70-620 EXAM Queston 04

Ensurepass

Question 31: (QID=25400)
You are the technical lead for a large manufacturing company and you recently updated all users’ computers to Windows Vista Business Edition

The company is trying to deploy a custom web application that will be hosted on a perimeter network to be used by customers and partners. The test users of the application are complaining that when they access the application via the URL and click on specific options in the application, they get a message stating that a pop-up was blocked.

You need to allow the users to use all the functionality in the application while maintaining all other security settings.

What should you do (choose the best answer)?

1. Add this application’s URL to the Trusted sites zone.
2. Add this application’s URL to the Local intranet zone.
3. Disable Pop-up blocker in the Internet zone.
4. Disable Pop-up Blocker in the Local intranet zone.

Correct answer(s): 2
Explanation: You should add the URL for this Website to the Local intranet zone because this zone already has Pop-up Blocker disabled. Because the application is in the perimeter network, it is probably not being recognized by Internet Explorer as being in the local intranet zone. This solution also preserves all other security settings.

Adding the URL to the Trusted sites would not resolve the problem because this option has Pop-up Blocker enabled.

If you were to disable Pop-up Blocker in the Internet zone this would allow pop-ups for all Websites on the Internet. While this would work it is not the best answer for the

Question.

There is no need to disable Pop-up Blocker in the Local intranet zone because it is already disabled by default.

Reference: Security zones: adding or removing websites

Objective: Configuring Windows Security Features

Question 32: (QID=25385)
You are a desktop install lead for MCMCSE.com and you need to use the Windows Vista installation DVD to perform a clean installation on a workstation that is running Windows 2000 Professional.

You place the DVD into the drive and start the workstation only to find that it boots straight to Windows 2000 without starting the installation routine of Windows Vista. You check the system BIOS and the ability to boot from the DVD ROM drive is not shown in the startup options

You need to perform a clean install. What should you do? (Each correct answer presents a complete solution. Choose two.)

1. Use a network boot disk or Preboot Execution Environment (PXE) to boot the workstation, and then connect to the installation files on the DVD or over the network.
2. Install a new hard drive with a single partition.
3. Use the Windows Vista Setup floppy boot disk.
4. Install a new hard drive with a two partitions, one as the system partition and one with a boot parition
5. Update the workstation’s BIOS.
6. Set the BIOS settings to boot from the local hard drive.

Correct answer(s): 5 1

Explanation: When you need to leverage the DVD ROM drive to boot from an installation disk (of any type) and it does not work, the first place you to check is the computer BIOS. In order to be able to boot from any optical drives (DVD, CD, etc) they need to be configured as the primary boot device (or at least the first device BEFORE the available hard drive C meaning, as an example, a floppy drive could be first but the optical drive would need to be in sequence before the hard drive).

If the option for booting from the optical drive is not available youd need to update to the BIOS or start the computer with a network boot floppy disk or PXE and connect to the installation files on the DVD or over the network.

Windows Vista does not come with a Setup floppy boot disk so you cannot use the Windows Vista Setup floppy boot disk.

You should not change the BIOS settings to boot from the local hard drive as this will only boot to the installed operating system.

You should not install a new hard drive as you would still need to access the optical drive first to allow for the install.

References:
Windows PE 2.0 for Windows Vista Overview
Windows Vista Deployment Enhancements

Objective: Installing and Upgrading Windows Vista

Question 33: (QID=25403)
You are accessing a partner website when several additional browser windows open without any prompting or any information being displayed in the Information Bar.

When you visit another Website that attempts to open additional browser windows the expected blocking behavior of the pop-up blocker occurs and the information is displayed in the Information Bar as expected.

You need to prevent additional browser windows from opening when you visit the partner website.

What should you do?

1. Open the Internet Options dialog box. On the Privacy tab, add the Website to the Managed websites list and block it.
2. Open the Internet Options dialog box. On the Security tab, add the Website to the Restricted Sites list.
3. Open the Pop-up Blocker Settings dialog box. Select the Show Information Bar when a pop-up is blocked option.
4. Open the Pop-up Blocker Settings dialog box. Remove the Website from the Allowed Sites list.

Correct answer(s): 4
Explanation: The most likely reason for this issue where the partner website is automatically allowed to present popup windows is that at some point it was added to the Allowed Sites list of the Pop-up Blocker Settings. Websites that are added to the Allowed Sites list can open browser windows without requiring user consent. The Information Bar is not displayed for these Websites. By removing the Website from the list, you allow pop-ups to be blocked.

