Microsoft Desktop Trouble Shooting Test Prep 70-272

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Ernestleeburns
E
Ernestleeburns
Community Contributor
Quizzes Created: 6 | Total Attempts: 592
Questions: 32 | Attempts: 74

SettingsSettingsSettings
Microsoft Desktop Trouble Shooting Test Prep 70-272 - Quiz


A+ certified test prep final


Questions and Answers
  • 1. 

    You work for an ISP and receive a call from a client stating that she has not been able to retrieve her e-mail all morning. You check the network servers and everything is working on your end. Which of the following questions could you ask the user that would most likely yield results in this situation? Pick three.

    • A.

      When was the last time you installed new hardware?

    • B.

      How long have you been a subscriber with us?

    • C.

      Have you recently installed or switched over to a new e-mail client?

    • D.

      Have you opened any suspicious attachments?

    • E.

      When did you last clean up the computer with Disk Cleanup?

    Correct Answer(s)
    B. How long have you been a subscriber with us?
    C. Have you recently installed or switched over to a new e-mail client?
    D. Have you opened any suspicious attachments?
    Explanation
    The three questions that could most likely yield results in this situation are:
    1) How long have you been a subscriber with us? - This question will help determine if the issue is specific to the client's account or if it's a widespread problem affecting all subscribers.
    2) Have you recently installed or switched over to a new e-mail client? - This question will help identify if any changes in the client's email setup could be causing the issue.
    3) Have you opened any suspicious attachments? - This question will help determine if the client's email account has been compromised or if any malicious attachments may have caused the problem.

    Rate this question:

  • 2. 

    Which of the following are tasks you would encourage an average home-based end user to do on his own to maintain and support his own computer? Choose all that apply.

    • A.

      Use Disk Defragmenter monthly.

    • B.

      Access TechNet when in need of technical support and follow the directions to solve problems on his own.

    • C.

      Use Disk Cleanup weekly.

    • D.

      Use Scheduled Tasks to schedule Disk Cleanup to run regularly.

    • E.

      Access the Help and Support Center for how-to articles and to per-form specific tasks. f. Enable System Restore and keep it enabled.

    Correct Answer(s)
    A. Use Disk Defragmenter monthly.
    C. Use Disk Cleanup weekly.
    D. Use Scheduled Tasks to schedule Disk Cleanup to run regularly.
    E. Access the Help and Support Center for how-to articles and to per-form specific tasks. f. Enable System Restore and keep it enabled.
    Explanation
    The tasks that an average home-based end user can do on his own to maintain and support his own computer include using Disk Defragmenter monthly to optimize the performance of the hard drive, using Disk Cleanup weekly to delete unnecessary files and free up disk space, using Scheduled Tasks to schedule Disk Cleanup to run regularly for automated maintenance, accessing the Help and Support Center for how-to articles and specific tasks guidance, and enabling System Restore and keeping it enabled for easy recovery from system issues.

    Rate this question:

  • 3. 

    You are an architect who creates blueprints for clients all over the world, so you use the metric system instead of the U.S. system of measurement. Your company handles all other communications, including billing. Your regional settings are configured to use the English (United States) standard. Which of the following is the best option for changing the default system of measurement on your computer from U.S. to metric?

    • A.

      Change the default regional options for standards and formats to English (Canada). Canada is the nearest country that uses the metric system.

    • B.

      Change the default regional options for standards and formats to English (United Kingdom). The United Kingdom uses the metric system and many of your clients live there.

    • C.

      Keep the English (United States) setting, but customize the measurement system to use the metric system. Don’t make any other changes.

    • D.

      Install a metric keyboard.

    Correct Answer
    C. Keep the English (United States) setting, but customize the measurement system to use the metric system. Don’t make any other changes.
    Explanation
    Keeping the English (United States) setting and customizing the measurement system to use the metric system is the best option in this scenario. This option allows the architect to continue using the familiar English language settings while ensuring that the measurements are in the metric system, which is the system used for creating blueprints for clients all over the world. It eliminates the need to change the regional settings to another country's standard or install a metric keyboard, making it the most practical and efficient solution.

