|
Question 1. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of an Active Directory domain named ITCertKeys.com and contains a Microsoft Exchange Server 2003 messaging system. ITCertKeys.com users in the Development department use Microsoft Internet Explorer to access Microsoft Outlook Web Access (OWA). You have received instructions from the CIO to upgrade OWA to the Microsoft Exchange Server 2007 version. You decide to deploy the Microsoft Exchange Server 2007 OWA version on a new Exchange Server 2007 Client Access Server named ITCERTKEYS-SR38. To complete your work, you modify the Address (A) record for OWA access to point to ITCERTKEYS-SR38. However, you have received complaints from the users at the Development department that they cannot access the Microsoft Exchange Server 2007 OWA features. You need to resolve this problem. What should you do? A. Your best option would be to have an MX record created for a host named Autodiscover that will point to ITCERTKEYS-SR38. B. Your best option would be to utilize a server that run .NET FRAMEWORK 2.0. C. Your best option would be to have the mailboxes moved to an Exchange Server 2007 server with the Mailbox server role. D. Your best option would be to instruct the users to add the fully qualified domain name of the OWA server to the Trusted Sites zone of Internet Explorer. Answer: C Explanation: For explanation refer to TechNet article bb123946.aspx Question 2. You work as a messaging professional at ITCertKeys.com. ITCertKeys.com has its headquarters in Chicago and branch offices in Dallas and Miami. The ITCertKeys.com network has a Microsoft Exchange Server 2003 messaging system that the company wants to upgrade to Microsoft Exchange Server 2007. Each office at ITCertKeys.com has its own Active Directory site and a Mailbox server cluster. You have received instructions from the CIO to prepare the Exchange Server 2007 server. You must also prepare the placement of the server roles for the upgrade. As part of the upgrade, the mailboxes of every office need to be stored on servers located at that particular office. To ensure productivity you need to make sure that the service availability is retained through the upgrade process. IT is imperative that you that all ITCertKeys.com users are able to utilize the messaging system at the various offices to accomplish their daily tasks. What should you do? (Choose all that apply.) A. Your best option would be to have Exchange Server 2007 installed on a server in every site And configure it to host the Hub Transport server role as well as the Client Access Server role. B. Your best option would be to have the Hub Transport server role as well as the Client Access server role configured two servers that run Exchange Server 2007. C. Your best option would be to have Exchange Server 2007 installed on a server in every site and configure it to host the Edge Transport server role. D. Your best option would be to have Exchange Server 2007 installed on a server in every site and configure it to host the Hub Transport server role and the Mailbox server role. E. Your best option would be to have Exchange Server 2007 installed on two servers in every site. Thereafter the servers should be configured as a Single Copy Cluster (SCC) clustered Mailbox server. Answer: B, E Explanation: For explanation refer to TechNet article bb125149.aspx Question 3. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of an Active Directory domain named ITCertKeys.com and contains a Microsoft Exchange Server 2003 messaging system. ITCertKeys.com wants to upgrade the existing messaging system to Microsoft Exchange Server 2007. ITCertKeys.com contains a Finance department. The employees at the Finance department use Microsoft Outlook Web Access (OWA) to access their public folders. You need to make sure that the employees can access their public folders after the completion of the upgrade. What should you do? A. This can be accomplished by having the server with the private folder replaced with an Exchange Server 2007 server that hosts the Mailbox server role and the Client Access Server role. B. This can be accomplished by having the public folders should reside on an Exchange Server 2003 server. C. This can be accomplished by keeping the Exchange Server 2003 servers as a front-end server. D. This can be accomplished by relocating the public folders to a server as well as providing the employees with the Web site address. Answer: B Explanation: For explanation refer to TechNet article bb430795.aspx Question 4. