70-270 Practice Tests 8

Ensurepass

Question 81:
What is the Sysprep switch to force Windows XP Professional to use the Windows Welcome screen (also called Out of Box Experience, or OOBE) the first time it is started after running Sysprep?

1. activated
2. audit
3. moose
4. mini
5. -msoobe

Correct answer(s): 5
Explanation:
-mini switch is used to force Windows XP Professional to use the mini-setup the first time it is started after running Sysprep.
-audit switch is to reboot systems into Factory mode without generating new SIDS or processing the [OEMRunOnce] section of winbom.ini.
-activated switch is to tell Sysprep not to reset the grace period for Windows Product Activation only used if system was activated in the factory.

Web Reference: Customizing Sysprep Installations

Objective: Configuring and Troubleshooting the Desktop Environment

Question 72:
Which of the following are true regarding Fast User Switching?

1. This feature cannot be used on computers that are domain members
2. Fast User Switching cannot be turned off while multiple users are logged on to the computer
3. When Fast User Switching is turned on, Serial Keys (accessibility feature) will not work
4. Fast User Switching can be turned on or off by any user of a Windows XP professional workgroup or stand-alone computer

Correct answer(s): 1 3 2

Explanation: With Fast User switching, users dont have to close their applications when someone else wants to use the computer. It allows them to log out of their account and let the other person log on to his or her own account without forcing them to close their open applications. This feature can only be turned on or off by administrators of XP clients that are not domain members.

Web Reference:
Share a Computer with Fast User Switching
Question 73: (7)
Which of the following is true regarding the volume shadow copy feature in Windows XP Professional?

1. A computer can be backed up while applications and services are running
2. The need for scheduling a backup window is eliminated. A backup window requires that applications be shut down to ensure a successful volume backup.
3. Files are not skipped during the backup process
4. Files open at the time of the shadow copy appear closed on the shadow copy volume

Correct answer(s): 3 1 4 2

Explanation: Volume shadow copy technology provides an instant copy of the original volume. A shadow copy of the volume is made at the time a backup is initiated. Data is then backed up from the shadow copy instead of from the original volume. The original volume continues to change as the process continues, but the shadow copy of the volume remains constant. This is helpful if users need access to files while a backup is taking place.

Objective: Monitoring and Optimizing System Performance and Reliability

Question 74: (8)
Which of the following statements are true regarding striped volumes?

1. Striped volumes can combine free space from 2 to 32 drives into a single logical partition
2. Striped volumes are fault-tolerant
3. Striped volumes can combine free space from 3 to 32 drives into a single logical partition
4. Windows XP Professional supports simple, spanned and striped volumes
5. Striped volume cannot be mirrored
6. Striped volumes cannot be extended

Correct answer(s): 1 6 5 4

Explanation: Striped volumes can combine free space from 2 to 32 drives into a single logical partition. Striped volumes are not fault tolerant and cannot be extended or mirrored.

Objective: Monitoring and Optimizing System Performance and Reliability

Question 75: (3)
Where is the Offline Files cache (CSC) located?

1. system32csc
2. systemcsc
3. program filescsc
4. %SystemRoot%CSC

Correct answer(s): 4
Explanation: The Offline Files cache is a folder structure located in the %SystemRoot%CSC folder, which is hidden by default. The CSC folder, and any files and subfolders it contains, should not be modified directly; doing so can result in data loss and a complete breakdown of Offline Files functionality.

How to Restart the Offline Files Cache/Database

Objective: Implementing and Conducting Administration of Resources

Question 76:
Which permissions or combination of permissions listed below are required to delete a file?

1. Write
2. Read
3. Read & Execute
4. Modify

Correct answer(s): 4
Explanation: Modify permissions allow you to change and delete the file. Modify also includes the Write permission and the Read & Execute permission.

Web Reference:
File and Folder Permissions
Question 77: (8)
Windows 2000 Professional and Windows XP Professional provide two flavors of EAP. What are they?

1. PAP
2. TLS
3. MD5
4. SPAP

Correct answer(s): 2 3

Explanation: MD5 is Message Digest 5 hashing scheme. EAP-MD5 uses the same challenge-handshake protocol that is used by the PPP-based Challenge Handshake Authentication Protocol (CHAP), but the challenges and responses are sent as EAP messages. EAP MD5 is intended for prototyping and testing Transport Layer Security (TLS) is a stronger authentication method based on public key security.

Objective: Implementing, Managing, and Troubleshooting Network Protocols and Services

Question 78: (1)
Which of the following groups can access the hidden shares in Windows XP Professional?

1. Only members of the administrators group can access hidden shares.
2. Only members of the Backup Operators group can access hidden shares.
3. Only members of the administrators and backup operators group can access hidden shares.
4. Only members of the administrators and power users group can access hidden shares.

Correct answer(s): 3Objective: Implementing and Conducting Administration of Resources

Question 79:
You are the administrator of network that has 5 Windows 2000 Servers and 200 Windows XP Professional computers that are part of the Corp domain. You have configured local policy on the Windows XP Professional computers, however, you discover that not all of the policies are being applied. What is the most likely cause of this?

1. You configured the policies incorrectly
2. The policies are being overwritten by the domain policies
3. You cannot configure local policies
4. You configured user policies instead of computer policies

Correct answer(s): 2
Explanation: Site, OU, and domain policies will overwrite any conflicting local policies. It does not matter whether they are computer local policies or user local policies.

Web Reference
Applying security settings
Question 80: (0)
Which command line utility is used to manage data encryption?

1. Cipher
2. EFS
3. Encrypt
4. Crypto

Correct answer(s): 1
Explanation: Cipher /e command: Encrypts the specified folders. Folders are marked so that files that are added to the folder later are encrypted too. Cipher /d command: Decrypts the specified folders. Folders are marked so that files that are added to the folder later are encrypted too.

Objective: Configuring, Managing, and Troubleshooting Security

Ensurepass offers the Latest 2013 70-270 Exam PDF to pass the exams.