PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do first?

Your company has a Microsoft Exchange Server 2007 environment. Employees have Windows Mobile 6.5 devices. You manage the Windows Mobile devices by using Microsoft System Center Mobile Device Manager (MDM) 2008. A user forgets his Windows Mobile device password. You need to enable the user to access his Windows Mobile device without losing data. What should you do first?

Which approach should you recommend?

You are designing a site on SharePoint 2010. You need to design the site so that it meets the following
requirements:
Contributors must be able to use the SharePoint user interface to add, remove, and delete Web Parts only in a Web Part zone named Your Web Parts.
.Only site collection owners may add, remove, and delete Web Parts in a Web Part zone named Required Web Parts.

Which approach should you recommend?

What should you do?

You develop a run-time image by using Windows Embedded Standard. The image uses Enhanced Write Filter (EWF) to prevent changes to the run-time image. The image is installed on devices that connect to a Windows domain. Devices that run the image work correctly for a whole month. After that, they are unable to log on to the domain. You need to change the image to allow any device that runs the image to continue accessing the Windows domain after the image is deployed. You also need to ensure that the partition where the image is located remains protected. What should you do?

What are two possible ways to achieve this goal?

Employees have Windows Mobile 6.5 devices. You manage the Windows Mobile devices by using Microsoft System Center Mobile Device Manager (MDM) 2008. Windows Mobile devices are required to use public key infrastructure (PKI) certificates when connecting to the corporate network through a VPN connection. You provision the Windows Mobile devices with the appropriate PKI certificates for the organization and the devices. You need to ensure that Windows Mobile devices use the PKI certificates when connecting to the corporate network through a VPN connection.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do?

You are developing a Windows Embedded Standard image that uses the File-Based Write Filter (FBWF) technology. Your device storage is protected by FBWF without exclusions. The cache type for the FBWF setting is configured as pre-allocated. During device testing, you receive the following error message: ‘There is not enough disk space on the disk.”

You need to resolve the error. What should you do?