You should not select the Show Information Bar when a pop-up is blocked option because this setting is already enabled; when you visited another Website that attempts to open additional browser windows the expected behavior was noticed.

Adding the Website to the Restricted Sites list on the Security tab of the Internet Options dialog box would not resolve the issue here because Websites that are added to this list run with restricted permissions. This would not prevent the Websites from opening pop-up windows if they were permitted to do so by their being added to the Allowed Sites list of the Pop-up Blocker Settings.

Adding the Website to the Managed websites list and then choosing to block it would not resolve your issue as Websites on this list are blocked from reading and writing information to cookies on a user’s computer only.

References:
Internet Explorer Pop-up Blocker: frequently asked

Questions
Explore the features: Windows Security Center
Explore the features: Internet Explorer dynamic security protection

Objective: Configuring Windows Security Features

Question 34: (QID=25384)
You have been tasked with installing Windows Vista Business on a test computer in your lab with the following hardware specifications:

* Drive C (system drive) has 10 gigabytes (GB) of free space.
* Drive D (programs drive) has 30 GB of free space.
* Two memory slots are both filled with two 256 megabyte (MB) sticks for a total of 512 MB
* One 1.0 gigahertz (GHz) 32-bit CPU is installed.

You need to make changes to the hardware configuration so that the computer can run Windows Vista Business according to the minimum supported specifications.

What should you do?

1. Upgrade the CPU to 1.2 GHz
2. Install Windows Vista on Drive D.
3. Swap out the memory for two 512 megabyte (MB) sticks for a total of 1,024 MB
4. Free up space on Drive C.

Correct answer(s): 4
Explanation: You will need to make available additional free space on the C DRIVE. Windows Vista minimum supported system requirements for Home Basic / Home Premium / Business / Ultimate
800 MHz processor and 512 MB of system memory
20 GB hard drive with at least 15 GB of available space
Support for Super VGA graphics
CD-ROM drive
The minimum recommended system requirements are:
1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory
40 GB hard drive with at least 15 GB of available space
Support for DirectX 9 graphics with:
WDDM Driver
128 MB of graphics memory (minimum)
Pixel Shader 2.0 in hardware
32 bits per pixel
DVD-ROM drive
Audio Output
Internet access (fees may apply)
Reference: Windows Vista: System requirements

Objective: Installing and Upgrading Windows Vista

Question 35: (QID=25397)
You are a desktop support professional for your company and you have configured Windows Defender on all of the Windows Vista Ultimate workstations in the accounting department.

One of the accounting department users needed to have an expense tracking application installed on his computer. The application interacts with several other applications directly such as Microsoft Word and Excel.

The user calls into the help desk reporting that he is getting an alert from Windows Defender when he opens Word or Excel. Defender displays a medium level warning regarding the application stating that the expense tracking software may be spyware. The help desk escalates the issue to you and you determine that this is a false positive detection.

You need to stop the warnings and allow the user to successfully leverage the application.

What action do you need to have the user take to resolve this issue for this application (choose the best answer)?

1. Adjust the settings in Parental Controls to specify this application as an allowed application for this user.
2. When he receives the warning message, he should click the Action menu and click Always Allow.
3. Choose the Tools option in Windows Defender and then click Options. Under the default action for Medium alert items, choose Ignore from the drop-down list.
4. Choose the Tools option in Windows Defender and then click Options. Under the Advanced options, click Add in the Do not scan these files or locations section. Browse to the application’s executable and click OK.

Correct answer(s): 2
Explanation: When you have a situation where an application is being identified as spyware by Windows Defender and you are certain that it is not, you can correct that issue by clicking on the Action menu and click Always Allow when prompted with the spyware warning. This is set Windows Defender to know that the software is not spyware and allow it to run.

Parental Controls would not prevent Windows Defender from detecting this application as spyware.

Changing the default actions for medium alerts to Ignore would impact the way Windows Defender treats all applications that are identified as medium alert items; while this would work it is not the best answer.

Adding the application to the Do not scan these files or locations section would only prevent the application from being scanned on a scheduled or manual scan, but it would not prevent an alert for real-time protection.

