Download (direct link):
16. A, C, D, and E. Using these tools remotely assumes that you and the computer you're trying to administer share at least one network protocol in common. Choices B and F do not exist in Windows XP. Objective: Optimize and troubleshoot application performance (Chapter 14).
17. B. You can't use Last Known Good Configuration because you already logged on after installing the driver, making the LKG setup a defective setup. Safe Mode would probably work, but it takes a lot longer than simply rolling back the driver in Device Manager. As for choice D, it's unnecessarily draconian and could revert other settings unnecessarily. Choice E is more of a last resort; Safe Mode is much easier and faster. Objective: Troubleshoot system restoration by starting in Safe Mode (Chapter 15).
18. D. Denials override all other permissions, so the only way to let Jenna into the company budgets is to remove her from the Staff group, which has been denied the Full Control permission. Objective: Control access to shared folders by using permissions (Chapter 11).
19. D. The Extensible Authentication Protocol is your best bet for smart card authentication; the exam may also refer to EAP/TLS. Objective: Create a dial-up connection to connect to a remote access server (Chapter 13).
20. A. The Security Templates snap-in (which you must add to a new, custom console of your own devising) presents all the security settings of each available template in a handy hierarchical structure. Objective: Configure, manage, and troubleshoot a security configuration (Chapter 11).
21. D. Choice A, System File Checker, can detect violations of Windows File Protection and rebuild the DLLCACHE folder, but it doesn't report on digital signatures. Choice B doesn't exist; the System Configuration utility in Windows XP is MSCONFIG, not SYSCONFIG, and it doesn't report on digital signatures, anyway. C is wrong because of spelling. E isn't the best choice because, although Device Manager does show you digital signature information on the Driver tab of device property sheets, it doesn't cover non-driver system files. Objective: Manage and troubleshoot drivers and driver signing (Chapter 15).
22. D. Object access permits auditing the file system and the Registry. Objective: Configure, manage, and troubleshoot auditing (Chapter 10).
23. B. If the IP address for the default gateway is wrong or missing, then Sunny's PC has no way to connect to the Internet via the gateway. If her own PC's IP address was wrong or missing, she couldn't see local Windows 2000 servers. WINS doesn't enter into the equation because the gateway is specified in Windows XP using a numeric IP address, not a NetBIOS computer name. And DHCP doesn't have to be running for Sunny to access the Internet. Here's a tip to remember: If Sunny connects to the Internet or other subnets via a router, the default gateway is the IP address of the network port on the router that communicates with her subnet. Objective: Configure and troubleshoot the TCP/IP protocol (Chapter 6).
24. B, C, and E. Unlike Standby, Hibernation dumps memory contents to disk, so Hibernate will protect Jonathan's unsaved files. You may want to consider a combination of all three in order to achieve maximum power savings. Objective: Configure Advanced Configuration Power Interface (Chapter 9).
25. A. It stands for Microsoft Software Installer, never mind that the technology goes by the name of Windows Installer just about everywhere in the Microsoft documentation. The associated executable is MSIEXEC.EXE. Objective: Install applications by using Windows Installer packages (Chapter 12).
26. B and C. The modems can be different speeds, and can be either internal or external devices. Objective: Install, configure, and manage modems (Chapter 8).
27. A. Then you have the option of deciding whether to overwrite the server-based copy, or save your file to a different name (which you must specify). Objective: Manage and troubleshoot the synchronization of offline files (Chapter 12).
28. A. This is a so-called 'administrative share.' The root directory of each hard drive is also shared (as C$, D$, and so on). Objective: Create and remove shared folders (Chapter 11).
29. B. L2TP with IPsec provides the greatest security level for a VPN connection. You don't have the option of using IPsec with PPTP. Objective: Connect to computers by using a virtual private network (VPN) connection (Chapter 13).
30. B, D, and E. Choice A is wrong because the defragger works with all the file systems that Windows XP supports. B is true: You can't run this utility to defragment a server disk, for example. As for choice C, the figure is 15 percent, and both D and E weren't true in Windows 2000 but are true in XP (hurrah!). Objective: Optimize and troubleshoot disk performance (Chapter 14).
31. A. Generally, the easiest way to assign any network-wide setting is to set a policy at the network level, rather than run around and make each setting at the local workstation. Choice C is the correct procedure for blocking unsigned drivers on a single local PC. Choice D is simply wrong. Objective: Manage and troubleshoot driver signing (Chapter 15).