1.
You work for an ISP and receive a call from a client stating that she has not been able to retrieve her e-mail all morning. You check the network servers and everything is working on your end. Which of the following questions could you ask the user that would most likely yield results in this situation? Pick three.
Correct Answer(s)
B. How long have you been a subscriber with us?
C. Have you recently installed or switched over to a new e-mail client?
D. Have you opened any suspicious attachments?
Explanation
The three questions that could most likely yield results in this situation are:
1) How long have you been a subscriber with us? - This question will help determine if the issue is specific to the client's account or if it's a widespread problem affecting all subscribers.
2) Have you recently installed or switched over to a new e-mail client? - This question will help identify if any changes in the client's email setup could be causing the issue.
3) Have you opened any suspicious attachments? - This question will help determine if the client's email account has been compromised or if any malicious attachments may have caused the problem.
2.
Which of the following are tasks you would encourage an average home-based end user to do on his own to maintain and support his own computer? Choose all that apply.
Correct Answer(s)
A. Use Disk Defragmenter monthly.
C. Use Disk Cleanup weekly.
D. Use Scheduled Tasks to schedule Disk Cleanup to run regularly.
E. Access the Help and Support Center for how-to articles and to per-form specific tasks.
f. Enable System Restore and keep it enabled.
Explanation
The tasks that an average home-based end user can do on his own to maintain and support his own computer include using Disk Defragmenter monthly to optimize the performance of the hard drive, using Disk Cleanup weekly to delete unnecessary files and free up disk space, using Scheduled Tasks to schedule Disk Cleanup to run regularly for automated maintenance, accessing the Help and Support Center for how-to articles and specific tasks guidance, and enabling System Restore and keeping it enabled for easy recovery from system issues.
3.
You are an architect who creates blueprints for clients all over the world, so you use the metric system instead of the U.S. system of measurement. Your company handles all other communications, including billing. Your regional settings are configured to use the English (United States) standard. Which of the following is the best option for changing the default system of measurement on your computer from U.S. to metric?
Correct Answer
C. Keep the English (United States) setting, but customize the measurement
system to use the metric system. Don’t make any other changes.
Explanation
Keeping the English (United States) setting and customizing the measurement system to use the metric system is the best option in this scenario. This option allows the architect to continue using the familiar English language settings while ensuring that the measurements are in the metric system, which is the system used for creating blueprints for clients all over the world. It eliminates the need to change the regional settings to another country's standard or install a metric keyboard, making it the most practical and efficient solution.
4.
After configuring Folder Options, you notice you can no longer switch to Category view in Control Panel. What must you do to resolve this problem?
Correct Answer
A. Clear the Use Windows Classic Folders check box in the Folder Options dialog box.
Explanation
To resolve the problem of not being able to switch to Category view in Control Panel after configuring Folder Options, you need to clear the "Use Windows Classic Folders" check box in the Folder Options dialog box. This option enables the classic folder view, which may be preventing the switch to Category view. By clearing this check box, you can restore the ability to switch to Category view in Control Panel.
5.
You want to have as few items as possible on the taskbar. Which of the following items can easily be removed from the taskbar? (Choose all that apply.
Correct Answer(s)
B. The system clock
D. Quick Launch items
E. Inactive icons in the notification area
Explanation
The system clock, Quick Launch items, and inactive icons in the notification area can easily be removed from the taskbar. The system clock can be hidden by right-clicking on the taskbar, selecting "Taskbar settings," and toggling off the "Show clock" option. Quick Launch items can be removed by right-clicking on the taskbar, selecting "Toolbars," and unchecking "Quick Launch." Inactive icons in the notification area can be hidden by clicking on the upward arrow icon, selecting "Customize," and adjusting the settings for each individual icon.
6.
There are many ways to access the Folder Options dialog box. Which of the following are valid examples?
Correct Answer(s)
A. In Windows Explorer, from the Tools menu, select Folder Options
B. In the My Documents folder, from the Tools menu, select Folder Options
C. In Control Panel, open Folder Options.
D. In My Computer, from the Tools menu, select Folder Options.
Explanation
The correct answer includes all the valid examples of accessing the Folder Options dialog box. These examples include accessing it from the Tools menu in Windows Explorer, in the My Documents folder, in Control Panel, and in My Computer. Additionally, it mentions accessing it from the All Programs list under Accessories.