References:
Add or remove items from the Windows Defender allowed list
Windows Defender Technical Overview

Objective: Configuring Windows Security Features

Question 36: (QID=25395)
You are responsible for assisting your manager with an issue he is having. When he has accessed several Websites that he is using regularly to place orders and track shipping from several companies, he has stored custom settings and preferences on these sites and passwords cached for the sites that are stored locally on the computer.

The manager has recently delegated the task of processing shipping orders online to some of his staff members. He would like them to have their own credentials on the Websites, so they can track their own shipments.

You need to remove the stored passwords from the computer and prevent them from being stored locally again.

What should you do? (Each correct answer presents part of the solution. Choose two.)

1. On the Privacy tab in Internet Options, set the level to Medium
2. On the Security tab in Internet Options, set the Internet zone security to High.
3. In Internet Explorer, click Tools and then click Delete Browsing History. Click Delete passwords.
4. On the Content tab in Internet Options, click the AutoComplete Settings button and clear the User names and passwords on forms check box.
5. On the Privacy tab in Internet Options, set the level to High.

Correct answer(s): 4 3

Explanation: You would need to go to Internet Explorer and select Tools, and then click Delete under Browser History. Then click Delete Passwords to remove the local passwords stored for Internet content.

You would also need to clear the User names and passwords on forms option in the AutoComplete Settings dialog box. This will prevent user name and password settings from being stored locally in the future.

You do not need to configure the privacy levels. These relate to the acceptance of cookies in Internet Explorer, not the saving of passwords.

You do not need to configure the security level because this does not impact password storage. Security levels determine how Internet Explorer will interact with specific Websites based upon which zone the Website resides within.

Reference: Explore the features: Internet Explorer dynamic security protection

Objective: Configuring and Troubleshooting Post-Installation System Settings

Question 37: (QID=25404)
You are a desktop support professional for MCMCSE.com. All workstations are running Windows Vista Service Pack 1 with Internet Explorer 7 installed.

One of the users on the help desk attempted to make some configuration changes to the browser on their own system and some of the behavior now was not what they intended. They cannot remember which setting changes were made but they did want to restore the browser settings.

After you have review some of the property pages of the browser youve come to the conclusion that the user changed only the settings on the Advanced tab. The other tabs appear to have the expected browser defaults for your companys desktop image.

You need to revert the Advanced settings back to the default configuration without affecting any other browser settings.

What should you do (choose the best answer)?

1. Use the Browsing History feature to go back to a previous set of configuration settings before the changes were made.
2. In Internet Options, go to the Advanced tab and click Reset.
3. In Internet Options, go to the Security tab and click Reset all zones to default level.
4. In Internet Options, go to the Advanced tab and click Restore advanced settings.

Correct answer(s): 4
Explanation: You should use the Restore advanced settings button on the Advanced tab of the Internet Options dialog box as doing this only resets the Advanced options without impacting the other setting used by Internet Explorer 7.

If you use the Reset button on the Advanced tab of the Internet Options dialog box you would reset all of the Internet Explorer settings and this is not the best answer for the

Question.

If you reset the zone settings on the Security tab you could impact the security level in Internet Explorer if there are customized settings in your image for your enterprise.

Browsing History simply shows a list of sites recently visited; there is no feature to go back to a previous set of configuration settings before changes were made.

References:
How to reset Internet Explorer settings
Change Internet Explorer Advanced settings

Objective: Configuring and Troubleshooting Post-Installation System Settings

Question 38: (QID=25406)
You are running a portable computer that has Windows Vista Ultimate Service Pack 1 installed and you are planning to use Windows Meeting Space to create a business presentation. The portable computer is connected to the corporate network through a wireless access point. All other of the planned viewers of the presentation will be accessing it through their desktop computers users on the companys corporate network over a wired connection.

You need to configure your laptop so that your presentation is only accessible to users that you invite.

What should you do?

1. Open the People Near Me Control Panel applet. Select the Allow people to send me invitations option on the Settings tab.
2. Open Windows Meeting Space and choose the Start a new session option. Click the Options link to open the Options dialog box. Select the Create a private ad hoc wireless network option.
3. Open the People Near Me Control Panel applet. Select the Sign out of People Near Me option on the Sign in tab.
4. Open Windows Meeting Space and choose the Start a new session option. Click the Options link to open the Options dialog box. Select the Do not allow people near me to see this session option.

Correct answer(s): 4
Explanation: Selecting the Do not allow people near me to see this session option on the Options dialog box prevents other users from viewing the session when they choose the Join a session near me option and requires that you invite users to join the session.

