. You cannot mount the image file and run sysprep utility. Sysprep utility cannot get the correct driver for you and change the image file. Sysprep utility is related to WDS server and the deployment of images to the client computers. Question 2. ITCertKeys.com has a server that runs Windows Server 2008. As an administrator at ITCertKeys.com, you install Microsoft Windows Deployment Service (WDS). While testing an image, you find out that the image is outdated. What should you do to remove the image from the server? A. Open the command prompt at WDS server and execute WDSUTIL/Remove-Image and /ImageType:install options B. Open the command prompt at WDS server and execute theWDSUTIL command with/Export- Image and /ImageType: install options C. Open the command prompt at WDS server and execute theWDSUTIL with /Export-Image and /ImageType: boot options D. Open the command promt at WDS server and execute theWDSUTIL command with /Remove- Image and /ImageType:boot options E. All of the above Answer: A Explanation: To remove the image from the server, you should execute WDSUTIL/remove-image on the command prompt at WDS server. Then execute WDSUTIL/image-type:install command and install the new image. The WDSUTIL is a command specific to modify and view the images at WDS server. You need to remove the image and then install the updated one using these commands. You cannot use the export-image parameter with WDSUTIL in this scenario. You have to remove the image not to export it to a folder. You should not use the /image-type:boot parameter because you need to install a fresh image. You don't need to boot the service for this. Question 3. ITCertKeys.com has four branch offices. To deploy the images, you install Microsoft Windows Deployment Services (WDS) on the network. ITCertKeys.com creates 4 images for each branch office. There are a total of 16 images for ITCertKeys.com. You deploy these images through WDS. A problem occurs in one branch office where the administrator reports that when he boots the WDS client computer, some of the images for his regional office does not show up in the boot menu. What should you do to ensure that every administrator can view all the images for his branch office? A. Create separate image group for each branch office on the WDS server B. Create unique organizational unit for each branch office and create profiles for each computer in the branch office C. Organize a global group for each branch office and create profiles of each computer in a branch office D. Create a Global Unique Identifier for each computer to recognize its branch office and connect it to the WDS server E. None of the above Answer: A Explanation: To ensure that every administrator can view all the images for his branch office, you should create separate image group for each branch office on WDS server. A separate image will enable all the administrators to view each image from their machine in the branch office. You should not create an OU for each branch office. There is no logic in creating an OU for each branch office and profiles for each computer in the branch office. You should not organize a global group for each branch office. A global group can host all the branch offices of ITCertKeys.com Question 4. Microsoft Windows Deployment Services (WDS) is running on a Windows 2008 server. When you try to upload spanned image files onto WDS server, you received an error message. What should you do to ensure that image files could be uploaded? A. Combine the spanned image files into a single WIM file B. Grant the Authenticated Users group Full Control on the \REMINST directory C. Run the WDSutil/Convert command from command line on the WDS server D. Run the WDSutil/add-image/imagefile:\\server\share\sources\install.wim/image type: install command for each component file individually at the command line on WDS server E. None of the above Answer: A Explanation: When you try to upload spanned image files onto WDS server, you received an error message because you can only mount a single WIM file once for read/write access and therefore you need to combine the spanned image files into a single WIM file to correct the problem. Reference: The Desktop Files The Power User's Guide to WIM and ImageX / Using /mount, /mountrw, and /delete http://technet.microsoft.com/en-us/magazine/cc137794.aspx Question 5. ITCertKeys.com has upgraded all servers in its network to Windows Server 2008. ITCertKeys.com also directed you to install Windows Vista on all client machines. You install Windows Vista on client machines and Windows Server 2008 on the servers. You use Multiple Activation Key (MAK) to activate the new operating systems on the network. You use proxy activation over the internet using Volume Activation Management Tool (VAMT). The Windows Vista on client computers were successfully activated using this method but the Windows Server 2008 failed to activate using VAMT. What should you do to ensure that the Windows Server 2008 is activated on all the servers? A. Contact Microsoft Support Center and activate the Windows server 2008 over the phone B. Upgrade VAMT using Windows Server 2008 RTM for VAMT to function with Windows Server 2008 Volume Licensing C. Upgrade VAMT