7.
A user has multiple languages configured on her laptop and needs access to the Language Bar quite often. However, she does not want the Language Bar to continually be open, taking up space on the taskbar. What can you tell the user to do? Select the best answer.
Correct Answer
C. Add the Language Bar to the taskbar only when it’s needed by right-clicking the taskbar, pointing to Toolbars, and choosing Language Bar.
Explanation
To avoid the Language Bar taking up space on the taskbar constantly, the user should add the Language Bar to the taskbar only when it is needed. This can be done by right-clicking the taskbar, pointing to Toolbars, and choosing Language Bar. This way, the Language Bar will only be displayed when the user requires it, saving space on the taskbar when it is not in use.
8.
Which of the following allows you to open a file with an unknown file type? (Each choice offers a complete solution. Choose two.)
Correct Answer
A. Install the application used to create the file, and then open the file in that program.
Explanation
The correct answer is to install the application used to create the file, and then open the file in that program. This solution ensures that the file will be opened correctly as it is being opened in the program specifically designed to handle that file type. By installing the application, the necessary file associations will be created, allowing the program to recognize and open the file.
9.
Which of the following troubleshooting tools included with Windows XP should be used to repair problems related to missing protected system files?
Correct Answer
E. SFC /Scannow
Explanation
SFC /Scannow is the correct answer because it is a command-line tool included with Windows XP that scans for and replaces missing or corrupt system files. By running this command, the user can repair any issues related to missing protected system files and ensure the stability and functionality of the operating system.
10.
A user has a POP3 e-mail account from an ISP and he reports he cannot send e-mail. He can receive e-mail. Which of the following is most likely the problem?
Correct Answer
B. The SMTP server name is incorrectly configured in the user’s e-mail settings.
Explanation
The user's ability to receive emails suggests that the POP3 server is functioning correctly. However, since the user is unable to send emails, it indicates an issue with the SMTP server configuration. The SMTP server is responsible for sending outgoing emails, so if it is incorrectly configured in the user's email settings, it would prevent them from sending emails.
11.
A client who has been using Outlook Express has recently installed the Microsoft Office System. He reports that when he opened Outlook for the first time, he tried to create an e-mail account, but as the procedure progressed, he got confused and clicked Cancel in the remaining dialog boxes instead of working through them. He now reports that he can send and receive e-mail, but he can’t access his address book and he can’t locate his old mail messages. What should you tell the user to do?
Correct Answer
D. Open Outlook and, from the File menu, select Import And Export. Work through the Import and Export Wizard to import both mail messages and the address book.
Explanation
The correct answer suggests that the user should open Outlook and use the Import and Export Wizard to import both the address book and mail messages. This is because the user accidentally cancelled the procedure while setting up the email account, resulting in the inability to access the address book and old mail messages. By using the Import and Export Wizard, the user can retrieve and import the address book and mail messages, allowing them to access their old data.
12.
A user reports she received an error message from the company’s e-mail server. The message stated that she has met her quota for space on the server and needs to delete some of the e-mail she has stored there. She informs you she has deleted some unnecessary folders from Outlook, reduced the items in her Sent Items folder, and emptied the Deleted Items folder. She wants help configuring the computer so she does not receive these messages in the future. Which of the following applications or utilities is the best choice for configuring her computer?
Correct Answer
A. AutoArchive
Explanation
AutoArchive is the best choice for configuring the user's computer to avoid receiving space quota error messages in the future. AutoArchive allows the user to automatically move older emails to a separate archive folder, which helps to free up space on the server. By setting up AutoArchive with appropriate settings, the user can ensure that their mailbox remains within the allotted space limit and avoid receiving such error messages.
13.
A user reports he set up AutoArchive in Outlook 2003 to permanently delete items that are two weeks old, no matter what folder they are in. However, the items are not being deleted after 14 days but instead are being deleted every 21 days. What is the likely cause of this?
Correct Answer
A. A retention policy has been set by network administrators.
Explanation
The likely cause of the items not being deleted after 14 days but instead every 21 days is that a retention policy has been set by network administrators. Retention policies can override the settings configured in AutoArchive and determine when items are deleted.
14.