If you select the Create a private ad-hoc wireless network option it would create a computer-to-computer or peer network setup so that only nearby wireless computers can join the session. Because there are other users that need to join the session from a wired network connection this option would not work.

Choosing the Sign out of People Near Me option on the Sign in tab of the People Near Me Control Panel applet would not prevent other users from viewing the session.

Choosing the Allow people to send me invitations option on the Settings tab of the People Near Me Control Panel option would only allow other users to send you invitations to join a Windows Meeting Space session.

References:
Network and Sharing Center
Windows Vista Windows Meeting Space Step by Step Guide

Objective: Configuring Applications Included with Windows Vista

Question 39: (QID=25408)
You are a desktop support professional for your company and you have been tasked with configuring a shared high speed internet access configuration at one of your remote offices that is used intermittently by some of the sale people.

In the office there is a desktop computer connected to a DSL connection through its onboard network adapter and a cable. This desktop system also has a wireless card installed in one of the PCI slots.

The sales teams that visit the office are all running Vista Business Edition on their laptops

You need share the Internet connection from the desktop system while minimizing costs.

What should you do?

1. Set up an ad hoc computer-to-computer network.
2. Purchase additional cables and a hub for plug in use when the sales staff is on site.
3. Purchase a wireless access point and configure it to allow other computers to connect through it.
4. Disable your wireless adapter and share your wired adapter.

Correct answer(s): 1
Explanation: Setting up an ad hoc computer-to-computer network would allow you to use the wireless adapter in the desktop system to share out the Internet access that is provided by the wired Internet connection for no additional cost.

Purchasing a wireless access point and configuring it to allow other computers to connect through it would work but it would add additional cost that is not necessary given the scenario. The same would be true for the purchase additional cables and a hub option.

Along the same lines, disabling your wireless adapter and sharing out the wired adapter could be done if you were to get a hub and cabling but that is an unnecessary added cost when you can set up an ad hoc computer-to-computer network to share out the Internet access over the wireless adapter.

References:
Set up a computer-to-computer (ad hoc) network
Ad hoc networking

Objective: Configuring Network Connectivity

Question 40: (QID=25411)
You are an onsite desktop support technician for USA Coffee. The coffee shop allows wireless access to its network, enabling customers to communicate with each other as well as connect to the Internet.

A customer has a laptop computer that runs Windows Vista Business and they already have a wireless connection configured for their wireless network. The connection is configured to allow access to documents in their C:UsersPublic folder without having to provide user credentials for the users on that network.

The customer needs to connect to the coffee shops wireless network without allowing users on the coffee shop network access these documents.

You need to make configuration changes on the users laptop so that the customer can allow access to the documents for their wireless network and prevent users of the coffee shops wireless network from accessing the documents.

Your solution must not require the customer to make changes when switching between wireless networks.

What should you do?

1. Change the network category for the coffee shops wireless network to private. Turn off password protection. Turn off network discovery.
2. Change the network category for the coffee shops wireless network to private. Turn off password protection. Turn on network discovery.
3. Change the network category for the coffee shops wireless network to public. Turn off password protection. Turn off network discovery.
4. Change the network category for the coffee shops wireless network to public. Turn off password protection. Turn on network discovery.

Correct answer(s): 4
Explanation: In order to resolve this issue according to the limitations provided in the scenario you would need to change the network category for the coffee shops wireless network to public which would disable network discovery by default. Other devices on the coffee shops wireless network would not be able to view the resources on the customer’s laptop.

Another piece of the solution would be to turn off password protection and turn on network discovery as this allows users to access documents on the customer’s computer without providing credentials. These two settings are considered global settings and will not override network-specific settings. This means that even if password protection is off and network discovery is on, users will not be able to access documents in the C:UsersPublic folder when the customer is connected to the coffee shops wireless network because that network’s category is public.

You should not turn off network discovery as that would prevent the users on the other network from accessing files in the C:UsersPublic folder as they should be able to.

You should not change the network category for the coffee shops wireless network to private. This enables network discovery by default because the Private network configuration means that the computer is connected to a private network.

References:
Troubleshoot network connection problems
Troubleshooting Windows Vista 802.11 Wireless Connections

Objective: Configuring Network Connectivity

Ensurepass offers the Latest 2013 70-620 Exam PDF to pass the exams.