using Key Management Service (KMS) for Windows Server 2008 RTM to function with Windows Server 2008 Volume Licensing D. Contact Microsoft Support Center and activate Windows Server 2008 over the internet using MAK only E. All of the above Answer: B Explanation: To ensure that the Windows Server 2008 is activated on all the servers, you should upgrade VAMT using Windows Server 2008 RTM for VAMT. You have to update VAMT at Windows Server 2008 RTM for VAMT to function with Windows Server 2008 volume licensing. VAMT (Volume Activation Management Tool) is a volume licensing tool for all flavors of Windows Vista. There are various activation methods available for volume licensing. These methods use two types of customer specific keys: Multiple Activation Key (MAK) and Key Management Service (KMS). The VAMT tool is used to activate the license through proxy over internet. VAMT is a tool for Windows Vista and to use it for Windows Server 2008, it needs an update. Question 6. ITCertKeys.com has added 5 servers to its network. As an administrator at ITCertKeys.com, you install Windows Server 2008 Enterprise edition on two servers and Windows Server 2008 storage server enterprise on other two servers. You want to automatically activate both editions of Windows Server 2008 without any administrator or Microsoft intervention. You also want the activation to occur every 6months. Which volume activation service should you use to automatically activate both editions of Windows Server 2008? A. Multiple Activation Key(MAK) B. Volume Activation Management Tool (VAMT) C. Volume Activation 1.0 (VA 1.0) D. Key Management Service (KMS) E. None of the above Answer: D Explanation: You should use KMS to activate both editions of Windows Server 2008. KMS automatically activates Windows Vista and Windows Server 2008. Computers that are been activated by KMS are required to reactivate by connecting to a KMS host at least once every six months. The VL editions of Windows Serve 2008 and Windows Vista are installed as KMS clients by default. The clients can automatically discover the KMS hosts on the network with a properly configured KMS infrastructure. The clients can also activate using KMS infrastructure without administrative or user intervention. Question 7. ITCertKeys has main office and a Branch office. Main office is running 20 Windows Server 2008 computers and 125 computers running Microsoft Windows XP Professional. Branch office is running 3 Windows Server 2008 computers and 50 Windows XP Professional computers running on its network. Computers in the main office have access to Internet. All servers are having the same security configuration and there are no plans in near future to add new servers or systems in the network. You installed Volume Activation Management Tool (VAMT) on a server named ITCertKeys_DC1 in the main office and added all servers to VMAT server and configured the servers for Multiple Activation Key (MAK) independent activation. Servers at Branch office are unable to activate Windows Server 2008. What should you do to activate Windows server 2008 on all servers? A. Install a Management Activation Key (MAK) server on the network B. Configure MAK Proxy activation on all servers in the Branch office C. Configure Windows Management Instrumentation (WMI) Firewall Exception on all servers in the Branch office D. Open VAMT on ITCertKeys_DC1 and export the Computer Information List (CIL). Send this file to Microsoft Technical support for activation E. None of the above Answer: B Explanation: To activate Windows server 2008 on all servers, you need to configure MAK Proxy activation on all servers in the BRanch office. The MAK can be activated by using two methods, MAK Independent Activation and MAK Proxy Activation. MAK Independent Activation is used when each computer is activated individually by connecting to Microsoft servers over the Internet or by telephone and MAK Proxy Activation is used when Volume Activation Management Tool (VAMT) is installed on a server and you need to activate multiple computers at the same time through a single connection to Microsoft servers over the Internet or phone. Therefore, instead of MAK Independent Activation you need to use MAK Proxy activation on all servers in the BRanch office. Reference: Frequently Asked Questions About Volume License Keys for Windows Vista and Windows Server 2008 http://www.microsoft.com/licensing/resources/vol/ActivationFAQ/default.mspx Question 8. You are network administrator for ITCertKeys network. You configured a Windows server 2008 server named ITCertKeys_KM1 as Key Management Service (KMS) host. This server is also configured as Windows Sharepoint Services server. This location has currently 18 computers having Windows Vista KMS client and you have added 10 more Windows Vista KMS client systems in the network recently. These 10 additional client computers are installed using Windows Vista image file. The KMS host is unable to activate any of the KMS client computers in the network. What should you do? A. Install KMS on a dedicated Windows Sever 2008 B. Run Sysprep /generalize on the Vista reference computer used to create image C. Run slmgr.vbs/rearm Vista reference computer used to create