PrepAway - Latest Free Exam Questions & Answers

Category: 70-270

Exam 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional

What should you do?

You create an unattended installation file named unattend.txt. You plan to use an answer file to perform an automated installation of Windows XP Professional.
You need to ensure that a line-of-business application is installed automatically after the installation of Windows XP Professional is complete.
What should you do?

What should you run?

You plan to install Windows XP Professional on a new computer.You have an answer file named unattend.txt and a uniqueness database file named unattend.udb. Unattend.udb contains a section for a computer named Computer1. You copy the Windows XP Professional source files, unattend.txt, and unattend.udb to a network share named Source. You start the new computer by using a network startup disk, and then map X: to the Source share. You need to start an unattended installation of Windows XP Professional on Computer1. What should you run?

What should you do?

You are the administrator of 30 Windows XP Professional computers. The computers are not members of a domain. Users of the Windows XP Professional computers encrypt files on the local computers. A user named Stephen reports that he cannot remember his current password. However, he does remember his previous password. Before he changed to his current password, Stephen created a password reset disk. You want to ensure that Stephen can log on to his Windows XP Professional computer again, and that he can open the encrypted files. What should you do?

How should you configure the local computer policy on these computers?

You are a help desk technician for your company. Your company�s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available.As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers?

What should you do?

You are the desktop administrator for one of your company’s branch offices. The network in your branch office contains 100 Windows XP Professional computers. The computers are configured with the Compatws.inf security template. One of the network administrators in the company’s main office creates a new security template named CompanySec.inf. The new template is designed to be applied to each of the company’s Windows XP Professional computers. The users in your branch office have different security requirements from the users in the main office. You need to find out whether the new security template will violate the security requirements of the users in the branch office. What should you do?

What are two possible ways to achieve this goal?

You are the desktop administrator for your company. The company’s network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the
changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer’s local security policy.What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)

What should you do?

You are the desktop administrator for your company. The company’s network consists of a single Microsoft Windows NT domain. The network contains 2,000 Windows XP Professional computers. The information security department releases a new security template named NewSecurity.inf. You are instructed to apply the new template to all 2,000 Windows XP Professional computers. You use the Security Configuration and Analysis console to import NewSecurity.inf into a security database named NewSec.sdb. You copy NewSec.sdb to a folder named Sec on a server named Server1. You need to apply NewSecurity.inf to the Windows XP Professional computers. What should you do?


Page 5 of 14« First...34567...10...Last »