    Rate this question:

  • 4. 

    After configuring Folder Options, you notice you can no longer switch to Category view in Control Panel. What must you do to resolve this problem?

    • A.

      Clear the Use Windows Classic Folders check box in the Folder Options dialog box.

    • B.

      Select the Use Windows Classic Folders in the Folder Options dialog box.

    • C.

      In Control Panel, click View, select Choose Details, and select the Show Tasks check box.

    • D.

      In Control Panel, select the View tab, select Choose Details, and clear the Hide Task Options check box.

    Correct Answer
    A. Clear the Use Windows Classic Folders check box in the Folder Options dialog box.
    Explanation
    To resolve the problem of not being able to switch to Category view in Control Panel after configuring Folder Options, you need to clear the "Use Windows Classic Folders" check box in the Folder Options dialog box. This option enables the classic folder view, which may be preventing the switch to Category view. By clearing this check box, you can restore the ability to switch to Category view in Control Panel.

    Rate this question:

  • 5. 

    You want to have as few items as possible on the taskbar. Which of the following items can easily be removed from the taskbar? (Choose all that apply.

    • A.

      The Start button

    • B.

      The system clock

    • C.

      The notification area

    • D.

      Quick Launch items

    • E.

      Inactive icons in the notification area

    Correct Answer(s)
    B. The system clock
    D. Quick Launch items
    E. Inactive icons in the notification area
    Explanation
    The system clock, Quick Launch items, and inactive icons in the notification area can easily be removed from the taskbar. The system clock can be hidden by right-clicking on the taskbar, selecting "Taskbar settings," and toggling off the "Show clock" option. Quick Launch items can be removed by right-clicking on the taskbar, selecting "Toolbars," and unchecking "Quick Launch." Inactive icons in the notification area can be hidden by clicking on the upward arrow icon, selecting "Customize," and adjusting the settings for each individual icon.

    Rate this question:

  • 6. 

    There are many ways to access the Folder Options dialog box. Which of the following are valid examples?

    • A.

      In Windows Explorer, from the Tools menu, select Folder Options

    • B.

      In the My Documents folder, from the Tools menu, select Folder Options

    • C.

      In Control Panel, open Folder Options.

    • D.

      In My Computer, from the Tools menu, select Folder Options.

    • E.

      From the All Programs list, under Accessories, select Folder Options.

    Correct Answer(s)
    A. In Windows Explorer, from the Tools menu, select Folder Options
    B. In the My Documents folder, from the Tools menu, select Folder Options
    C. In Control Panel, open Folder Options.
    D. In My Computer, from the Tools menu, select Folder Options.
    Explanation
    The correct answer includes all the valid examples of accessing the Folder Options dialog box. These examples include accessing it from the Tools menu in Windows Explorer, in the My Documents folder, in Control Panel, and in My Computer. Additionally, it mentions accessing it from the All Programs list under Accessories.

    Rate this question:

  • 7. 

    A user has multiple languages configured on her laptop and needs access to the Language Bar quite often. However, she does not want the Language Bar to continually be open, taking up space on the taskbar. What can you tell the user to do? Select the best answer.

    • A.

      In Regional And Language Options, remove and reinstall the languages each time she needs them.

    • B.

      In the Text Services And Input Languages dialog box, select the Turn Off Advanced Text Services check box.

    • C.

      Add the Language Bar to the taskbar only when it’s needed by right-clicking the taskbar, pointing to Toolbars, and choosing Language Bar.

    • D.

      None of the above. When multiple languages are configured, the Language Bar is always on the taskbar

    Correct Answer
    C. Add the Language Bar to the taskbar only when it’s needed by right-clicking the taskbar, pointing to Toolbars, and choosing Language Bar.
    Explanation
    To avoid the Language Bar taking up space on the taskbar constantly, the user should add the Language Bar to the taskbar only when it is needed. This can be done by right-clicking the taskbar, pointing to Toolbars, and choosing Language Bar. This way, the Language Bar will only be displayed when the user requires it, saving space on the taskbar when it is not in use.

    Rate this question:

  • 8. 

