70-620 EXAM Queston 01

Ensurepass
Question 1: (QID=25405)
You are a desktop support professional for your company. A user has opened a help desk ticket because they are having trouble visiting one specific website where additional browser windows are opening up whenever the site is accessed. During your troubleshooting you notice that he Information Bar is not shown when you access this Website and the additional windows will open. Additional testing on on other sites shows that the Information Bar is active on those sites that use pop-up advertising.
You need to prevent additional browser windows from opening when accessing all sites that might use pop up windows.
What should you do?

1. Open the Pop-up Blocker Settings dialog box. Remove the Website from the Allowed Sites list.
2. Open the Internet Options dialog box. On the Privacy tab, add the Website to the Managed websites list and block it.
3. Open the Pop-up Blocker Settings dialog box. Select the Show Information Bar when a pop-up is blocked option.
4. Open the Internet Options dialog box. On the Security tab, add the Website to the Restricted Sites list.

Correct answer(s): 1
Explanation: Since there appears to be only one site that is allowing additional windows to open on successive test then it must be due to the particular settings for te one site. In order to correct this you would need to remove the specific Website from the Allowed Sites list of the Pop-up Blocker Settings dialog box. Websites that are added to the Allowed Sites list can open browser windows without requiring user consent. The Information Bar is not displayed for these Websites. By removing the Website from the list, you allow pop-ups to be blocked.
Selecting the Show Information Bar when a pop-up is blocked option is not a correct choice as the Information Bar is shown for other Websites. Adding the Website to the Restricted Sites list on the Security tab of the Internet Options dialog box will only force the site to run with restricted permission but it would not prevent the Websites from opening pop-up windows if they have been previously permitted to do so.
Adding the Website to the Managed websites list and blocking it only prevents the site from reading and writing information to cookies on a user’s computer.
References:
Reset Internet Explorer 7 settings
Internet Explorer Pop-up Blocker: frequently asked questions
Objective: Configuring Windows Security Features

Question 2: (QID=25410)
You are a desktop support technician for MCMCSE.com. An end user named Kelly calls in a helpdesk ticket because they need assistance regarding setting up remote access. Kelly needs to connect to Diane’s computer and in order to show her how to use a new accounting application. Both of their computers run Windows Vista Ultimate and they are both in the same workgroup. The only local user account on Kellys machine is her own (KELLYD) and the only local user account on Dianes machine is her own (DIANEF).
You need to help resolve this issue for these users and close out the help desk ticket.
What should you do?

1. Have Kelly enable Remote Assistance on her computer. Have Kelly send Diane a Remote Assistance invitation. Have Kelly connect to Diane’s computer by using Remote Assistance.
2. Have Kelly enable Remote Desktop on her computer. Have Kelly add Diane to the Remote Desktop Users group. Have Kelly connect to Diane’s computer by using Remote Desktop.
3. Have Diane enable Remote Desktop on her computer. Have Diane add Kelly to the Remote Desktop Users group. Have Kelly connect to Diane’s computer by using Remote Desktop.
4. Have Diane enable Remote Assistance on her computer. Have Diane send Kelly a Remote Assistance invitation. Have Kelly connect to Diane’s computer by using Remote Assistance.

Correct answer(s): 4
Explanation: In order to correctly resolve this helpdesk ticket you would need to have Diane enable Remote Assistance on her computer and send Kelly a Remote Assistance invitation. Once she receives the invitation, she can connect to Diane’s computer by using Remote Assistance and once the session starts, Kelly will be able to view Diane’s desktop and watch her walk through the new application.
You cannot have Diane add Kelly to the Remote Desktop Users group because the user account doesnt exist on that system. In order to use Remote Desktop to connect to a remote computer, you must be an administrator or a member of the Remote Desktop Users group on that remote computer. In this scenario there was only the users own accounts on their own machines and no others.
Having Kelly enable Remote Assistance would not resolve the issue because the user who is requesting help must enable Remote Assistance.
You cannot have Kelly add Diane to the Remote Desktop Users group because the user account doesnt exist on that system. In order to use Remote Desktop to connect to a remote computer, you must be an administrator or a member of the Remote Desktop Users group on that remote computer. In this scenario there was only the users own accounts on their own machines and no others.
References:
Get help with your computer using Windows Remote Assistance
Windows Remote Assistance: frequently asked questions
Objective: Configuring Network Connectivity

Question 3: (QID=25387)
You are a desktop support professional and you have been tasked with installing an external optical reader for an end user on a system that runs Windows Vista Business. The driver and software application required to use this device are on a CD-ROM but there are different versions of the driver and application included on the disc for a number of different operating systems.
The driver and application can also be downloaded separately from the manufacturer’s Website.
The driver is digitally signed, but the software application is not.
You need to install the correct driver and application for the device.
What should you do to complete this task as easily as possible?