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of an Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains a Microsoft Exchange Server 2003 messaging system. ITCertKeys.com wants to upgrade the existing messaging system to Microsoft Exchange Server 2007. However, the network administrator's attempt to prepare the Microsoft Active Directory domain for the upgrade was unsuccessful. You have received instructions from the CIO to investigate the failed attempted and propose a successful attempt. During the investigation you notice that the administrator used an Exchange Full Administrator account and a computer that runs the x86 version of Microsoft Windows Server 2003 that supports the installation of the x64 version of Windows Server 2003. You need to propose an Active Directory domain for the Exchange Server 2007 messaging system. What should you do? (Choose all that apply.) A. You should consider installing Microsoft Windows PowerShell 1.0 and Microsoft .NET Framework 2.0 on the computer. B. You should consider adding the account to the Schema Administrators security group. C. You should consider adding the account to the Domain Administrators security group. D. You should consider adding the account to the Enterprise Administrators security group. Answer: A, B, D Explanation: For explanation refer to TechNet articles bb310792.aspx & aa996719.aspx Question 5. You work as a messaging professional at ITCertKeys.com. ITCertKeys.com contains an Active Directory forest named ITCertKeys.com. ITCertKeys.com is using a Microsoft Exchange Server 2003 messaging system and wants to upgrade to Microsoft Exchange Server 2007. The ITCertKeys.com forest has a dedicated root domain and child domains where the domains have a separate messaging team. You have received instructions from the CIO to prepare the Active Directory domains for the upgrade, with the following characteristics: The messaging teams must prepare the domains. The Active Directory Schema should be prepared for an unattended installation by the Active Directory team from a centralize point. They should use the least amount of administrative effort. What should you do? (Choose all that apply.) A. You should create a user account that is a member of the Enterprise and Schema Administrators group. Thereafter the setup.com /PrepareAD command should be run in the root domain in order to upgrade the forest. B. You should create a user account that is a member of the Enterprise and Schema Administrators group. Thereafter the setup.com /PrepareDomain command should be run in The root domain in order to upgrade the forest. C. You should create a user account for every domain that is a member of the Domain Administrators group of that domain. Thereafter the setup.com /PrepareDomain command should be run in order to prepare every domain. D. You should create a user account; create a user account that is a member of the Exchange Domain Servers group of that domain for every domain. Thereafter the setup.com /PrepareDomain command should be run in order to prepare the domain. Answer: A, C Explanation: - For explanation refer to TechNet article bb288906.aspx Question 6. You work as a messaging professional at ITCertKeys.com. ITCertKeys.com contains an Active Directory forest named ITCertKeys.com. ITCertKeys.com is using a Microsoft Exchange Server 2003 messaging system and wants to upgrade to Microsoft Exchange Server 2007 in the next 12 months. The ITCertKeys.com consists of four headquarters and thirty branch offices around the globe. Every office at ITCertKeys.com has a Microsoft Active Directory site as well as an Exchange Routing group. All the headquarters at ITCertKeys.com contain Exchange Server 2003 servers which are used as Microsoft Outlook Web Access (OWA) front-end servers. The employees at ITCertKeys.com connect to the OWA front-end servers in their own region to access their mailboxes on the Internet. You were instructed to propose an upgrade plan that as follows: All the headquarters of ITCertKeys.com will be upgraded as follows: the deployment of Exchange Server 2007 servers as Mailbox servers and Hub Transport servers; the movement of mailboxes to the 2007 servers; the replacement of the OWA servers with Exchange Server 2007 Client Access Servers.The branch offices will be upgraded as follows: the deployment of Exchange Server 2007 servers as Mailbox servers, Hub Transport servers, and Client Access Servers; the movement of the mailboxes to the servers running Exchange Server 2007. However, you need to change the plan to support the coexistence of Exchange Server 2003 servers and Exchange Server 2007 servers during the migration period a guarantee messaging services throughout. What should you do? A. You should consider having the Exchange Server 2007 Edge Transport servers deployed to offices with OWA front-end servers. B. You should consider having the OWA front-end servers replaced prior to moving the Mailbox servers in the offices with OWA front-end servers. C. You should consider having the OWA front-end servers replaced with Exchange Server 2007 Edge Transport servers in offices with OWA front-end servers. D. You should consider having the OWA front-end servers replaced after the mailboxes in the offices is relocated to offices with OWA front-end servers. Answer: B Explanation: For explanation refer to TechNet article bb885041.aspx Question 7. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory domain named ITCertKeys.com. ITCertKeys.com is using a Microsoft Exchange Server 2003 messaging system. ITCertKeys.com contains a Sales department. The Mailbox servers at ITCertKeys.com use a Storage Area Network (SAN) to store transaction logs and databases. ITCertKeys.com contains an Exchange Server 2003 cluster that hosts four storage groups and 15 databases. During a meeting with management, you learnt that the company has the following plans. The replacement of Exchange Server 2003 cluster with a feature of two physical nodes and keep the database used by a virtual Exchange server up to date on both nodes through asynchronous log shipping. The use of an Exchange-aware Volume Shadow Copy Service (VSS) solution for full storage group recovery. You were instructed by the CIO to propose a storage group layout for the new Exchange Server 2007 CCR cluster. What should you propose? A. You should consider requesting 15 logical unit numbers (LUNs) for transaction logs and 15 LUNs for databases. Thereafter you need to create 5 storage groups and one database for every storage group. B. You should consider requesting 10 logical unit numbers (LUNs) for transaction logs and 15 LUNs for databases. Thereafter you need to create 10 storage groups and two databases for every storage group. C. You should consider requesting four logical unit numbers (LUNs) for transaction logs and 15 LUNs for databases. Thereafter you need to create 15 storage groups and one database for every storage group. D. You should consider requesting four logical unit numbers (LUNs) for transaction logs and 15 LUNs for databases. Thereafter you need to create four storage groups and five databases for every storage group. Answer: A Explanation: For explanation refer to TechNet article bb738147.aspx Question 8. You work as the exchange administrator at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest that contains two Exchange 2003 servers. One of the Exchange 2003 servers is setup as a front-end server and the other as a back-end server. You need to migrate up the Exchange 2003 environment to Exchange 2007. You need to run the Setup /PrepareLegacyExchangePermissions command from the schema master. However when doing so, you received an error message stating that the setup needs the .NET Framework version 2.0. What should you do? (Choose TWO) A. You should consider installing the .NET Framework 2.0. B. You should consider installing the Transporter Suite for Lotus Domino. C. You should consider installing Windows PowerShell. D. You should consider installing the Exchange management tools. Answer: A, C Explanation: Part 2: Plan the Exchange Server 2007 migration implementation. (5 questions) Question 9. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of a single Active Directory forest. All domain controllers in the forest run Microsoft Windows Server 2003. The forest also has a single Exchange Server organization with Microsoft Exchange Server 5.5 servers and Microsoft Exchange 2000 Server servers. You have received instructions from the CIO to propose a migration of the mail servers to a Microsoft Exchange Server 2007 environment; however you should not reconfiguring user profiles. What should you propose? A. You should decommission the Exchange Server 5.5 servers. Thereafter the Exchange organization should be upgraded to Exchange Server 2007 servers. B. You should create a new organization for the Exchange Server 2007 servers. Thereafter the existing mailboxes should be deployed into the new organization. C. You should consider running the adprep /forestprep command on the domain controller that is configured as the Schema Master using the Windows Server 2003 installation CD. D. You should consider running a script in order to register the Service Principal Name (SPN) of the computer accounts of all Exchange Server 5.5 servers in the Active domain. Answer: A Explanation: For explanation refer to TechNet article bb124008.aspx Question 10. You work as a messaging professional at ITCertKeys.com. The ITCertKeys.com network consists of an Active Directory domain named ITCertKeys.com. The ITCertKeys.com network contains a Microsoft Exchange Server 2003 messaging system and two Novell GroupWise servers. ITCertKeys.com is using a Microsoft Exchange Connector for the Novell GroupWise server and a Microsoft Exchange Calendar Connector for the Novell GroupWise server. These are used to enable message transfer, directory synchronization, and free/busy synchronization between the two messaging systems. During a management meeting it came to the fore that ITCertKeys.com is going to use a Microsoft Exchange Server 2007 messaging system. In a period of a year, ITCertKeys.com wants to remove the Exchange Server 2003 servers and the Novell GroupWise servers. However, users must be able to send messages and access the free/busy information during the migration. You