    Which of the following allows you to open a file with an unknown file type? (Each choice offers a complete solution. Choose two.)

    • A.

      Install the application used to create the file, and then open the file in that program.

    • B.

      Register the file type in the Folder Options dialog box and associate it with a program already installed on the computer that has the capability to open the file.

    • C.

      Use the Web to determine which programs can be used to open the file.

    • D.

      Register the file type and let Windows choose a program to open the file with.

    Correct Answer
    A. Install the application used to create the file, and then open the file in that program.
    Explanation
    The correct answer is to install the application used to create the file, and then open the file in that program. This solution ensures that the file will be opened correctly as it is being opened in the program specifically designed to handle that file type. By installing the application, the necessary file associations will be created, allowing the program to recognize and open the file.

    Rate this question:

  • 9. 

    Which of the following troubleshooting tools included with Windows XP should be used to repair problems related to missing protected system files?

    • A.

      Msconfig

    • B.

      Msinfo32

    • C.

      Chkdsk

    • D.

      Disk Defragmenter

    • E.

      SFC /Scannow

    Correct Answer
    E. SFC /Scannow
    Explanation
    SFC /Scannow is the correct answer because it is a command-line tool included with Windows XP that scans for and replaces missing or corrupt system files. By running this command, the user can repair any issues related to missing protected system files and ensure the stability and functionality of the operating system.

    Rate this question:

  • 10. 

    A user has a POP3 e-mail account from an ISP and he reports he cannot send e-mail. He can receive e-mail. Which of the following is most likely the problem?

    • A.

      The Mail Account name in the Internet E-Mail Settings dialog box (accessed by clicking More Settings in the E-Mail Accounts dialog box) has a typographical error.

    • B.

      The SMTP server name is incorrectly configured in the user’s e-mail settings.

    • C.

      The ISP’s POP3 mail server is down.

    • D.

      The user has not typed in the correct password.

    Correct Answer
    B. The SMTP server name is incorrectly configured in the user’s e-mail settings.
    Explanation
    The user's ability to receive emails suggests that the POP3 server is functioning correctly. However, since the user is unable to send emails, it indicates an issue with the SMTP server configuration. The SMTP server is responsible for sending outgoing emails, so if it is incorrectly configured in the user's email settings, it would prevent them from sending emails.

    Rate this question:

  • 11. 

    A client who has been using Outlook Express has recently installed the Microsoft Office System. He reports that when he opened Outlook for the first time, he tried to create an e-mail account, but as the procedure progressed, he got confused and clicked Cancel in the remaining dialog boxes instead of working through them. He now reports that he can send and receive e-mail, but he can’t access his address book and he can’t locate his old mail messages. What should you tell the user to do?

    • A.

      Uninstall and reinstall Outlook 2003. After the application has been reinstalled, tell him to call back and you’ll walk him through the procedure.

    • B.

      Delete the existing account using the E-Mail Accounts Wizard. Re-create the account using the same wizard, and follow the prompts for importing the address book and mail messages.

    • C.

      From the Tools menu, select Address Book. In the Address Book window, click File, and click Import And Export. Import the address book used for Outlook Express.

    • D.

      Open Outlook and, from the File menu, select Import And Export. Work through the Import and Export Wizard to import both mail messages and the address book.

    Correct Answer
    D. Open Outlook and, from the File menu, select Import And Export. Work through the Import and Export Wizard to import both mail messages and the address book.
    Explanation
    The correct answer suggests that the user should open Outlook and use the Import and Export Wizard to import both the address book and mail messages. This is because the user accidentally cancelled the procedure while setting up the email account, resulting in the inability to access the address book and old mail messages. By using the Import and Export Wizard, the user can retrieve and import the address book and mail messages, allowing them to access their old data.

    Rate this question:

  • 12. 

    A user reports she received an error message from the company’s e-mail server. The message stated that she has met her quota for space on the server and needs to delete some of the e-mail she has stored there. She informs you she has deleted some unnecessary folders from Outlook, reduced the items in her Sent Items folder, and emptied the Deleted Items folder. She wants help configuring the computer so she does not receive these messages in the future. Which of the following applications or utilities is the best choice for configuring her computer?