1. Connect the optical reader to the computer. Allow the Found New Hardware wizard to install the driver and the software application.
2. Connect the optical reader to the computer. Cancel out of the Found New Hardware wizard if it opens. Install the driver and software application from the CD-ROM.
3. Separately install the driver and software application from the manufacturer’s Website. Then connect the optical reader to the computer.
4. Separately install the driver and software application from the CD-ROM. Then connect the optical reader to the computer.

Correct answer(s): 1
Explanation: You should connect the optical reader to the computer first as this will cause the Found New Hardware wizard to autorun and install the driver for the device. The Found New Hardware wizard also invokes the co-installer after the driver is installed. The co-installer installs the software application.
You should not cancel out of the Found New Hardware wizard. This wizard will install the driver and the software application for the device.
You should not separately install the driver and software application. You should allow the Found New Hardware wizard to install the driver so that the co-installer installs the software application.
References:
How to Install Windows Drivers with Software Applications
How to Install Windows Drivers with Software Applications – Word Doc version
Objective: Installing and Upgrading Windows Vista

Question 4: (QID=25394)
You are a desktop troubleshooter for your company. An end user has opened a trouble ticket with the help desk because they are having problems opening a link on a Website that they frequently visits to perform their job. The user states that whenever they click the link, nothing happens. The user indicates to you that this problem did not occur before the upgrade from Windows 2000 Professional to Windows Vista Business.
Additional troubleshooting by you reveals that the Website uses ActiveX controls that violate your company’s security policy. Running the ActiveX controls are not required for the end user to do their job so you disable the ActiveX controls and learn that the link still does not work.
What should you do?

1. Open the Manage Add-ons dialog box. Disable the Shockwave Flash Object ActiveX control.
2. Open the Internet Options dialog box. On the Advanced tab, choose the Disable Phishing Filter option.
3. Open the Pop-up Blocker Settings dialog box. Add the URL to the Allowed sites list.
4. Open the Internet Options dialog box. On the Security tab, add the URL to the Trusted sites list.
5. Open the Internet Options dialog box. On the Privacy tab, add the URL to the allowed sites list.

Correct answer(s): 3
Explanation: From the information in the scenario, the most likely issue is due to the pop-up blocker settings in Internet Explorer 7.0. By default, Internet Explorer 7.0 prevents most pop-ups from being displayed when you visit Websites. To allow pop-ups to be displayed from a specific Website, you should open the Pop-up Blocker Settings dialog box and add the URL of the Website to the Allowed sites list.
Adding the URL to the Trusted sites list would resolve this issue for the end user as this would allow Internet Explorer 7.0 to run the ActiveX controls on the Website but these ActiveX controls violate your company’s security policy and they should not be permitted.
Adding the URL to the allowed sites list on the Privacy tab of the Internet Options dialog box would allow cookies to be sent from the Website but would not affect pop-up settings and would not resolve the problem for this user.
Choosing the Disable Phishing Filter option on the Advanced tab of the Internet Options dialog box would prevent Internet Explorer 7.0 from displaying a notification when it determines that a Website might be a phishing Website but it would not correct the users problem.
Disabling the Shockwave Flash Object ActiveX control would prevent Flash animations from being displayed on a website but it would not correct the users problem.
Reference: Internet Explorer Information bar: frequently asked questions
Objective: Configuring and Troubleshooting Post-Installation System Settings

Question 5: (QID=25421)
You are the development software support engineer for MCMCSE.com. A development engineer is testing four newly developed applications. All four of the applications write a different event log entry when running locally on a system when logging activity.
The development engineer needs to be able to view all code-level debug messages from all of the applications in one place.
You need to configure a custom view in Event Viewer to meet the development engineers needs.
What should you do?

1. Select only the Verbose event level. Choose the By log option, and then select the three event logs that are used by the application.
2. Select the Information and Warning event levels. Choose the By source option, and then select the All Event Sources option.
3. Select only the Critical event level. Choose the By source option, and then select the All Event Sources option.
4. Select the Error and Critical event levels. Choose the By log option, and then select the three event logs that are used by the application.

