16 tips on How to 70-270 Test Like a Badass [97 to 112]

Precise of 70-270 test preparation materials and study guides for Microsoft certification for IT examinee, Real Success Guaranteed with Updated 70-270 pdf dumps vce Materials. 100% PASS MCSA Installing, Configuring, and Administering Microsoft Windows XP Professional exam Today!

2016 Apr 70-270 Study Guide Questions:

Q97. You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional.

You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete.

What should you do?

A. Add a [GuiUnattend] section to unattend.txt.

B. Include a [GuiRunOnce] section in unattend.txt.

C. Create an unattend.bat file. Place the file in the root of the installation source files.

D. Create a registry file named setup.reg. Place the file in the root of the installation source files.

Answer: B


Q98. You are a help desk technician for your company. The company network consists of a single Active Directory domain. All client computers run Windows XP Professional.

The help desk technicians use Remote Assistance to remotely control user sessions to provide online support to users. The users currently use Microsoft Exchange and Microsoft Outlook to submit Remote Assistance invitations to the help desk technicians.

Stephen is a user in the sales department. Stephen has a portable computer and frequently travels to customer locations. While Stephen is in the corporate office, he submits a Remote Assistance invitation to the help desk. When you attempt to answer the invitation and establish the Remote Assistance session, you receive the error message shown in the exhibit. (Click the Exhibit button.)


You verify that Stephen's computer is connected to the network and that he did not cancel the invitation.

You also verify that the invitation did not expire. You do not experience similar problems when establishing Remote Assistance sessions with other computers.

You need to be able to establish a Remote Assistance session with Stephen's computer. What should you do?

A. Enable the Remote Desktop service definition in Internet Connection Firewall (ICF) on Stephen's computer.

B. Add your user account to the Remote Desktop Users list on Stephen's computer.

C. In the System properties of Stephen's computer, select the Allow users to connect remotely to this computer option, and add your user account to the list of allowed users.

D. In the Local Security Policy of Stephen's computer, grant your user account the Allow logon through Terminal Services user right.

Answer: A


Q99. You are the domain administrator for your company. Roaming profiles are enabled for all users in the sales department. Roaming profiles are stored on a server named Server1, in a shared folder named Profiles.

Roger is a user in the sales department. Susan is Roger's manager. Susan reports that Roger modifies his desktop settings, which results in the need for help desk assistance and in lost productivity for Roger.

You want to ensure that Roger cannot modify his roaming profile. What should you do?

A. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.dat.

B. In Active Directory Users and Computers, on Roger's profile tab, change the profile path to \\Server1\Profiles\%username%.man.

C. In Roger's profile on Server1, change the file name of Ntuser.dat to Ntuser.man.

D. In Roger's profile on his computer, change the file name of Ntuser.dat to Ntuser.man.

Answer: C


Q100. You have a USB drive. You connect the drive to a computer that runs Windows XP Professional Service Pack 2 (SP2).

You discover that after 15 minutes, the USB drive fails to appear in My Computer.

You need to ensure that the USB drive appears in My Computer.

What should you do?

A. At the command prompt, run defrag.exe -f.

B. At the command prompt, run chkdsk.exe /f.

C. From Disk Management, assign a drive letter to the USB drive.

D. Delete the usbui.dll file from the computer, and then restart the computer.

Answer: C


Q101. You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.

Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication.

You need to configure the dial-up connection properties on Susan’s computer to dialin to the company network. Your solution must ensure that company security policies are enforced.

Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)

A. Select the Advanced (custom settings) security option.

B. Select the Require data encryption check box.

C. Select the Typical (recommended settings) security option.

D. Select the Use smart card item from the Validate my identity as follows list.

E. Select the Maximum strength encryption item from the Data encryption list.

F. Select the Allow these protocols option, and select the MS-CHAP v2 check box.

G. Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

Answer: AEG


70-270 free draindumps

Rebirth 70-270 test question:

Q102. You are the desktop administrator for your company. You are responsible for automating the deployment of Windows XP Professional to new computers in your company. You are preparing a Windows XP Professional computer, which you will use to test disk imaging.

You install Windows XP Professional on the test computer and run the Sysprep utility. You use a third-party software package to create a disk image. You apply the disk image to a new computer and then restart the computer.

Instead of completing the Windows XP Professional installation, the computer starts the Windows Welcome program, requiring you to enter additional setup information.

Because you will be deploying a large number of computers, you want to ensure that the disk image can be applied without additional user interaction. What should you do?

A. Use a network-based RIS server to apply the disk image to new computers.

B. On the test computer, run the Sysprep -factory command. Re-create the disk image by using the third-party software.

C. Use Setup Manager to create a Sysprep answer file. Copy the answer file to a floppy disk, and insert the disk into new computers when the disk image is applied.

D. Create an Unattend.txt answer file. Copy the file to the C:\Winnt\System32 folder on the test computer. Run the Sysprep utility and re-create the disk image by using the third-party software.

Answer: C


Q103. You have a computer that runs Windows XP Professional. Two users named User1 and User2 share the computer. User1 and User2 encrypt files on the computer.

User1 encrypts a file named file1. doc.

You need ensure that both User1 and User2 can view the contents of file1. doc.

What should you instruct User1 to do?

A. Add the certificate of User2 to file1. doc.

B. Assign User2 the Full Control NTFS permission on file1. doc.

C. Copy file1. doc the %systemroot%\documents and settings\all users\ folder.

D. Move file1. doc to the %systemroot%\documents and settings\all users\ folder.

Answer: A


Q104. How many years of experience do you have installing, configuring, and/or administering Windows XP Professional?

