DreamPirates logo DreamPirates
business

MCSA Certification Exam - 70-270

- By boyd
Publish Date : 2021-02-24 12:19:58
MCSA Certification Exam - 70-270

Installing, Configuring and Administering Microsoft Windows XP Professional

After you study your text books it is important to test your newly acquired knowledge and see just how well you have absorbed the material. Practice exams....

* Reinforces what you learnt - fill in the gaps of what you missed
* Gets you used to answering questions to build confidence and familiarity

Here are 10 Multiple choice exams questions for you to practice on:

Question 1# - You are the administrator of a Windows XP Professional computer named computer1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Ineternet Connection Sharing (ICS) and Internet Connection Firewall (ICF) on computer1.

You run an application named App1 on computer1. App1 communicates with an online training company on the Internet. In order to display an online seminar, the training company needs to contact the App1 application at port 5800.

You want to ensure that the training company can connect to the App1 application. What should you do?

A. Configure ICF to enable the Internet Control Message Protocol (ICMP) Allow redirect. Then start the App1 application that opens port 5800.

B. Create a new service definition named App1. Use port 5800 as the external and internal port number.

C. Edit the %systemroot&System32DriversEtcServices file on Pro1 to include a service definition named App1 for port 5800.

D. Change the TCP/IP settings on computer1 to enable TCP/IP filtering. Permit network traffic on port 5800.

Question 2# - You are the desktop administrator for your company's sales department. The IT manager for the sales department wants to ensure that each Windows XP Professional event log retains approximately 5 MB of data.

He deploys this policy to the computers in the sales department by using Group Policy. You find out that the policy has not been applied consistently. You need to ensure that the policy is applied consistently. Which command should you run?

A. Secedit /refreshpolicy user_policy
B. Secedit /refreshpolicy machine_policy
C. Gpupdate /target:computer
D. Gpupdate /target:user

Question 3# - You are the desktop administrator for Adventure Works. You perform a clean installation of Windows XP Professional on 25 computers. All of these computers are part of a workgroup named Dev. All of the computers in Dev are configured to require a user name and password for logon. Thirty day after the installation, all users in the Dev workgroup report that they cannot log on to their computers. How should you correct this problem?

A. Use the Windows product Activation wizard on all computers to activate Windows XP Professional via the Microsoft Clearing House.

B. On each computer, log on as a local administrator and reset the user password at the next logon.

C. Restart each computer in safe mode, and change the local account policy expiration from 30 days to zero days.

D. Restart each computer in safe mode. Use system restore, specifying the restore point that was created after the clean installation of Windows XP Professional.

Question 4# - You have updated a device driver for a computer running Windows XP Professional, but you now experience system problems. What should you do to correct the problem?

A. Restart the computer

B. Remove the device driver you updated and reinstall it.

C. Roll back the device driver you installed to the previous driver.

D. Using the Add Hardware Wizard, remove and reinstall the hardware with the updated device driver

E. Verify that the device driver was signed by Microsoft and reinstall it

Question 5# - You have enabled files on a user's computer for offline use. Which of the following events occur when the user disconnects from the network?

A. The user is prompted to identify whether the system should keep the network version of the file or the user's local copy of the file.

B. Changes to the user's local copy of the file are overwritten by the network copy.

C. The user begins to work with a local cached copy of the file instead of the network version of the file.

D. The network copy of the file and the local cached copy of the file are synchronized.

E. The local copy of the file replaces the network copy.

 

https://nileshomeschool.instructure.com/eportfolios/485/PDF_Questions_2021/Brilliant_DES5121_Exam
https://nileshomeschool.instructure.com/eportfolios/485/PDF_Questions_2021/Excellent_DES5221_Exam
https://nileshomeschool.instructure.com/eportfolios/485/PDF_Questions_2021/Brilliant_DES6321_Exam
https://nileshomeschool.instructure.com/eportfolios/485/PDF_Questions_2021/Splendid_DES6332_Exam
https://nileshomeschool.instructure.com/eportfolios/485/PDF_Questions_2021/Brilliant_DES9131_Exam

Question 6# - A computer that you support has been the target of a hacker. You would like more information about how this user is attempting to gain access to this computer. Which log should you examine?

A. The Security Log.
B. The System Log.
C. The Application Log.
D. The Authentication Log.
E. The Events Log.

Question 7# - You are the help desk support staff for a sports equipment manufacturer. You are configuring your portable computer.

You configure your system such that the start time can be reduced and the complete state of the computer can be saved and then the power turned off. On one instance the system state fails to be restored. What is the likely problem?

A. POST is disabled
B. the hibernation file is corrupted
C. stand-by is disabled
D. energy star is disabled

Question 8# - A remote user would like to make a faster connection to the network. She is limited to using a dial-up connection. Her location does not support DSL or cable modem connections. What, if any, options are available to this user?

A. The user should use v.92 compression routines to increase the amount of data throughput.

B. The user should set up a multilink connection, using two modems to connect to the Internet.

C. The user should investigate the availability of ISDN service.

D. You should investigate establishing a point-to-point wireless link between your location and the user's.

E. The user should have a dedicated data line installed by the phone company.

Question 9# - You believe you are experiencing packet loss somewhere on your network. Which tool would be helpful in locatiing a potential source for the loss?



Category : business

Tips For Getting A Free Car Removal Service In 2021

Tips For Getting A Free Car Removal Service In 2021

- They also offer cash for cars brisbane from owners who want to sell their car but would rather keep it. The EZ Cash For Cars program


Mobile Marketing Strategies That Can Work For You

Mobile Marketing Strategies That Can Work For You

- harder to make a deal and convince someone you deserve a better price on a vehicle if you are draped in expensive clothing. While you want to appear neat an ct


Web Hosting Made Simple For The Novice!!

Web Hosting Made Simple For The Novice!!

- No one knows for sure how to go about this, but what you can begin by assessing your business costs, and one of the most important for an online


Be Good In Your UiPath-ARDv1 Exam Preparation 2021

Be Good In Your UiPath-ARDv1 Exam Preparation 2021

- Numerous initiatives that are part of project-led obtaining out can expense quite a bit of money. It could be basic for parents to spend about a