image D. Run slmgr.vbs/dli on the KMS host computer E. Run slmgr.vbs/cpri on the KMS host computer F. None of the above Answer: B Explanation: To activate the KMS client computers in the network, you need to run the Sysprep /generalize on the Vista reference computer used to create image. sysprep/generalize is used to reset activation and other system-specific information as the last step before storing or capturing the VM image. If sysprep /generalize is not used, the activation timer will run down while the product is in storage and the KMS host will be unable to activate any of the KMS client computers in the network. Reference: KMS host is unable to activate any of the KMS client computers in the network http://blog.windowsvirtualization.com/virtualization/faq-virtalization-and-volume-activation-20 Question 9. ITCertKeys.com has a server with single Active Directory domain. For security, ITCertKeys.com has an ISA 2006 server functioning as a firewall. You configure user access through virtual private network service by deploying the PPTP (Point-to-Point Tunneling Protocol). When a user connects to the VPN service, an error occurs. The error message says "Error 721: The remote computer is not responding." What should you do to ensure that the users connect to the VPN service? A. Open the port 2200 on the firewall B. Open the port 1423 on the firewall C. Open the port 1723 on the firewall D. Open the port 721 on the firewall E. All of the above Answer: C Explanation: To ensure that users connect to VPN service, you should open the port 1723 on the firewall. The port 1723 is a TCP port for PPTP tunnel maintenance traffic. For VPN connections, you need to open this port for PPTP tunnel maintenance traffic and permit IP Type 47 Generic Routing Encapsulation (GRE) packets for PPTP tunnel data to pass to your RRAS server's IP address. You cannot open port 721. The port 721 on the firewall is a printer port so it is not related to VPN connection Question 10. DRAG DROP ITCertKeys has a server named ITK1 that runs Windows Server 2008 and Microsoft Virtual Server 2005 R2. You want to create eight virtual servers that run Windows Server 2008 and configure the virtual servers as an Active Directory forest for testing purposes in the ITCertKeys Lab. You discover that ITK1 has only 30 GB of hard disk space that is free. You need to install the eight new virtual servers on ITK1 . From the steps shown, what steps need to be completed in a specific order? Answer: Explanation: To install the eight new servers on ITK1, you need to create a virtual server with a 10 GB fixed-size virtual hard disk and then install Windows Server 2008. After that, you should create eight differencing virtual hard disks and then create eight virtual servers with a differencing virtual hard disk attached. The virtual hard disk should be created first because you need space for eight virtual servers. The fixed-size virtual hard disk can be created through a virtual server. Then you install Windows Server 2008 on it. After that you have to allocate the space for eight virtual servers. To do that, you create differencing virtual hard disk to solve the space problem. Then you create the eight virtual servers with differencing virtual hard disk attached
|
Question 1. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The company network consists of an internal LAN and a perimeter network. The two networks are separated by an internal corporate firewall. An external corporate firewall connects the perimeter network to the Internet. The network includes virtual machines (VMs) running on host servers contained in both the internal network and the perimeter network. You have recently installed a server named ABC-VMM1 on the internal network. ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage the virtual environment. You are now in the process of deploying VMM agents on the host servers. You have configured the port number for the VMM agents and configured the internal corporate firewall to allow communications on the appropriate port number. What else do you need to configure to ensure that the VMM agents can communicate with ABCVMM1? A. You need to configure the name of the VMM server (ABC-VMM1). B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller. C. You need to configure the name of a SQL Server. D. You need to configure an encryption key. Answer: D Explanation: Question 2. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The company network consists of two subnets. The Development subnet is used by the Development department. The Production subnet is used by all other company departments. You install a Windows Server 2008 R2 Hyper-V server named ABC-VMHost1 in the Production subnet. ABC-VMHost1 contains two network interface cards named NIC1 and NIC2. You have configured NIC1 as a management interface. You want to configure ABC-VMHost1 to host virtual machines on both the Production subnet and the Development subnet. How should you configure ABC-VMHost1? A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode. B. You should assign NIC2 as an additional management interface. C. You should configure both adapters to support jumbo frames. D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2 with an IP address in the Development subnet. Answer: A Explanation: Question 3. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and is used to manage the company’s virtual environment. The company includes a Development department. Users in the Development department use their computers to develop and test software applications for use by other company departments and customers. You install a Windows Server 2008 R2 Hyper-V server named ABC-VMTest1 in the Development department. ABC-VMTest1 will host virtual machines (VMs) for the Development department users to use to test their applications. You need to ensure that the VMs are completely isolated from production servers. How can you ensure that the test VMs can communicate with each other while being isolated from the host server and the rest of the network? A. By configuring the VMs to connect to a Dedicated virtual network. B. By configuring the VMs to connect to an Internal virtual network. C. By configuring the VMs to connect to a Local virtual network. D. By configuring the VMs to connect to a Private virtual network. Answer: D Explanation: Question 4. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. You are configuring a virtual environment for the company. You have an iSCSI storage disk array that will be used to store virtual machines (VMs). You install a server named ABC-Host1 that runs a Server Core Installation of Windows Server 2008 R2. You need to configure ABC-Host1 to store to VMs on the iSCSI disk array. Which two of the following tools could you use? A. You could use Disk Management. B. You could use Diskpart.exe. C. You could use iSCSICLI.exe. D. You could use iSCSICPL.exe. Answer: C, D Explanation: Question 5. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. The company network consists of an internal LAN and a perimeter network. To comply with company security policy, servers located in the perimeter network are not members of the ABC.com domain. A Microsoft Hyper-V Server 2008 R2 server named ABC-VMHost1 is located in the perimeter network. You relocate ABC-VMHost1 into the internal network. You now need to join ABC-VMHost1 to the ABC.com AD DS domain. How should you join ABC-VMHost1 to the ABC.com domain? A. You should use the System Properties control panel applet. B. You should use the Netsh command line utility. C. You should use the Hyper-V configuration utility (hvconfig). D. You should use the dcpromo utility. Answer: D Explanation: Question 6. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. You have installed a Server Core Installation of Windows Server 2008 R2 on a server named ABC-SRV1. You use a Windows 7 Professional client computer named ABC-Admin1. You want to be able to manage the storage on ABC-SRV1 using the Disk Management tool on ABC-Admin1. You need to configure the firewall on ABC-SRV1 by creating a rule group using the Netsh advfirewall command. Which rule group should you create to enable you to remotely manage the storage on ABCSRV1? A. You should create a “Remote Administration” rule group. B. You should create a “Remote Desktop” rule group. C. You should create a “Remote Volume Management” rule group. D. You should create a “Remote Access” rule group. Answer: C Explanation: Question 7. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. You are installing a new virtual environment based on Microsoft Hyper-V. You have installed a Server Core Installation of Windows Server 2008 R2 on a server named ABC-VMHost1. How would you add the Hyper-V role to ABC-VMHost1? A. By running the Add Roles Wizard in Server Manager. B. By running the start /w hvconfig command. C. By running the start /w ocsetup Microsoft-Hyper-V. D. By running the start-service Hyper-V command. Answer: C Explanation: Question 8. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. You are installing a large virtual environment for the company. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage the entire virtual environment. You have installed a Server Core Installation of Windows Server 2008 R2 Datacenter edition on 50 new servers. What is the easiest way to install the Hyper-V role on the 50 new servers? A. By running the Add Hosts Wizard on ABC-VMM1 and selecting a new server to add to VMM. Repeat the process for each new server. B. By running the start /w ocsetup Microsoft-Hyper-V command on each new server. C. By running the Add Hosts Wizard on ABC-VMM1 and selecting all 50 servers to add to VMM. D. By running the ocsetup MultiPathIo command on ABC-VMM1. Answer: C Explanation: Question 9. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain. You are configuring a virtual environment for the company. You have an iSCSI storage disk array that will be used to store virtual machines (VMs). You install a server named ABC-Host1 that runs a Server Core Installation of Windows Server 2008 R2 then install PowerShell 2.0 and the Hyper-V role. You need to start the Microsoft iSCSI Initiator Service on ABC-Host1 to enable the server to connect to the iSCSI storage disk array. How should you start the Microsoft iSCSI Initiator Service on ABC-Host1? A. You should run the start /w ocsetup msiscsi command. B. You should launch PowerShell and run the start-service msiscsi cmdlet. C. You should launch PowerShell and run the set-service msiscsi CstartupType auto cmdlet. D. You should run the net start msiscsi command. Answer: B Explanation: Question 10. You work as a Network Administrator at ABC.com. The network consists of a single Active Directory Domain Services (AD DS) domain named ABC.com. All servers run Windows Server 2008 R2 and all client computers Windows 7 Professional. The network includes virtual machines (VMs) running on VMware host servers and Hyper-V host servers. A server named ABC-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and is used to manage the entire virtual environment. Which virtual disk file system is supported by VMM when performing virtual-to-virtual (V2V) conversions of VMware virtual machines? A. VHDVVI B. VMFS C. NFS D. vmfsRawOutput Answer: B Explanation:
|
Question 1. You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional and Windows 7 Enterprise. The company is planning to roll out Windows 7 Enterprise throughout the network. Users that require legacy applications will be able to run them in Windows XP Mode virtual machines on their computers. You are conducting some testing with Windows XP Mode virtual machines (VMs). You have two Windows XP Mode VMs on your Windows 7 client computer. You want to configure the networking options for the two VMs so that they have network connectivity to each other but not to your host computer or the rest of the ABC.com network. How should you configure the VMs? A. You should navigate to the Networking node in the VM Settings and configure the network adapter to use the Internal Network option. B. You should navigate to the Networking node in the VM Settings and configure the network adapter to use the Shared Networking (NAT) option. C. You should navigate to the Networking node in the VM Settings and configure the network adapter to use the Bridge Mode option. D. You should configure the Bridge Connections option in the Network Adapter properties in Windows XP on each VM. Answer: A Explanation: Question 2. You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. The network includes a Windows Server 2008 R2 server named ABC-Deploy1. ABC-Deploy1 runs the IIS Server role and is part of the company’s Microsoft Enterprise Desktop Virtualization (MEDV) environment. Your Windows 7 client computer is named ABC-Tech1. The MED-V Management console is installed on ABC-Tech1. You are configuring the Microsoft Enterprise Desktop Virtualization (MED-V) environment to deploy MED-V virtual machines to several client computers. You have configured a MED-V image with the required applications. You run Sysprep on the image and upload it to ABC-Deploy1. Which two of the following steps will ensure that computer names following a specified naming convention are generated when the VMs are first run after the deployment? Choose two. A. In the Workspace settings, navigate to the VM Setup tab and configure the computer name pattern. B. In the Workspace settings, navigate to the Deployment tab and configure the computer name pattern. C. Add a Script Action to rename the computer. D. Run the Setup Manager Wizard and configure the computer name pattern. E. Add the computer names to Sysprep.inf. Answer: A, C Explanation: Question 3. You work as a desktop technician at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment. You need to configure a central image repository for client computers to download images from. You install a Windows Server 2008 R2 member server named ABC-Deploy1. You create a folder named MEDVImages on ABC-Deploy1. What should you do next on ABC-Deploy1? A. You should share the MEDVImages folder. B. You should install the IIS Server role and configure a virtual directory to point to the MEDVImages folder. C. You should install the FTP Server component of IIS and configure an FTP site to point to the MEDVImages folder. D. You should install an SSL Certificate. Answer: B Explanation: Question 4. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. ABC.com runs a Microsoft Enterprise Desktop Virtualization (MED-V) environment. A Windows Server 2008 R2 member server named ABC-Deploy1 is configured to run Microsoft Enterprise Desktop Virtualization (MED-V) Server and hosts the central MED-V image repository. You notice that the disk space on ABC-Deploy1 is running low due to the MEDVImages folder taking up a large amount of disk space. You open the MED-V Management Console and note that there are several versions of the MEDV Workspace virtual machines (VMs). How can you minimize the disk space used by the MEDVImages folder? A. By deselecting the “Workspace is persistent” option. B. By configuring the image update settings to keep a limited number of images. C. By configuring the image update settings to select the “Clients should use the Download manager when downloading the images” option. D. By manually deleting old image files. Answer: B Explanation: Question 5. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008. The client computers run a mix of Windows XP Professional and Windows 7 Enterprise. You are in the process of migrating the Windows XP Professional client computers to Windows 7 Enterprise. You need to design a solution to resolve application compatibility issues. You are planning a desktop virtualization solution that will run legacy applications on virtual machines (VMs) running Windows XP Professional. You want to deploy Windows Virtual PC 2007 and a virtual machine image to the client computers when they are migrated to Windows 7 Enterprise. How can you create a single installation package that includes both Windows Virtual PC 2007 and a virtual machine image? A. By using the Packaging Wizard from Microsoft Enterprise Desktop Virtualization (MED-V). B. By using Package Manager (pkrmgr.exe) from the Windows Automated Installation Kit (WAIK) tools. C. By using a template created using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. D. By using Windows System Image Manager from the Windows Automated Installation Kit (WAIK) tools. Answer: A Explanation: Question 6. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2. You have recently migrated 2000 client computers from Windows XP Professional to Windows 7 Enterprise and deployed Microsoft Enterprise Desktop Virtualization (MED-V) to resolve application compatibility issues. All client computers use a single MED-V Workspace. For performance reasons, company policy states that the hard drives of the client computers should not be indexed. You are planning to update the Workspace image. How can you minimize the network impact of the client computers downloading the updated image? A. By configuring the image update settings to select the “Clients should use the Trim Transfer when downloading the images” option. B. By compressing the folder on the deployment server that contains the images. C. By using the Pack option in MED-V to compress the images. D. By compressing the folder on the client computers that contains the virtual machine. Answer: C Explanation: Question 7. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. You have been asked to deploy a custom sales application named SalesApp to the client computers in the Sales department. However the custom application will only run on Windows XP Professional. You install Windows XP Mode on your Windows 7 computer. You plan to test the application in Windows XP Mode and deploy Windows XP Mode to the Sales department computers if your tests are successful. You install the application in the Windows XP Mode virtual machine. You click the start menu in the VM and successfully launch SalesApp. You attempt to start the application from your Windows 7 start menu but there is no shortcut to SalesApp. How can you ensure that Sales users will be able to start SalesApp from their Window 7 start menus? A. By copying the SalesApp application shortcut to the All Users profile in Windows 7. B. By copying the SalesApp application shortcut to the All Users profile in the Windows XP Mode virtual machine. C. By installing the Virtual PC Integration Components in the Windows XP Mode virtual machine. D. By installing the Virtual PC Integration Components in Windows 7. Answer: B Explanation: Question 8. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment. All client computers will use a single MED-V Workspace. The virtual machine (VM) image will be downloaded from a central image repository on a Windows Server 2008 R2 computer. How can you ensure that any changes made by users to the VM are maintained between sessions? A. By configuring the Allow – Write permission on the server folder containing the VM image. B. By configuring the Allow – Write permission on the VM image files on the client computers. C. By selecting the Workspace is revertible option in the MED-V Management Console. D. By selecting the Workspace is persistent option in the MED-V Management Console. Answer: D Explanation: Question 9. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. You are in the process of configuring a Microsoft Enterprise Desktop Virtualization (MED-V) environment. You want to install MED-V in a server cluster. You install MED-V on one server in the cluster. What should you do next? A. You should install Network Load Balancing (NLB) on all servers in the cluster. B. You should install the MED-V client on all servers in the cluster. C. You should install Cluster Administrator on all servers in the cluster. D. You copy the/Servers/ConfigurationServer folder from the installed node to a shared network folder. Answer: D Explanation: Question 10. You work as a network administrator at ABC.com. The ABC.com network consists of an Active Directory Domain Services domain named ABC.com. All servers on the network run Windows Server 2008 R2 and all client computers run Windows 7 Enterprise. ABC.com includes a Development department. Users in the Development department develop software applications for use by ABC.com customers. You have configured a Microsoft Enterprise Desktop Virtualization (MED-V) environment to provide the Developers with temporary test environments. The temporary MED-V Workspaces have expiry dates configured on them. How can you minimize the disk space used by obsolete MED-V Workspaces? A. By configuring the option to keep a limited number of old image versions on the Virtual Machine tab in the MED-V Management console. B. By configuring the Workspace Deletion options on the Deployment tab in the MED-V Management console. C. By selecting the Workspace is revertible option on the Virtual Machine tab in the MED-V Management console. D. By clearing the Enable Workspace option on the Deployment tab in the MED-V Management console. Answer: B Explanation:
|
Question 1. Given: 1. public class Threads2 implements Runnable { 2. 3. public void run() { 4. System.out.println("run."); 5. throw new RuntimeException("Problem"); 6. } 7. public static void main(String[] args) { 8. Thread t = new Thread(new Threads2()); 9. t.start(); 10. System.out.println("End of method."); 11. } 12. } Which two can be results? (Choose two.) A. java.lang.RuntimeException: Problem B. run java.lang.RuntimeException: Problem C. End of method. java.lang.RuntimeException: Problem D. End of method. run. java.lang.RuntimeException: Problem E. run java.lang.RuntimeException: Problem End of method. Answer: D, E Question 2. Which two statements are true? (Choose two.) A. It is possible for more than two threads to deadlock at once. B. The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state. C. Deadlocked threads release once their sleep() method's sleep duration has expired. D. Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly. E. It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly. F. If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield(). Answer: A, F Question 3. Given: 7. void waitForSignal() { 8. Object obj = new Object(); 9. synchronized (Thread.currentThread()) { 10. obj.wait(); 11. obj.notify(); 12. } 13. } Which statement is true? A. This code can throw an InterruptedException. B. This code can throw an IllegalMonitorStateException. C. This code can throw a TimeoutException after ten minutes. D. Reversing the order of obj.wait() and obj.notify() might cause this method to complete normally. E. A call to notify() or notifyAll() from another thread might cause this method to complete normally. F. This code does NOT compile unless "obj.wait()" is replaced with "((Thread) obj).wait()". Answer: B Question 4. Click the Exhibit button. What is the output if the main() method is run? A. 4 B. 5 C. 8 D. 9 E. Compilation fails. F. An exception is thrown at runtime. G. It is impossible to determine for certain. Answer: D Question 5. Given: 11. class PingPong2 { 12. synchronized void hit(long n) { 13. for(int i = 1; i < 3; i++) 14. System.out.print(n + "-" + i + " "); 15. } 16. } 17. public class Tester implements Runnable { 18. static PingPong2 pp2 = new PingPong2(); 19. public static void main(String[] args) { 20. new Thread(new Tester()).start(); 21. new Thread(new Tester()).start(); 22. } 23. public void run() { pp2.hit(Thread.currentThread().getId()); } 24. } Which statement is true? A. The output could be 5-1 6-1 6-2 5-2 B. The output could be 6-1 6-2 5-1 5-2 C. The output could be 6-1 5-2 6-2 5-1 D. The output could be 6-1 6-2 5-1 7-1 Answer: B Question 6. Given: 1. public class Threads4 { 2. public static void main (String[] args) { 3. new Threads4().go(); 4. } 5. public void go() { 6. Runnable r = new Runnable() { 7. public void run() { 8. System.out.print("foo"); 9. } 10. }; 11. Thread t = new Thread(r); 12. t.start(); 13. t.start(); 14. } 15. } What is the result? A. Compilation fails. B. An exception is thrown at runtime. C. The code executes normally and prints "foo". D. The code executes normally, but nothing is printed. Answer: B Question 7. Given: 11. public abstract class Shape { 12. private int x; 13. private int y; 14. public abstract void draw(); 15. public void setAnchor(int x, int y) { 16. this.x = x; 17. this.y = y; 18. } 19. } Which two classes use the Shape class correctly? (Choose two.) A. public class Circle implements Shape { private int radius; } B. public abstract class Circle extends Shape { private int radius; } C. public class Circle extends Shape { private int radius; public void draw(); } D. public abstract class Circle implements Shape { private int radius; public void draw(); } E. public class Circle extends Shape { private int radius; public void draw() {/* code here */} F. public abstract class Circle implements Shape { private int radius; public void draw() { /* code here */ } Answer: B, E Question 8. Given: 11. public class Barn { 12. public static void main(String[] args) { 13. new Barn().go("hi", 1); 14. new Barn().go("hi", "world", 2); 15. } 16. public void go(String... y, int x) { 17. System.out.print(y[y.length - 1] + " "); 18. } 19. } What is the result? A. hi hi B. hi world C. world world D. Compilation fails. E. An exception is thrown at runtime. Answer: D Question 9. Given: 10. class Nav{ 11. public enum Direction { NORTH, SOUTH, EAST, WEST } 12. } 13. public class Sprite{ 14. // insert code here 15. } Which code, inserted at line 14, allows the Sprite class to compile? A. Direction d = NORTH; B. Nav.Direction d = NORTH; C. Direction d = Direction.NORTH; D. Nav.Direction d = Nav.Direction.NORTH; Answer: D Question 10. Click the Exhibit button. Which statement is true about the classes and interfaces in the exhibit? A. Compilation will succeed for all classes and interfaces. B. Compilation of class C will fail because of an error in line 2. C. Compilation of class C will fail because of an error in line 6. D. Compilation of class AImpl will fail because of an error in line 2. Answer: C