Correct answer(s): 1
Explanation: In order to configure a custom view in Event Viewer to meet the development engineers needs you would need to select only the Verbose event level. The Verbose event level includes additional information in the events logs including code-level debug messages which would meet the needs of the development engineer. You would also need to select the By log option, and then select the four event logs that are used by the applications.
Choosing the Error and Critical event levels would include certain entries written to the log but they do not include code-level debug information.
Selecting the By source option and select All Event Sources would cause the custom view to display all events of any specified event levels and this would not meet the needs outlined by the development engineer.
References:
New Tools for Event Management in Windows Vista
Improve Debugging And Performance Tuning With ETW
Enabling the System Event Audit Log and Verbose Logging
Objective: Maintaining and Optimizing Systems That Run Windows Vista

Question 6: (QID=25402)
You are a desktop support professional for MCMCSE.com and you are troubleshooting connectivity problems between the two computers named SYS001 and SYS002.
Both computers are members of the domain and are running Windows Vista Enterprise Edition. Windows Firewall is enabled on both computers with all outgoing connections allowed on both computers.
When you attempt to run the Ping command on SYS001to SYS002 you receive the following output in the command window:
Pinging SYS002 [192.168.1.100] with 32 bytes of data:

Request timed out.
Request timed out.
Request timed out.
Request timed out.

You need to configure Windows Firewall to ensure that it is not blocking the Ping request.
What should you do?

1. On SYS001, add the Ping program to the exceptions list on the Exceptions tab.
2. On SYS002, add the Ping program to the exceptions list on the Exceptions tab.
3. On SYS001, open ICMP Settings on the Advanced tab and check the Allow incoming echo request option.
4. On SYS002, open ICMP Settings on the Advanced tab and check the Allow incoming echo request option.

Correct answer(s): 4
Explanation: In order to make sure that Windows Firewall is not blocking the Ping request you should open ICMP Settings on the Advanced tab and check the Allow incoming echo request option on SYS002. Internet Control Message Protocol (ICMP) is the protocol used by the Ping program. By checking this option, you allow VISTA2 to respond to Ping requests even with Windows Firewall enabled.
You should not add the Ping program to the exceptions list on either of the workstations. Ping is a program that sends data, not one that receives data. Only receiving programs need to be added to the exceptions list.
You should not check the Allow incoming echo request option on SYS001 in this scenario. This would be necessary if you were running the Ping command from VISTA2; the question indicates run the Ping command on SYS001to SYS002.
References:
How to Configure Windows Firewall on a Single Computer
Understanding Windows Firewall settings
Objective: Configuring Windows Security Features

Question 7: (QID=25415)
You are trying to start a Windows Meeting Space session in a test environment. You attempt to start the session and invite some co-workers to the session but none of the users are listed in the Invite people dialog box where you expected to see them. All of these users are on the same subnet.
The computers in use by the intended attendees include systems that run Windows Vista Home Premium, Windows Vista Ultimate, and Windows XP Professional
You need to set up future testing so that users are listed in the Invite people dialog box.
What should you do? (Choose the best answer that leverages the least amount of administrative effort).

1. Upgrade the Windows XP systems to Windows Vista. Have all of the users of other versions of Vista sign in to People Near Me.
2. Have Users of Windows XP systems sign in People Near Me. Downgrade computers running Windows Vista Ultimate to Windows Vista Business. Upgrade the Vista Home Premium computer to Windows Vista Business.
3. Have the Windows Vista Business users sign in to People Near Me. Downgrade computers running Windows Vista Ultimate to Windows Vista Business and have the users sign in to People Near Me. Upgrade the Vista Home Premium computer to Windows Vista Business and have the users sign in to People Near Me. Install NetMeeting Windows XP systems.
4. Have the Windows Vista Ultimate users sign in to People Near Me. Upgrade Vista Home Premium systems to Windows Vista Ultimate. Install NetMeeting on Windows XP systems.

Correct answer(s): 1
Explanation: The correct answer that leverages the least amount of administrative effort is that you should upgrade the Windows XP systems to Windows Vista and have all of the users of other versions of Vista sign in to People Near Me. Only users who are using Windows Vista, are signed in to People Near Me, and are on the same subnet will be listed in the Invite people dialog box.
You should not install NetMeeting on any of the systems as a potential resolution as Meeting Space is not compatible with NetMeeting.
Meeting Space is available on all editions of Windows Vista so any edition of Vista will have the ability to join the session in this scenario as long as they are on the same subnet.

References:
Windows Vista Windows Meeting Space Step by Step Guide
Windows Meeting Space: frequently asked questions
Objective: Configuring Applications Included with Windows Vista

Question 8: (QID=25420)
An end user for your company uses his portable computer to scan paper invoices he receives and then submits them electronically to the Records Department. The Windows service for this application is named Invoicer and is configured to start automatically at system start up.

Recently the service has been failing and the user has escalated a call to the helpdesk.

You need to be notified at your computer when the service stops so that you can troubleshoot the issue.

What should you do?