A user reports she configured specific fonts to use when composing a new message, when replying and forwarding messages, and when using stationery. However, each time she composes a message or replies or for-wards one, the same font is always used. It’s the 12-point Courier New font that she configured for composing and reading plain text. When she closes the Fonts dialog box, she selects the Always Use My Fonts check box, but she still can only compose e-mail using 12-point Courier New. What is the cause of the problem?
Correct Answer
C. The mail format settings are configured to compose messages in plaintext. Configure this to use HTML or rich text.
Explanation
The cause of the problem is that the mail format settings are configured to compose messages in plaintext. This means that regardless of the font settings, all messages will be composed in plain text using the default font, which is 12-point Courier New. To fix the issue, the user should configure the mail format settings to use HTML or rich text, which will allow them to use the specific fonts they have configured for composing new messages, replying, and forwarding.
15.
A user has set up Internet Connection Sharing on a host computer that runs Windows XP, but is experiencing problems with his clients being able to connect to both the Internet and other computers on the network. Which of the following items could be the cause of the problems? Select all that apply.
Correct Answer(s)
B. There is a DNS server on the network.
C. There are computers on the network with static IP addresses.
Explanation
The presence of a DNS server on the network could be causing the problem because the clients may not be able to resolve domain names to IP addresses, preventing them from accessing the Internet. Additionally, the presence of computers on the network with static IP addresses could also be causing the issue because they may be conflicting with the IP addresses assigned by the Internet Connection Sharing, resulting in connectivity problems. The other options, such as the presence of a DHCP server or a Windows 2000 server, do not directly relate to the issue described.
16.
You are troubleshooting a connectivity problem on a small home-office workgroup that includes four computers connected through an Ethernet hub. The user at Computer1 cannot access any workgroup resources but is able to access the shared printer connected directly to her computer; the other three computers can access all workgroup resources except for resources on Computer1, including the shared printer. What is most likely the problem
Correct Answer
D. The Ethernet cable on Computer1 is disconnected from the NIC or the hub.
Explanation
The most likely problem is that the Ethernet cable on Computer1 is disconnected from the NIC or the hub. This would explain why Computer1 cannot access any workgroup resources but can still access the shared printer. It would also explain why the other three computers cannot access resources on Computer1.
17.
After using the command Ipconfig /All, the following results are given:
IP Address………192.168.0.5
Subnet Mask…….255.255.255.255
Default Gateway…………192.168.0.7
Correct Answer
Subnet Mask
Explanation
The subnet mask is a 32-bit number that is used to divide an IP address into network and host addresses. In this case, the subnet mask is 255.255.255.255, which means that the entire IP address is being used for the network address and there are no host addresses available. This is a special subnet mask called a "host-only" mask, which is used when a device needs to communicate with only one other device on the same network.
18.
You are troubleshooting a network connectivity problem for a workgroup containing 12 computers. One of the computers cannot access network resources. After verifying the physical connections are good, that the NIC light is on and the NIC produces no errors in Device Manager, and that the computer name and workgroup name are correct in System Proper-ties, you still can’t solve the problem. What should you try next?
Correct Answer
B. Open Network Connections and try to repair the connection.
Explanation
After verifying the physical connections, NIC status, and network settings, the next step to try and solve the network connectivity problem would be to open Network Connections and attempt to repair the connection. This could help resolve any software or configuration issues that may be causing the problem.
19.
A user has recently purchased a high-end PDA and wants to connect it to his Windows 98 computer. He has verified that the PDA software is com€patible with Windows 98. He has several ports in the back of his com€puter and does not know to which port he should connect it. The PDA comes with a serial connection cable, a USB connection cable, and a FireWire connection cable. What connection will almost certainly work, what connection is more desirable, and what connection is unlikely to be an option (in that order)?
Correct Answer
C. Serial, USB, FireWire
Explanation
The most likely connection that will work is a serial connection because Windows 98 computers commonly have a serial port. The next desirable connection is USB because even though Windows 98 may not have native USB support, there are drivers available to enable USB functionality. The least likely option is FireWire because Windows 98 does not have native FireWire support and it would require additional drivers and software to be installed.
20.
The company you work for hires quite a few temporary workers, and those workers need access to workgroup computers to perform their jobs. These employees are added to the default Users group when they are hired. Because they are members of the Users group, they have Read and Execute, List Folder Contents, and Read permissions by default. However, these users also need to be able to write data to the folders to which they have access. What’s the best way to make this change without giving the users too much access?