|
Question 1. What is the essential difference between an 'Ethical Hacker' and a 'Cracker'? A. The ethical hacker does not use the same techniques or skills as a cracker. B. The ethical hacker does it strictly for financial motives unlike a cracker. C. The ethical hacker has authorization from the owner of the target. D. The ethical hacker is just a cracker who is getting paid. Answer: C Explanation: The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target. Question 2. What does the term "Ethical Hacking" mean? A. Someone who is hacking for ethical reasons. B. Someone who is using his/her skills for ethical reasons. C. Someone who is using his/her skills for defensive purposes. D. Someone who is using his/her skills for offensive purposes. Answer: C Explanation: Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills. Question 3. Who is an Ethical Hacker? A. A person whohacksfor ethical reasons B. A person whohacksfor an ethical cause C. A person whohacksfor defensive purposes D. A person whohacksfor offensive purposes Answer: C Explanation: The Ethical hacker is a security professional who applies his hacking skills for defensive purposes. Question 4. What is "Hacktivism"? A. Hacking for a cause B. Hacking ruthlessly C. An association which groups activists D. None of the above Answer: A Explanation: The term was coined by author/critic Jason Logan Bill Sack in an article about media artist Shu Lea Cheang. Acts of hacktivism are carried out in the belief that proper use of code will have leveraged effects similar to regular activism or civil disobedience. Question 5. Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply) A. CHAT rooms B. WHOIS database C. News groups D. Web sites E. Search engines F. Organization's own web site Answer: A, B, C, D, E, F Explanation: A Security tester should search for information everywhere that he/she can access. You never know where you find that small piece of information that could penetrate a strong defense. Question 6. What are the two basic types of attacks?(Choose two. A. DoS B. Passive C. Sniffing D. Active E. Cracking Answer: B, D Explanation: Passive and active attacks are the two basic types of attacks. Question 7: You are footprinting Acme.com to gather competitive intelligence. You visit the acme.com websire for contact information and telephone number numbers but do not find it listed there. You know that they had the entire staff directory listed ontheir website 12 months ago but now it is not there. How would it be possible for you to retrieve information from the website that is outdated? A. Visit google search engine and view the cached copy. B. Visit Archive.org site to retrieve the Internet archive of the acme website. C. Crawl the entire website and store them into your computer. D. Visit the company's partners and customers website for this information. Answer: B Explanation: The Internet Archive (IA) is a non-profit organization dedicated to maintaining an archive of Web and multimedia resources. Located at the Presidio in San Francisco, California, this archive includes "snapshots of the World Wide Web" (archived copies of pages, taken at various points in time), software, movies, books, and audio recordings (including recordings of live concerts from bands that allow it). This site is found at www.archive.org. Question 8. User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud? A. 18 U.S.C 1029 Possession of Access Devices B. 18 U.S.C 1030 Fraud and related activity in connection with computers C. 18 U.S.C 1343 Fraud by wire, radio or television D. 18 U.S.C 1361 Injury to Government Property E. 18 U.S.C 1362 Government communication systems F. 18 U.S.C 1831 Economic Espionage Act G. 18 U.S.C 1832 Trade Secrets Act Answer: B Explanation: http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html Question 9. Which of the following activities will NOT be considered as passive footprinting? A. Go through the rubbish to find out any information that might have been discarded. B. Search on financial site such as Yahoo Financial to identify assets. C. Scan the range of IP address found in the target DNS database. D. Perform multiples queries using a search engine. Answer: C Explanation: Passive footprinting is a method in which the attacker never makes contact with the target systems. Scanning the range of IP addresses found in the target DNS is considered making contact to the systems behind the IP addresses that is targeted by the scan. Question 10. Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic? A. Network aliasing B. Domain Name Server (DNS) poisoning C. Reverse Address Resolution Protocol (ARP) D. Port scanning Answer: B Explanation: This reference is close to the one listed DNS poisoning is the correct answer. This is how DNS DOS attack can occur. If the actual DNS records are unattainable to the attacker for him to alter in this fashion, which they should be, the attacker can insert this data into the cache of there server instead of replacing the actual records, which is referred to as cache poisoning.
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.