A. I have not done this yet.

B. Less than 1 year.

C. 1-2 years

D. 2-3 years

E. 3-4 years

F. 4-5 years

G. More than 5 years

Answer: A


Q105. You are the desktop administrator for one of your company's branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template.

One of the network administrators in the company's main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company's Windows XP Professional computers.

The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office.

What should you do?

A. Run the Secedit.exe command in validation mode and specify the new security template.

B. Run the Secedit.exe command in configuration mode and specify the new security template.

C. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform an Analyze operation.

D. Use the Security Configuration and Analysis console to import both templates into a security database, and then perform a Configure operation.

Answer: C


Q106. You are the desktop administrator for your company's sales department. Each Windows computer in the sales department runs Windows XP Professional and a third-party Internet browser.

Carmen is a user in the sales department. Carmen's computer has a single hard disk with two partitions, named drive C and drive G. Both partitions are formatted as FAT32. Carmen stores her data on drive G.

A folder named Files1 on drive G is shared as Files1. Users in the sales department have permissions to save documents in the Files1 shared folder.

Roger is the manager of the sales department. He wants to be able to read the documents that are in the Files1 shared folder from his UNIX client computer.

Carmen reports that users of the Windows XP Professional computers are able to successfully save files in the Files1 shared folder. Roger reports that he is not able to locate the Files1 shared folder while using his UNIX client computer.

You need to ensure that Roger can read files in the Files1 shared folder from his UNIX computer. Which two actions should you take? (Each correct answer presents part of the solution. Choose two.)

A. Create an additional share for the G:\Files1 folder and name the new share Wwwroot.

B. Create a Web share for the G:\Files1 folder.

C. Install Internet Information Services (IIS) on Carmen's computer.

D. Install Internet Explorer on Carmen's computer.

E. Convert drive G to NTFS.

F. Convert drive C to NTFS.

Answer: BC


70-270 practice question

High value 70-270 preparation exams:

Q107. You are the desktop administrator for your company. The company's network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers.

The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers.

You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1.

You need to apply NewSecurity.inf to the Windows XP Professional computers.

What should you do?

A. Use the Security Configuration and Analysis console to export a template named NewSec.inf from NewSec.sdb. Copy NewSec.inf to each client computer.

B. Write a logon script that copies NewSec.sdb to the %systemroot%\System32 folder on each client computer.

C. Copy NewSec.sdb to the Netlogon shared folder on each domain controller.

D. Write a logon script that runs the Secedit /configure /db \\Server1\Sec\NewSec.sdb command. Apply the logon script to all domain user accounts.

Answer: D


Q108. You are the desktop administrator for your company. You connect a print device to a Windows XP Professional computer for the users in the help desk department. You share the printer on the network as HDPrint. You grant the HDUsers and HDManagers groups Allow - Print permission on HDPrint. Several users in the HDUsers group report that it often takes several minutes for their print jobs to print after they are submitted. You investigate and discover that under normal use, the print queue length often exceeds 50 print jobs.

You want to improve printing performance for the users in the HDUsers group. What should you do?

A. Install a second printer that uses the same print device. Share the second printer as HDPrint2.

Configure a priority setting of 99 on HDPrint2.

B. Increase the print job priority settings to 99 for all print jobs that are submitted by the users in the HDUsers group.

C. Connect a second, identical print device to the Windows XP Professional computer. In the properties for HDPrint, select the Enable printer pooling check box.

D. In the printer properties for HDPrint, select the Print directly to the printer option and clear the Enable advanced printing features check box.

Answer: C


Q109. You are the desktop administrator for your company's sales department. Susan is a user in the sales department. Susan's Windows XP Professional computer has a single hard disk, which is formatted as NTFS.

Susan's computer contains a folder named C:\Files1. The C:\Files1 folder is shared as Files1. Users in the sales department have permissions to create files in the Files1 shared folder.

Company policy allows interns to read files, but prohibits interns from creating files in the Files1 shared folder. Company policy allows members of the Sales group and the Marketing group to create files in the Files1 shared folder.

Carlos is an intern. He is a member of the Interns group, the Sales group, and the Marketing group.

Susan reports that Carlos is able to create files in the Files1 shared folder.

You inspect Susan's computer to evaluate the Files1 shared folder. Permissions on Susan's computer are granted as shown in the following table.


You want ensure that Carlos cannot create files in the Files1 shared folder. What should you do?

A. On the Files1 shared folder, remove the Interns group's access.

B. On the C:\Files1 folder, remove the Interns group's access.

C. On the C:\Files1 folder, assign the Interns group Deny - Full Control permission.

D. On the C:\Files1 folder, assign the Interns group Deny - Write permission.

Answer: D


Q110. You have a computer that runs Windows XP Professional.

You attempt to install a device driver for a new printer and receive the error message shown in the exhibit.


You need to ensure that you can install the device driver.

What should you do?

A. Add your user account to the local Power Users group.

B. Add your user account to the local Administrators group.

C. From the Device Manager, uninstall the current display driver.

D. From the System properties, modify the Driver Signing option.

Answer: D


Q111. You have a portable computer that runs Windows XP Professional Service Pack 2 (SP2).

You need to configure the computer to generate an alert when only 25 percent of the battery life is available.

What should you do?

A. From the Performance console, create a trace log.

B. From the Performance console, create a counter log.

C. From the Power Options, modify the Alarm Action.

D. From the Power Options, select the Minimal Power Management power scheme.

Answer: C


Q112. Rate your level of proficiency with configuring, managing, and troubleshooting access to resources, such as files, folders, offline files, shared folders, and local and network printers.

A. Very High

B. High

C. Moderate

D. Low

E. Very Low

Answer: A