Which of the following actions should you take?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network, including laptop computers, have Windows 8 installed.
You have been issued a laptop for use outside the office. The laptop always has an external hard
drive attached to it.
You want to make sure that the files in your Documents folder is backed up to the external hard
drive automatically at regular intervals during the day. You also want to make sure that various
editions of the files can be retrieved. You do not want your strategy to include the laptop’s
operating system files.
Which of the following actions should you take?
Which of the following actions should you take?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You have received instructions to install a printer on a new workstation. The printer software
includes a program that executes at startup.
Subsequent to the installation, You are informed that the program must not execute at startup.
Which of the following actions should you take?
Which option is the minimum available?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You are in the process of setting up File History on your workstation. You are configuring the Keep
saved versions Advanced settings.
Which option is the minimum available?
Which of the following is the feature you should use?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You have been instructed to make sure that users have the ability to restore files using a Windows
feature that backs up all libraries in the designated folder.
Which of the following is the feature you should use?
Which of the following command line parameters should you use?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network, including laptops, have Windows 8 installed.
You have been assigned a laptop that you use for training purposes. Subsequent to updating the
laptop’s video driver, you link it to an external display device.
You want to make sure that you are able to display the desktop across the internal and external
displays. You do not want the displays to show the same images.
You decide to make use of DisplaySwitch.exe.
Which of the following command line parameters should you use?
Which of the following are the available types of virtual network switches?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You have just completed the installation of Hyper-V on a ABC.com workstation. Subsequent to
launching the program, you decide to add a virtual network switch.
Which of the following are the available types of virtual network switches? (Choose all that apply.)
Which of the following is a method that should be included in your code?
Topic 1, Scenario 1
Background
You are making use of Visual Studio 2012 to create an ASP.NET MVC application to log training
information for a cycling club.
Business Requirements
The application needs to host data regarding training dates, distances, and duration. Application
users must be able to view and modify data. The application itself should be highly accessible.
The application should also allow for times to be presented in the user’s native time.
Technical Requirements
A public class, named CyclistLog.DataAccess.CyclistLogDb, deals with database access. HTTP
GET should be used for all data retrieval. HTTP POST should be used for all data updates.
A master layout file, named \Views\Shared\_Layout.cshtml, is used by all pages in the application.
The application makes use of the \Models\LogModel.cs model.
The Razor view engine is used for all views in the application. The \Views\CyclingLog includes the
_CalculateSpeed.cshtml, EditLog.cshtml, GetLog.cshtml, and InsertLog.cshtml views. The
application, however, includes a \Views\Home\Index.cshtml view.
The controller included in the application is \Controllers\CyclingLogController.cs. You have also
included a timer.png image in the \Images folder.
When a user examines a cycling log, the user’s trail map is accessible. This map is configured as
a video and an Adobe Flash application. The browser should using H264, Ogg, or WebM formats
(in this order) to present the video natively. The Flash application should be used In the event that
the video cannot be presented.
Security:
The application should make use of forms authentication, and requires user logon for entering
information. The editing or deleting of cyclist information requires a user to be a member of the
Admin role.
Users must be members of the Admin role to.
You need to the application should be defended against cross-site request forgery. The SHA1
algorithm should be used to hash passwords.
A custom role provider must be included in CyclistLog.Providers.CyclingLogRoleProvider.es.
*************************************
You have received instructions to make sure that the Views\CyclingLog\_CalculateSpeed.cshtml
partial view, from the Views\Cyclelog \GetLog.cshtml, is configured to show the cyclist’s average
speed per kilometer.
You need to write the necessary code to apply the view.
Which of the following is a method that should be included in your code?
Which of the following describes a reason for adding a site to this list?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You are running a training exercise for new employees who have not experienced the latest
editions of Internet Explorer. You are in the process of discussing the Compatibility View List for
IE9.
Which of the following describes a reason for adding a site to this list? (Choose all that apply.)
Which of the following actions should you take?
Topic 1, Scenario 1
Background
You are making use of Visual Studio 2012 to create an ASP.NET MVC application to log training
information for a cycling club.
Business Requirements
The application needs to host data regarding training dates, distances, and duration. Application
users must be able to view and modify data. The application itself should be highly accessible.
The application should also allow for times to be presented in the user’s native time.
Technical Requirements
A public class, named CyclistLog.DataAccess.CyclistLogDb, deals with database access. HTTP
GET should be used for all data retrieval. HTTP POST should be used for all data updates.
A master layout file, named \Views\Shared\_Layout.cshtml, is used by all pages in the application.
The application makes use of the \Models\LogModel.cs model.
The Razor view engine is used for all views in the application. The \Views\CyclingLog includes the
_CalculateSpeed.cshtml, EditLog.cshtml, GetLog.cshtml, and InsertLog.cshtml views. The
application, however, includes a \Views\Home\Index.cshtml view.
The controller included in the application is \Controllers\CyclingLogController.cs. You have also
included a timer.png image in the \Images folder.
When a user examines a cycling log, the user’s trail map is accessible. This map is configured as
a video and an Adobe Flash application. The browser should using H264, Ogg, or WebM formats
(in this order) to present the video natively. The Flash application should be used In the event that
the video cannot be presented.
Security:
The application should make use of forms authentication, and requires user logon for entering
information. The editing or deleting of cyclist information requires a user to be a member of the
Admin role.
Users must be members of the Admin role to.
You need to the application should be defended against cross-site request forgery. The SHA1
algorithm should be used to hash passwords.
A custom role provider must be included in CyclistLog.Providers.CyclingLogRoleProvider.es.
*************************************
You have been instructed to meet the business requirements with regards to security.
You are required to make changes to the CyclingLogController.
Which of the following actions should you take?
Which of the following actions should you take?
You are employed as an administrator at ABC.com. The ABC.com network is made up of an
Active Directory Domain Services (AD DS) domain, named ABC.com. All workstations on the
ABC.com network have Windows 8 installed.
You have been instructed to make sure that ABC.com users are only allowed to make use of USB
storage devices that were issued to them for data storage. The use of personal devices should not
be allowed.
You want to modify the device installation settings for all workstations with the least amount of
administrative effort.
Which of the following actions should you take?