    • A.

      AutoArchive

    • B.

      Mailbox Cleanup

    • C.

      Junk E-Mail

    • D.

      Macros

    Correct Answer
    A. AutoArchive
    Explanation
    AutoArchive is the best choice for configuring the user's computer to avoid receiving space quota error messages in the future. AutoArchive allows the user to automatically move older emails to a separate archive folder, which helps to free up space on the server. By setting up AutoArchive with appropriate settings, the user can ensure that their mailbox remains within the allotted space limit and avoid receiving such error messages.

    Rate this question:

  • 13. 

    A user reports he set up AutoArchive in Outlook 2003 to permanently delete items that are two weeks old, no matter what folder they are in. However, the items are not being deleted after 14 days but instead are being deleted every 21 days. What is the likely cause of this?

    • A.

      A retention policy has been set by network administrators.

    • B.

      The deleted items have been moved to the junk e-mail folder.

    • C.

      The settings configured in Mailbox Cleanup conflict with the settings configured in AutoArchive. Mailbox Cleanup has priority when conflicts arise.

    • D.

      AutoArchive has been disabled because there is less than 200 MB of free space on the computer hard disk.

    Correct Answer
    A. A retention policy has been set by network administrators.
    Explanation
    The likely cause of the items not being deleted after 14 days but instead every 21 days is that a retention policy has been set by network administrators. Retention policies can override the settings configured in AutoArchive and determine when items are deleted.

    Rate this question:

  • 14. 

    A user reports she configured specific fonts to use when composing a new message, when replying and forwarding messages, and when using stationery. However, each time she composes a message or replies or for-wards one, the same font is always used. It’s the 12-point Courier New font that she configured for composing and reading plain text. When she closes the Fonts dialog box, she selects the Always Use My Fonts check box, but she still can only compose e-mail using 12-point Courier New. What is the cause of the problem?

    • A.

      The fonts chosen for new mail, for replying, and for forwarding are not installed on the computer or are corrupt. Reinstall the fonts.

    • B.

      The display settings on the computer are set to 800 by 600 pixels. Reconfigure the display settings to 1024 by 768.

    • C.

      The mail format settings are configured to compose messages in plaintext. Configure this to use HTML or rich text.

    • D.

      The advanced settings for Internet Format (on the Mail Format tab of the Options dialog box) are set to encode attachments in UUENCODE format when sending a plaintext message.

    Correct Answer
    C. The mail format settings are configured to compose messages in plaintext. Configure this to use HTML or rich text.
    Explanation
    The cause of the problem is that the mail format settings are configured to compose messages in plaintext. This means that regardless of the font settings, all messages will be composed in plain text using the default font, which is 12-point Courier New. To fix the issue, the user should configure the mail format settings to use HTML or rich text, which will allow them to use the specific fonts they have configured for composing new messages, replying, and forwarding.

    Rate this question:

  • 15. 

    A user has set up Internet Connection Sharing on a host computer that runs Windows XP, but is experiencing problems with his clients being able to connect to both the Internet and other computers on the network. Which of the following items could be the cause of the problems? Select all that apply.

    • A.

      There is a DHCP server on the network.

    • B.

      There is a DNS server on the network.

    • C.

      There are computers on the network with static IP addresses.

    • D.

      There is a Windows 2000 server on the network.

    Correct Answer(s)
    B. There is a DNS server on the network.
    C. There are computers on the network with static IP addresses.
    Explanation
    The presence of a DNS server on the network could be causing the problem because the clients may not be able to resolve domain names to IP addresses, preventing them from accessing the Internet. Additionally, the presence of computers on the network with static IP addresses could also be causing the issue because they may be conflicting with the IP addresses assigned by the Internet Connection Sharing, resulting in connectivity problems. The other options, such as the presence of a DHCP server or a Windows 2000 server, do not directly relate to the issue described.

    Rate this question:

  • 16. 