need to propose a migration plan. What should you do? A. You should propose that all mailboxes be migrated to the Exchange Server 2003 servers. Thereafter the Exchange Server 2003 servers should be replaced with Exchange Server 2007 servers. B. You should propose that an SMTP connecter be configured between the Novell GroupWise servers and the Exchange Server 2007 servers. Thereafter the Exchange Server 2003 servers should be replaced with Exchange Server 2007 servers. C. You should propose configuring the Microsoft Identity Integration Server (MIIS) in order to replicate directory information between the GroupWise messaging system and the Microsoft Active Directory database. Thereafter the Novell GroupWise mailboxes should be migrated to Exchange Server 2007 servers. D. You should propose removing the Exchange Connector for Novell GroupWise server and the Exchange Calendar Connector for Novell GroupWise server from the Exchange Server 2003 servers. Thereafter the Exchange Server 2003 servers should be replaced with Exchange Server 2007 servers. Answer: A Explanation: For explanation refer to TechNet article aa997617.aspx
|
Question 1. Which of the following statements about a riser card is true? A. It is used to connect a computer in a network. B. It is used to connect extra microprocessors. C. It provides extra memory for expansion cards. D. It is used to extend slots for expansion cards. Answer: D Explanation: Riser card is a circuit board that is used to extend slots for expansion cards and provides the ability to connect additional expansion cards to the computer. These cards are used with LPX motherboards. With the introduction of ATX motherboards, riser cards are rarely used. In ATX motherboards, the expansion cards connect directly to the computer motherboard instead of using riser cards. What is LPX? LPX is a motherboard form or that is used in some desktop computers. In LPX motherboards, expansion cards are inserted into a riser card that contains several slots. Unlike other common form ors such as AT and ATX, the expansion cards in LPX are not vertical, but parallel to the motherboard. The LPX form or is designed for smaller cases, and usually it is used for connecting two or three expansion cards. Question 2. Which of the following devices is used for accessing the data on Secure Digital (SD) card, MMC card, and CompactFlash (CF)? A. E-book reader B. Memory card reader C. Smart card reader D. Barcode reader Answer: B Explanation: A memory card reader is a device, typically having a USB interface, for accessing the data on a memory card such as a CompactFlash (CF), Secure Digital (SD) or MultiMediaCard (MMC). Answer option C is incorrect. Smart card readers are used to read smart cards. It is used as a communications medium between the smart card and a host. Answer option D is incorrect. A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes. Answer option A is incorrect. There is no such device as e-book reader. Question 3. Which of the following can be used to accomplish authentication? Each correct answer represents a complete solution. Choose all that apply. A. Biometrics B. Encryption C. Password D. Token Answer: A, C, D Explanation: The following can be used to accomplish authentication. 1. Password 2. Biometrics 3. Token A password is a secret word or string of characters that is used for authentication, to prove identity, or gain access to a resource. What is authentication? Authentication is a process of verifying the identity of a person, network host, or system process. The authentication process compares the provided credentials with the credentials stored in the database of an authentication server. What is biometrics? Biometrics is a method of authentication that uses physical characteristics, such as fingerprints, scars, retinal patterns, and other forms of biophysical qualities to identify a user. Nowadays, the usage of biometric devices such as hand scanners and retinal scanners is becoming more common in the business environment. A token may be a physical device or software token that an authorized user of computer services is given to ease authentication. Answer option B is incorrect. Encryption can be used to accomplish security and not authentication. Question 4. Which of the following devices can cause great harm to one's life with lethal electric shocks? Each correct answer represents a complete solution. Choose two. A. SMPS B. Floppy drive C. Monitor D. Keyboard. Answer: A, C Explanation: A computer monitor and SMPS are at high voltage. Therefore, these devices can be fatal. They usually have large amount of electric charge stored in capacitors for days after they have been unplugged from power source. What is SMPS? Switch Mode Power Supply (SMPS) is a device that converts raw input power to controlled voltage and current for the operation of electronic equipment. SMPS uses switches for high efficiency. Answer options D and B are incorrect. Keyboards