1. Open Event Viewer on the users laptop Right-click the event that indicated that the service stopped, and choose the Attach Task To This Event option. Configure the wizard to send an e-mail to you.
2. Open Event Viewer on the users laptop. Create a subscription that uses users laptop as a source computer, and collect events from the Service Control Manager Eventlog Provider category.
3. Open Event Viewer on your desktop computer. Right-click the event that indicated that the service stopped, and choose the Attach Task To This Event option. Configure the wizard to send an e-mail to you.
4. Open Event Viewer on the users laptop. Create a subscription that uses your computer as a source computer, and collect events from the Service Control Manager Eventlog Provider category.

Correct answer(s): 1
Explanation: In order to be notified on your desktop computer when the service stops so that you can troubleshoot the issue you would need to open Event Viewer on the users laptop and right-click the event that indicated that the service stopped. You would then need to select the Attach Task To This Event option which allows you to execute a task when the event is logged. From there you would configure the wizard to send an e-mail to you.

You cannot configure this task in Event Viewer on your own system. You need to configure the task on the system where the event is logged.

Subscriptions allow you to collect events that are logged on other systems. To be notified by using subscriptions, you must create the subscription on your computer and use the laptop as the source computer (in this scenario).

Reference: Event Viewer

Objective: Maintaining and Optimizing Systems That Run Windows Vista

Question 9: (QID=25416)
You are a desktop support associate for your MCMCSE.com and an end user has called in a help desk ticket regarding Windows Fax and Scan. She is using the application to scan documents and schedule them to be faxed and she needs to be notified when they have been received by the recipient. If there is a situation where her system is offline or powered down she needs to have this status updated once it is back online.

She needed help configuring the application to do this and opened the help desk ticket.

What should you do?

1. In the Additional Settings dialog box of Fax Settings, specify the users e-mail address in the TSID (Transmitting Subscriber ID) field.
2. In the Additional Settings dialog box of Fax Settings, specify the users e-mail address in the CSID (Called Subscriber ID) field.
3. On the Tracking tab of Fax Settings, select the Notify of success and failure for outgoing faxes option.
4. On the Receipts tab of Fax Options, choose the Email To option and specify the users e-mail address.

Correct answer(s): 4
Explanation: You should choose the Email To option on the Receipts tab and specify Sherri’s e-mail address. This allows Sherri to receive an e-mail message when faxes are received by the recipient. Even if Sherri’s computer is turned off, the e-mail message will still get sent, and Sherri can check her e-mail when she turns her computer back on.

You should not select the Notify of success and failure for outgoing faxes option. This displays a balloon tip in the notification area. If Sherri’s computer is turned off, she would not get notified when a fax is received by the recipient.

You should not specify Sherri’s e-mail address in the CSID field. CSID (Called Subscriber ID) would identify Sherri as a fax recipient. Typically, this is the telephone number of the receiving fax device or company name.

You should not specify Sherri’s e-mail address in the TSID field. TSID (Transmitting Subscriber ID) would identify Sherri as a fax sender. Typically, this is the fax number or company name. Fax machines often display the TSID when receiving a fax and also might print it on the top of each received page.

References:
Explore the features: Windows Fax and Scan
Windows Fax and Scan
Using Windows Fax and Scan

Objective: Configuring Applications Included with Windows Vista

Question 10: (QID=25414)
You recently configured Windows Sidebar on your computer and added the Clock gadget and the Feed Headlines gadget. Both gadgets are currently docked to the upper-right edge of the screen.

The Clock gadget is very dim and difficult to see and youll need to make adjustments in order to view the Clock gadget better.

What actions would you need to take in order to resolve this issue?

1. In the Task and Start Menu Properties, ensure that the clock is checked under the Select which system icons to always show section.
2. Right-click the Windows Sidebar and choose Bring Gadgets to Front.
3. Right-click the clock and increase its opacity.
4. In the Windows Sidebar Properties window, ensure that the Windows Sidebar is always on top of the other windows option is selected.

Correct answer(s): 3
Explanation: In order to change the visibility of gadgets in order to make them more or less viewable youd need to make adjustments in the opacity of the particular gadget by right-clicking it and setting the percentage to the desired level.

Checking the clock on the Task and Start Menu Properties page on the Notification Area tab will make it so that the clock is shown in the notification area on the Task Bar. Making this setting change here will not affect the settings on the Windows Sidebar.

Selecting the option to Bring Gadgets to the Front would temporarily bring the gadgets to the foreground above the other active windows but it would not adjust the clarity of the clock.

When you configure the Windows Sidebar to always be on top it will bring the Windows Sidebar to the foreground and it will continue to stay on top of other windows until you change that setting but it would not adjust the clarity of the clock so that it is clearer and easier to view.

References:
Windows Sidebar and gadgets
Windows Sidebar and gadgets (overview)

Objective: Configuring Applications Included with Windows Vista

Ensurepass offers the Latest 2013 70-620 Exam PDF to pass the exams.