    You are troubleshooting a connectivity problem on a small home-office workgroup that includes four computers connected through an Ethernet hub. The user at Computer1 cannot access any workgroup resources but is able to access the shared printer connected directly to her computer; the other three computers can access all workgroup resources except for resources on Computer1, including the shared printer. What is most likely the problem

    • A.

      APIPA is in use.

    • B.

      The network bridge is corrupt.

    • C.

      The configured DNS server is not available.

    • D.

      The Ethernet cable on Computer1 is disconnected from the NIC or the hub.

    Correct Answer
    D. The Ethernet cable on Computer1 is disconnected from the NIC or the hub.
    Explanation
    The most likely problem is that the Ethernet cable on Computer1 is disconnected from the NIC or the hub. This would explain why Computer1 cannot access any workgroup resources but can still access the shared printer. It would also explain why the other three computers cannot access resources on Computer1.

    Rate this question:

  • 17. 

    After using the command Ipconfig /All, the following results are given: IP Address………192.168.0.5 Subnet Mask…….255.255.255.255 Default Gateway…………192.168.0.7

    Correct Answer
    Subnet Mask
    Explanation
    The subnet mask is a 32-bit number that is used to divide an IP address into network and host addresses. In this case, the subnet mask is 255.255.255.255, which means that the entire IP address is being used for the network address and there are no host addresses available. This is a special subnet mask called a "host-only" mask, which is used when a device needs to communicate with only one other device on the same network.

    Rate this question:

  • 18. 

    You are troubleshooting a network connectivity problem for a workgroup containing 12 computers. One of the computers cannot access network resources. After verifying the physical connections are good, that the NIC light is on and the NIC produces no errors in Device Manager, and that the computer name and workgroup name are correct in System Proper-ties, you still can’t solve the problem. What should you try next?

    • A.

      Remove two of the computers from the workgroup; workgroups can only have 10 or fewer computers connected.

    • B.

      Open Network Connections and try to repair the connection.

    • C.

      Re-create the network connection.

    • D.

      Configure the workgroup to use APIPA.

    Correct Answer
    B. Open Network Connections and try to repair the connection.
    Explanation
    After verifying the physical connections, NIC status, and network settings, the next step to try and solve the network connectivity problem would be to open Network Connections and attempt to repair the connection. This could help resolve any software or configuration issues that may be causing the problem.

    Rate this question:

  • 19. 

    A user has recently purchased a high-end PDA and wants to connect it to his Windows 98 computer. He has verified that the PDA software is com€patible with Windows 98. He has several ports in the back of his com€puter and does not know to which port he should connect it. The PDA comes with a serial connection cable, a USB connection cable, and a FireWire connection cable. What connection will almost certainly work, what connection is more desirable, and what connection is unlikely to be an option (in that order)?

    • A.

      USB, FireWire, serial

    • B.

      FireWire, serial, USB

    • C.

      Serial, USB, FireWire

    • D.

      USB, serial, FireWire

    • E.

      Serial, FireWire, USB

    Correct Answer
    C. Serial, USB, FireWire
    Explanation
    The most likely connection that will work is a serial connection because Windows 98 computers commonly have a serial port. The next desirable connection is USB because even though Windows 98 may not have native USB support, there are drivers available to enable USB functionality. The least likely option is FireWire because Windows 98 does not have native FireWire support and it would require additional drivers and software to be installed.

    Rate this question:

  • 20. 

    The company you work for hires quite a few temporary workers, and those workers need access to workgroup computers to perform their jobs. These employees are added to the default Users group when they are hired. Because they are members of the Users group, they have Read and Execute, List Folder Contents, and Read permissions by default. However, these users also need to be able to write data to the folders to which they have access. What’s the best way to make this change without giving the users too much access?

    • A.

      Add all new users to the Power Users group.

    • B.

      Stop assigning NTFS permissions and assign the Read and Change share permissions.

    • C.

      For the Users group on each share, assign the NTFS Write permission.

    • D.

      Stop assigning NTFS permissions and assign the Full Control share permission.