Correct Answer
C. For the Users group on each share, assign the NTFS Write permission.
Explanation
The best way to make this change without giving the users too much access is to assign the NTFS Write permission to the Users group on each share. This will allow the temporary workers to write data to the folders they have access to, while still maintaining the default Read and Execute, List Folder Contents, and Read permissions that they already have as members of the Users group. This ensures that they have the necessary access to perform their jobs without granting them unnecessary privileges.
21.
A user’s Windows 2000 Professional computer was recently upgraded to Windows XP Professional. A member of the Users group reports she can no longer run the legacy applications necessary to perform her job. You’ve looked for a newer version of the application, but cannot find one. The user is a Microsoft Certified Desktop Technician and a Microsoft Certified Professional, and has been with the company for many years, so you feel she’s competent and will pose no threat if given extra leniency. You need to allow this user to run her legacy application. What’s the best course of action?
Correct Answer
A. Move this end user from the Users group to the Power Users group.
Explanation
Moving the user from the Users group to the Power Users group is the best course of action because it will grant the user elevated privileges without giving them full administrative rights. This will allow the user to run the legacy applications necessary for their job without compromising the overall security of the system.
22.
A user named John is a member of several groups in a domain: the Research Group, the Marketing Group, and the Support Group. Each group he belongs to has access to a different set of folders and data. However, one folder named Help and Support is shared so that all users in the company can access it, although some users have more access than others. John’s group membership and the permissions assigned to the Help and Support folder for each group are listed here. What is John’s effective permission for the folder?
Group Share Permissions NTFS Permissions
Research Read and Change Read, Write, List Folder Contents, Read and Execute
Marketing Read Read, Read and Execute
Support Full Control Modify, Read and Execute, List Folder Contents, Read, Write
Correct Answer
C. Modify
Explanation
John's effective permission for the folder is "Modify". This is because John is a member of the Support Group, which has been assigned "Modify" NTFS permissions for the Help and Support folder. Even though John is also a member of the Research Group and the Marketing Group, their respective permissions for the folder do not grant him higher levels of access. Therefore, the highest level of access that John has is "Modify".
23.
A Windows XP Professional user reports she is unable to access the Add/ Remove Programs icon in Control Panel. What is most likely the problem?
Correct Answer
B. A group policy is in place that prevents access.
Explanation
The most likely problem is that a group policy is in place that prevents access to the Add/Remove Programs icon in Control Panel. Group policies can be set by system administrators to restrict certain actions or access to specific features on a computer. In this case, it seems that the user's access to the Add/Remove Programs feature has been restricted through a group policy. This is a common practice in organizations to prevent users from uninstalling important software or making unauthorized changes to their systems.
24.
Select all of the ways the Group Policy console can be accessed.
Correct Answer(s)
A. Type gpedit.msc at the Run line.
B. Open the Group Policy console from Administrative Tools.
Explanation
The Group Policy console can be accessed by typing "gpedit.msc" at the Run line and by opening the Group Policy console from Administrative Tools.
25.
An end user reports that although he was able to install Windows Update files when he first purchased his computer two years ago, he is now unable to install Service Pack 1 or 2. After a quick check, you discover that Windows Update is enabled in System Properties, and is configured to automatically download updates. You verify that the user can down-load Service Pack 1 but cannot install it. What is most likely the problem?
Correct Answer
A. The user has an unlicensed copy of Windows XP.
Explanation
The most likely problem is that the user has an unlicensed copy of Windows XP. This is indicated by the fact that the user was able to install Windows Update files when they first purchased the computer, but is now unable to install Service Pack 1 or 2. An unlicensed copy of Windows XP may have limited access to updates and may not be able to install certain service packs.
26.
A small office user has a network that consists of four computers. One Windows XP Professional Edition computer acts as the host and provides ICS services, and the other three computers access the Internet through this host computer’s Internet connection. The administrator of the network wants to protect the network by using ICF. What must the administrator do?