and floppy drives do not store electric charge. Therefore, they cannot cause lethal electric shocks. Question 5. Which of the following ports on a computer are used to connect a keyboard? Each correct answer represents a complete solution. Choose two. A. USB B. DB-25 C. PS/2 D. DB-9 Answer: A, C Explanation: The PS/2 and USB ports on a computer are used to connect a keyboard. What is USB? Universal Serial Bus (USB) is a high speed bus standard developed by Compaq, IBM, DEC, Intel, Microsoft, NEC, and Northern Telecom. It provides the Plug and Play capability of Windows to external hardware devices. USB supports hot plugging, which means that a USB device can be installed or removed while the computer is running. A single USB port can be used to connect up to 127 peripheral devices, such as CD-ROM drives, tape drives, keyboards, scanners etc. USB 1.1 has a maximum data transfer rate of 12 Mbps, whereas USB 2.0 has a maximum data transfer rate of 480 Mbps. USB 2.0 is fully backward compatible with USB 1.1. Answer options D and B are incorrect. The DB-9 and DB-25 port types on the computer are used as serial ports. A DB-9 male type port has 9 pins, whereas a DB-25 male type port has 25 pins. What is a serial port? Serial port is the primary means for connecting modems and mouse to a computer. There are two types of serial port connectors, 9-pin and 25-pin. The word serial refers to the data is sent in series, one bit at a time, over a single wire. This design is significantly slower than sending 8 bits at a time via a parallel channel, but serial signals can travel much farther without degradation. Question 6. Which of the following features are related to power management? Each correct answer represents a complete solution. Choose two. A. Hot plugging B. Hibernate mode C. Standby mode D. Safe mode Answer: B, C Explanation: The Hibernate mode and Standby mode are features related to power management. Hibernate mode is a power saving feature for computers. In hibernate mode, the current state of a computer is saved to the hard disk, and the computer shuts down. A user will have to power on the computer to restore the previous settings. When a computer resumes from hibernate mode, it reads the saved settings from the disk and restores the system state as it was before it entered hibernate mode. By default, hibernate mode is disabled. If a computer is not ACPI-enabled or APM-enabled, users will have to enter hibernate mode manually. Users cannot set the computer to automatically hibernate after a certain time. With ACPI-enabled and APM-enabled computers, users are able to set hibernate mode automatically. The standby mode is a power saving feature for computers. In this mode, a computer does not shut down completely. The computer goes to low power state and, as a result, it consumes less power. When the computer resumes from the standby mode, full power is restored to its devices. During the standby mode, if the power supply is disconnected or interrupted, data might be lost. The standby mode is available automatically on ACPI-enabled or APM-enabled computers. Users do not need to enable this mode manually. This mode is not available in non-ACPI and non-APM based computers. Answer option A is incorrect. Hot plugging is a feature in which a device can be installed or removed while the computer is running. Answer option D is incorrect. Safe Mode is a Windows feature used to start a computer with basic drivers, such as mouse, keyboard, etc. It bypasses blocking issues, such as system corruption, or installation of incompatible drivers or system services, enabling the Administrator to resolve such issues. Question 7. Which of the following are types of LCD monitors? Each correct answer represents a complete solution. Choose two. A. SVGA B. Active Matrix C. Passive Matrix D. X-Matrix Answer: B, C Explanation: Two types of LCDs are available. Active matrix Passive matrix Active matrix LCDs uses individual transistors to control each pixel on the screen. This type of LCD consumes more power but provides sharper images than the passive matrix LCD. Passive matrix Passive matrix screens do not refresh quickly to rapid changes. The passive matrix screen displays weak colors. LCDs consume less power and are cheaper than Active matrix LCDs. Answer option A is incorrect. SVGA is a type of CRT monitor used with the Desktop computers, and not the LCD monitor. Answer option D is incorrect. There is no LCD display type such as X-Matrix. Question 8. Which of the following transmits all ATSC HDTV standards and supports 8-channel digital audio? A. DVI B. S-Video C. SVGA D. HDMI Answer: D Explanation: HDMI stands for High-Definition Multimedia Interface. It is a standard, uncompressed, and alldigital audio/video interface. HDMI is capable of delivering the highest quality digital video and multichannel digital audio on a single cable. It provides an interface between any audio/video sources, such as a DVD player