    Correct Answer
    C. For the Users group on each share, assign the NTFS Write permission.
    Explanation
    The best way to make this change without giving the users too much access is to assign the NTFS Write permission to the Users group on each share. This will allow the temporary workers to write data to the folders they have access to, while still maintaining the default Read and Execute, List Folder Contents, and Read permissions that they already have as members of the Users group. This ensures that they have the necessary access to perform their jobs without granting them unnecessary privileges.

    Rate this question:

  • 21. 

    A user’s Windows 2000 Professional computer was recently upgraded to Windows XP Professional. A member of the Users group reports she can no longer run the legacy applications necessary to perform her job. You’ve looked for a newer version of the application, but cannot find one. The user is a Microsoft Certified Desktop Technician and a Microsoft Certified Professional, and has been with the company for many years, so you feel she’s competent and will pose no threat if given extra leniency. You need to allow this user to run her legacy application. What’s the best course of action?

    • A.

      Move this end user from the Users group to the Power Users group.

    • B.

      Decrease the default security settings for all members of the Users group.

    • C.

      Purchase a new program that is Microsoft certified and train the users in the company to use it. Uninstall the legacy application.

    • D.

      Move this end user from the Users group to the Administrators group.

    Correct Answer
    A. Move this end user from the Users group to the Power Users group.
    Explanation
    Moving the user from the Users group to the Power Users group is the best course of action because it will grant the user elevated privileges without giving them full administrative rights. This will allow the user to run the legacy applications necessary for their job without compromising the overall security of the system.

    Rate this question:

  • 22. 

    A user named John is a member of several groups in a domain: the Research Group, the Marketing Group, and the Support Group. Each group he belongs to has access to a different set of folders and data. However, one folder named Help and Support is shared so that all users in the company can access it, although some users have more access than others. John’s group membership and the permissions assigned to the Help and Support folder for each group are listed here. What is John’s effective permission for the folder? Group Share Permissions NTFS Permissions Research Read and Change Read, Write, List Folder Contents, Read and Execute Marketing Read Read, Read and Execute Support Full Control Modify, Read and Execute, List Folder Contents, Read, Write

    • A.

      Read

    • B.

      Write

    • C.

      Modify

    • D.

      Full Control

    Correct Answer
    C. Modify
    Explanation
    John's effective permission for the folder is "Modify". This is because John is a member of the Support Group, which has been assigned "Modify" NTFS permissions for the Help and Support folder. Even though John is also a member of the Research Group and the Marketing Group, their respective permissions for the folder do not grant him higher levels of access. Therefore, the highest level of access that John has is "Modify".

    Rate this question:

  • 23. 

    A Windows XP Professional user reports she is unable to access the Add/ Remove Programs icon in Control Panel. What is most likely the problem?

    • A.

      The Windows XP installation is corrupt.

    • B.

      A group policy is in place that prevents access.

    • C.

      The antivirus program is restricting access.

    • D.

      There are no programs to add or remove.

    • E.

      The user is not logged on as an administrator.

    Correct Answer
    B. A group policy is in place that prevents access.
    Explanation
    The most likely problem is that a group policy is in place that prevents access to the Add/Remove Programs icon in Control Panel. Group policies can be set by system administrators to restrict certain actions or access to specific features on a computer. In this case, it seems that the user's access to the Add/Remove Programs feature has been restricted through a group policy. This is a common practice in organizations to prevent users from uninstalling important software or making unauthorized changes to their systems.

    Rate this question:

  • 24. 

    Select all of the ways the Group Policy console can be accessed.

    • A.

      Type gpedit.msc at the Run line.

    • B.

      Open the Group Policy console from Administrative Tools.

    • C.

      Open Group Policy from Control Panel, using the Group Policy icon.

    • D.

      Open Group Policy by choosing Start, pointing to All Programs, pointing to Accessories, pointing to System Tools, and selecting Group Policy.

    Correct Answer(s)
    A. Type gpedit.msc at the Run line.
    B. Open the Group Policy console from Administrative Tools.
    Explanation
    The Group Policy console can be accessed by typing "gpedit.msc" at the Run line and by opening the Group Policy console from Administrative Tools.

    Rate this question:

  • 25. 