Correct Answer
C. Enable ICF on the host computer.
Explanation
The correct answer is to enable ICF on the host computer. ICF (Internet Connection Firewall) is a built-in feature in Windows XP Professional Edition that provides network security by blocking unauthorized access to the network. By enabling ICF on the host computer, the administrator can protect the network and prevent any unauthorized access from the internet. Purchasing a router or upgrading the internet connection is not necessary in this scenario, as ICF can be used to secure the network without any additional hardware or internet connection upgrades. Enabling ICF on all four network computers is also not required, as it only needs to be enabled on the host computer.
27.
You are troubleshooting a network connection and need to use the Ping command to see if a host is reachable. Which ICMP option should you enable on the host computer?
Correct Answer
B. Allow Incoming Echo Request
Explanation
To troubleshoot a network connection and check if a host is reachable, you should enable the "Allow Incoming Echo Request" option on the host computer. This option allows the host computer to respond to ICMP Echo Request messages, commonly used by the Ping command to test network connectivity. By enabling this option, the host computer will respond to the Ping command, indicating that it is reachable and functioning properly.
28.
An end user reports she has noticed some bizarre behavior on her computer all morning, and she believes it is getting worse. She reports the computer is displaying odd messages, that she cannot open her JPEG files, and that some programs won’t run. She says she has not opened any e-mail attachments all morning, and that no one has accessed the computer but her. What is most likely the problem?
Correct Answer
B. The user has a virus on her computer and it is most likely a worm.
Explanation
Based on the symptoms described by the user, such as odd messages, inability to open JPEG files, and programs not running, it suggests that the computer is infected with a virus. Additionally, the fact that the user did not open any email attachments rules out the possibility of the virus being spread through email. Therefore, the most likely explanation is that the computer has been infected with a worm, which is a type of virus that can replicate itself and spread through a network without the need for user interaction.
29.
A multiuser computer running Windows XP has four user accounts con-figured for the four users who access the computer. Bob has an Administrator account and is in charge of the computer, John and Mary have Standard accounts and access the computer during the day, and Bill has a Limited User account and accesses the computer at night. Knowing this, which of the following must also be true? (Choose all that apply.)
Correct Answer(s)
A. The computer is a member of a domain.
B. The computer is running Windows XP Professional Edition.
C. All users can change or delete their account password.
30.
A user has a multiboot system that offers both Windows 98 and Windows XP. The Windows 98 partition is configured to use FAT32, and the Windows XP partition is configured to use NTFS. The client reports that when logged on to the Windows 98 partition, he cannot view files on the Windows XP partition. However, when he is logged on to the Windows XP partition, he can view files on the Windows 98 partition. How can he configure the computer so that he can view all of the files no matter what operating system he is running? Pick the best solution.
Correct Answer
C. Reformat the Windows XP volume so that it uses FAT32.
31.
A client calls to report she needs to share her single, stand-alone computer with a guest who will be visiting next month. She stresses that the computer contains highly personal documents, files, Internet history, personalization settings, e-mail configuration, and more. Her guest will stay
for two weeks and will need access to the computer for e-mailing, creating Microsoft Word documents, working on Microsoft Excel files, and creating Microsoft PowerPoint presentations. The client reports she has Microsoft Office 2003 Professional Edition installed on the computer. What should you advise the user to do to protect the computer from harmful downloads or program installations by her guest and keep her own documents safe, while still allowing the guest access to the applications on the computer?
Correct Answer
C. Enable the Guest account for the user.
Explanation
Enabling the Guest account for the user would be the best solution in this scenario. By enabling the Guest account, the client can provide temporary access to the guest without compromising the security of her personal documents and settings. The Guest account has limited privileges and restrictions, preventing the guest from making harmful downloads or program installations. This ensures that the guest can use the computer for basic tasks such as emailing and creating Microsoft Office documents, while keeping the client's personal files and settings safe.
32.
A user needs access to a new application recently installed on his corporation’s application server. He has logged on to the network domain successfully and can access other, older applications, but he cannot access the new one. He reports he’s getting an Access Is Denied error message. What is most likely the problem?
Correct Answer
A. The client does not have sufficient permissions to access the application
folder, or the resources required of the application.
Explanation
The most likely problem is that the client does not have sufficient permissions to access the application folder or the resources required by the application. This can result in an "Access Is Denied" error message. It is possible that the user's account does not have the necessary privileges or that there are specific restrictions set on the application folder or resources. To resolve this issue, the user's permissions should be reviewed and adjusted accordingly to grant access to the new application.