or a computer and a digital television (DTV) or video monitor. HDMI transmits all ATSC HDTV standards and supports 8-channel digital audio, with extra bandwidth to accommodate future enhancements. HDMI has two types of connectors. Type A and Type B. Type A and Type B connectors use 19 pins and 29 pins, respectively. The Type B connector is designed for very high-resolution displays that are expected in near future. Answer option B is incorrect. S-Video, also known as Y/C video, stands for Super-Video. It is a technology for video transmission. Using this technology, the video is transmitted into two separate signals. One is used for color, and the other for brightness. Sometimes S-Video signals are considered as a type of component video signal. However, its quality is inferior to other complex component video schemes such as RGB. This technology produces sharper images than those produced by composite video, which carries the entire set of signals in a single line. For using SVideo, the device sending the signal must support S-Video output and the device receiving the signal needs to have an S-Video input jack. Answer option A is incorrect. DVI stands for Digital Visual Interface. It is a standard for high speed, high resolution digital display invented by Digital Display Working Group (DDWG). DVI accommodates analog and digital interfaces with a single connector. New video cards have DVI as well as VGA ports built into them. Most of LCD monitors come with a 15-pin VGA connection cable, even if they are capable of handling digital signals coming from DVI connections. However, some monitors come with both types of cables. DVI has three main categories of connectors. They are. DVI-A, DVI-D, and DVI-I. DVI-A is an analog-only connector, DVI-D is a digital-only connector, and DVI-I is an analog/digital connector. DVI-D and DVI-I connectors are of two types. single link and dual link. DVI supports UXGA and HDTV with a single set of links. Higher resolutions such as 1920 x 1080, 2048 x 1536, or more can be supported with dual links. Answer option C is incorrect. A VGA or SVGA connector is a 15-pin, three rows, female connector, on the back of a PC used for connecting monitors. Reference. "http.//en.wikipedia.org/wiki/High- Definition_Multimedia_Interface" Question 9. You are handling IT support for a sales company. One of the sales representatives complains that his laptop does not have a network card. You wish to add one via an expansion slot. What type of expansion card should you use? A. MCA B. PCMCIA C. PCI D. AGP Answer: B Explanation: PCMCIA is a widely used expansion card slot for laptops. What is PCMCIA card? Personal Computer Memory Card International Association (PCMCIA) card is also known as PC card. The PC card uses a small expansion slot and is primarily used in laptops. However, PC cards are also available in some of the desktop computers. There are three types of PCMCIA cards. 1.Type I 2.Type II 3.Type III Answer option C is incorrect. PCI slots are used in PC's, not laptops. Answer option D is incorrect. AGP is a legacy graphics slot for PC's. What is AGP (Accelerated Graphics Port)? AGP is a high speed 32-bit bus designed for high performance graphics and video support. It allows a video card to have direct access to a computer's RAM, which enables fast video performance. AGP provides a bandwidth of up to 2,133 MB/second. Answer option A is incorrect. MCA is a legacy PC slot. Reference. http.//www.wisegeek.com/what-is-an-expansion-card.htm Question 10. Which of the following terms refers to an anti-virus software file that is updated from time to time to protect a computer from new viruses? A. Definition B. Modules C. Service pack D. Hotfix Answer: A Explanation: Definition is an anti-virus software file that should be updated at regular intervals to protect a computer from new viruses. This file is also known as virus definition file. The virus definition file contains information about the latest viruses, which helps identify new viruses and protect computers from them. Answer option D is incorrect. Hotfix is a collection of files used by Microsoft for software updates that are released between major service pack releases. A hotfix is about a problem, occurring under specific circumstances, which cannot wait to be fixed till the next service pack release. Hotfixes are generally related to security problems. Hence, it is essential to fix these problems as soon as possible. Answer option C is incorrect. A service pack is a collection of Fixes and Patches in a single product. A service pack can be used to handle a large number of viruses and bugs or to update an operating system with advanced and better capabilities. A service pack usually contains a number of file replacements. Answer option B is incorrect. This term does not refer to any anti-virus software file. Reference. "http.//en.wikipedia.org/wiki/Computer_virus"
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.