    An end user reports that although he was able to install Windows Update files when he first purchased his computer two years ago, he is now unable to install Service Pack 1 or 2. After a quick check, you discover that Windows Update is enabled in System Properties, and is configured to automatically download updates. You verify that the user can down-load Service Pack 1 but cannot install it. What is most likely the problem?

    • A.

      The user has an unlicensed copy of Windows XP.

    • B.

      The user is running Windows XP Home Edition and needs to upgrade to Windows XP Professional Edition.

    • C.

      The user needs to register Windows XP with Microsoft.

    • D.

      The user needs to activate Windows XP with Microsoft.

    • E.

      Windows Update determined after scanning the computer that the user doesn’t need to install the service packs.

    Correct Answer
    A. The user has an unlicensed copy of Windows XP.
    Explanation
    The most likely problem is that the user has an unlicensed copy of Windows XP. This is indicated by the fact that the user was able to install Windows Update files when they first purchased the computer, but is now unable to install Service Pack 1 or 2. An unlicensed copy of Windows XP may have limited access to updates and may not be able to install certain service packs.

    Rate this question:

  • 26. 

    A small office user has a network that consists of four computers. One Windows XP Professional Edition computer acts as the host and provides ICS services, and the other three computers access the Internet through this host computer’s Internet connection. The administrator of the network wants to protect the network by using ICF. What must the administrator do?

    • A.

      Purchase and install a router that is compatible with Windows XP and ICF.

    • B.

      Upgrade to DSL or a cable modem; ICF doesn’t work with a dial-up connection.

    • C.

      Enable ICF on the host computer.

    • D.

      Enable ICF on all four network computers.

    Correct Answer
    C. Enable ICF on the host computer.
    Explanation
    The correct answer is to enable ICF on the host computer. ICF (Internet Connection Firewall) is a built-in feature in Windows XP Professional Edition that provides network security by blocking unauthorized access to the network. By enabling ICF on the host computer, the administrator can protect the network and prevent any unauthorized access from the internet. Purchasing a router or upgrading the internet connection is not necessary in this scenario, as ICF can be used to secure the network without any additional hardware or internet connection upgrades. Enabling ICF on all four network computers is also not required, as it only needs to be enabled on the host computer.

    Rate this question:

  • 27. 

    You are troubleshooting a network connection and need to use the Ping command to see if a host is reachable. Which ICMP option should you enable on the host computer?

    • A.

      Allow Incoming Router Request

    • B.

      Allow Incoming Echo Request

    • C.

      Allow Outgoing Source Quench

    • D.

      Allow Redirect

    Correct Answer
    B. Allow Incoming Echo Request
    Explanation
    To troubleshoot a network connection and check if a host is reachable, you should enable the "Allow Incoming Echo Request" option on the host computer. This option allows the host computer to respond to ICMP Echo Request messages, commonly used by the Ping command to test network connectivity. By enabling this option, the host computer will respond to the Ping command, indicating that it is reachable and functioning properly.

    Rate this question:

  • 28. 

    An end user reports she has noticed some bizarre behavior on her computer all morning, and she believes it is getting worse. She reports the computer is displaying odd messages, that she cannot open her JPEG files, and that some programs won’t run. She says she has not opened any e-mail attachments all morning, and that no one has accessed the computer but her. What is most likely the problem?

    • A.

      The user has a virus on her computer and it is most likely a simple, replicating virus.

    • B.

      The user has a virus on her computer and it is most likely a worm.

    • C.

      The user has an internal problem that cannot be a virus, because the user states she did not open any e-mail attachments recently.

    • D.

      The user’s computer needs to be reinstalled; these are common signs of a corrupt installation.

    Correct Answer
    B. The user has a virus on her computer and it is most likely a worm.
    Explanation
    Based on the symptoms described by the user, such as odd messages, inability to open JPEG files, and programs not running, it suggests that the computer is infected with a virus. Additionally, the fact that the user did not open any email attachments rules out the possibility of the virus being spread through email. Therefore, the most likely explanation is that the computer has been infected with a worm, which is a type of virus that can replicate itself and spread through a network without the need for user interaction.

    Rate this question:

  • 29. 

    A multiuser computer running Windows XP has four user accounts con-figured for the four users who access the computer. Bob has an Administrator account and is in charge of the computer, John and Mary have Standard accounts and access the computer during the day, and Bill has a Limited User account and accesses the computer at night. Knowing this, which of the following must also be true? (Choose all that apply.)

    • A.

      The computer is a member of a domain.

    • B.

      The computer is running Windows XP Professional Edition.

    • C.

      All users can change or delete their account password.

    • D.

      The computer is running Windows XP Home Edition.

    Correct Answer(s)
    A. The computer is a member of a domain.
    B. The computer is running Windows XP Professional Edition.
    C. All users can change or delete their account password.
  • 30. 

    A user has a multiboot system that offers both Windows 98 and Windows XP. The Windows 98 partition is configured to use FAT32, and the Windows XP partition is configured to use NTFS. The client reports that when logged on to the Windows 98 partition, he cannot view files on the Windows XP partition. However, when he is logged on to the Windows XP partition, he can view files on the Windows 98 partition. How can he configure the computer so that he can view all of the files no matter what operating system he is running? Pick the best solution.

    • A.

      Convert the Windows 98 partition to NTFS using the convert /fs:NTFS command at the command prompt.

    • B.

      Convert the Windows XP partition to FAT32 using the convert /fs:FAT32 command at the command prompt.

    • C.

      Reformat the Windows XP volume so that it uses FAT32.

    • D.

      Reformat and repartition both partitions to use FAT.

    Correct Answer
    C. Reformat the Windows XP volume so that it uses FAT32.
  • 31. 

    A client calls to report she needs to share her single, stand-alone computer with a guest who will be visiting next month. She stresses that the computer contains highly personal documents, files, Internet history, personalization settings, e-mail configuration, and more. Her guest will stay for two weeks and will need access to the computer for e-mailing, creating Microsoft Word documents, working on Microsoft Excel files, and creating Microsoft PowerPoint presentations. The client reports she has Microsoft Office 2003 Professional Edition installed on the computer. What should you advise the user to do to protect the computer from harmful downloads or program installations by her guest and keep her own documents safe, while still allowing the guest access to the applications on the computer?

    • A.

      Create a Limited User account for the guest and reinstall Office 2003 under that account.

    • B.

      Create a Standard user account for the user and drag Office 2003 to the Shared Documents folder.

    • C.

      Enable the Guest account for the user.

    • D.

      Create a Limited User account for the guest and create a local computer policy that does not allow access to the Add Or Remove Pro-grams tool in Control Panel, and that disallows the downloading of programs.

    Correct Answer
    C. Enable the Guest account for the user.
    Explanation
    Enabling the Guest account for the user would be the best solution in this scenario. By enabling the Guest account, the client can provide temporary access to the guest without compromising the security of her personal documents and settings. The Guest account has limited privileges and restrictions, preventing the guest from making harmful downloads or program installations. This ensures that the guest can use the computer for basic tasks such as emailing and creating Microsoft Office documents, while keeping the client's personal files and settings safe.

    Rate this question:

  • 32. 

    A user needs access to a new application recently installed on his corporation’s application server. He has logged on to the network domain successfully and can access other, older applications, but he cannot access the new one. He reports he’s getting an Access Is Denied error message. What is most likely the problem?

    • A.

      The client does not have sufficient permissions to access the application folder, or the resources required of the application.

    • B.

      The Remote Access port is not open on his Internet Connection Firewall.

    • C.

      The user has an incorrect version of Terminal Services Client Services installed.

    • D.

      Group policies are preventing access

    Correct Answer
    A. The client does not have sufficient permissions to access the application folder, or the resources required of the application.
    Explanation
    The most likely problem is that the client does not have sufficient permissions to access the application folder or the resources required by the application. This can result in an "Access Is Denied" error message. It is possible that the user's account does not have the necessary privileges or that there are specific restrictions set on the application folder or resources. To resolve this issue, the user's permissions should be reviewed and adjusted accordingly to grant access to the new application.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Sep 12, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 15, 2010
    Quiz Created by
    Ernestleeburns
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.