Exam 70-622 preparation questions

Page 1

Exam 70-622 study material Made available by Testkingprep.com

Free 70-622 Exam Preparation Questions Exam 70-622: Pro: Microsoft Desktop Support – Enterprise

Question:1

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. Windows Vista is run by the company computers in a single domain. The company has deployed an application named App01 on a server. There is a user named John in the sales department. Recently you receive a report from him saying that an error message pops up every time he runs App01. The error message says that the connection has timed out. For find out the reason for this problem and solve it, you have to gather statistical data from his computer. What action should you perform? A. The Windows Firewall properties should be opened, and the Security Logging for Dropped Packets option should be chosen. B. You should test connectivity with the default gateway by using the PING protocol. C. For Network Connection, Status Windows should be opened, the Diagnose option should be chosen. D. The Windows Firewall properties should be opened, and the Block all Programs option should be chosen. Answer: A Question:2 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. You have many desktop computers and laptop computers. Look at the table below. You intend to use third-party imaging software to deploy Windows Vista. First you have to find out the number of images required to have Windows Vista deployed to all hardware platforms. So what is the number of images required at least?

A. Zero B. One C. Two D. Three E. Four Answer: C Question:3 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has installed Windows Vista on the company computers. A system utility is used to monitor a computer and it runs through Task Scheduler. The system utility injects a DLL file into the explorer.exe process by using an executable file. When you run explorer.exe by using the Run command, you find that the system utility terminates xplorer.exe. You have to stop the system utility while not logging off users. What action should you perform? A. You should use the Shutdown command to log off the user account.

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


B. The System Utility task should be restarted. C. You should use the Schtasks command to end the looping task. D. You should use the Schtasks command to delete the looping task. Answer: C Question:4 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has deployed Windows Vista on company computer. You find the 0x80070003 error at the time that you examine updates on the Windows Update Web site. Therefore, you must solve this problem, making sure that your computer is able to download and apply new updates. What action should be performed? A. The WindowsUpdate.log file should be deleted. B. In the C:\Windows\SoftwareDistribution\Datastore and C:\Windows\SoftwareDistribution\Download folders, all files should be deleted. C. The Windows Installer service should be restarted. D. The Background Intelligence Transfer Service should be restarted. Answer: B Question:5 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. There are computers that run Windows Vista in your company. Now the company wants to monitor services and startup programs on these computers. Since you are the technical support, you are asked to work out a solution for monitoring it. So what is your strategy? A. A performance counter alert Data Collector Set should be used. B. A system configuration information Data Collector Set should be used. C. An event trace data Data Collector Set should be used. D. A performance counters Data Collector Set should be used. Answer: B Question:6 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has installed Windows Vista on the company computers. The application writes events to the Application event log whenever an unauthorized process tries to access a security-sensitive application. Since you are the technical support, you are asked to make sure that whenever an unauthorized process tries to access the application, Windows Vista computers shut down at once. So what action should you perform to accomplish your task? A. In order to accomplish your task, a logon script should be created to run shutdown.exe. B. In order to accomplish your task, you should create a new event by using Task Scheduler. C. In order to accomplish your task, you should create a new view by using Event Viewer. D. In order to accomplish your task, Windows Process Activation Service service should be started. Answer: B Question:7 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has deployed Windows XP Professional on the company computers. According to the company requirement, these computers need to be upgraded to Windows Vista. But after the upgrade, users report that they fail to load their roaming user profiles on the

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


upgraded computers. Since you are the technical support, you are asked to solve this problem. So what action should you perform to make users be able to do that? A. The Folder Redirection group policy should be configured to redirect specific user folders to the original user profile location. B. On the upgraded computers, new roaming profiles should be created. C. On the upgraded computers, the roaming user profile should be enabled. D. In the original user profiles, ntuser.dat should be changed to ntuser.man. Answer: A Question:8 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. After you use an administrator account to log on to a Windows Vista computer, you perform an administrative task. However, you are not prompted for credentials. You must make sure that all attempts of performing administrative tasks are prompted form credentials. Besides, you must make sure that your local user account cannot be accessed remotely by users. What action should you perform to achieve your goal? A. The Secondary Logon service should be configured to start automatically and the computer should be restarted. B. Right-click shortcuts to applications and Run should be used as a feature. C. Windows Firewall should be enabled and restart the Windows Firewall service should be restarted. D. The User Account Control feature should be enabled and the computer should be restarted. Answer: D Question:9 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. Between a source computer and a collecting computer, even forwarding is set up by you. The collecting computer has a standard user set to run the subscription. On the collecting computer, the subscription status is displayed as Trying. You are sure that on the source computer no error exists and the firewall is configured correctly. Now the company wants to know the subscription run time status. Therefore, you have to view it. What action should you perform? A. In order to view it, the Security event log should be analyzed. B. In order to view it, the the dtcinstall.log file should be analyzed. C. In order to view it, the Resultant Set of Policy console should be used. D. In order to view it, the Wecutil .exe command line utility should be used. Answer: D Question:10 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. A folder named Scripts On the root of drive C, a folder named Scripts is created by you. After a VBS script file is created, the VBS script is saved to the Scripts folder. The following message pops up at the time that the script is run. You must make sure that the script can run successfully. So what action should you perform to achieve this goal? Windows Script Host Error: "Execution of the Windows Script Host failed. (This program is blocked by group policy. For more information, contact your system administrator. )" A. In order to achieve this goal, the VBS script file should be stored in the System32 folder and a new hash rule should be created for the script. B. In order to achieve this goal, a new path rule should be created for the script.

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


C. In order to achieve this goal, the Microsoft Windows Firewall should be configured to allow all VBS scrip files. D. In order to achieve this goal, you should log on to the computer as an administrator and run the script. Answer: B Question:11 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has installed Windows Vista on company computers. The All Comm policy is assigned to the computers. According to the company security policy, the computers should encrypt all outgoing traffic. Since you are the technical support, the company assigns this task to you that you have to make sure of this. To accomplish your task, what action should you perform? A. In order to make sure of this, the source address of the existing filter should be set to My IP address. B. In order to make sure of this, the All Comm policy should be deleted. C. In order to make sure of this, the Secure Comm policy should be assigned. D. In order to make sure of this, the All Comm policy should be configured to use a mirrored filter. Answer: C Question:12 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has deployed Windows Vista on all company computers. The company stores the .vbs logon script files in a shared network folder. All of these scripts are signed. According to the company requirement, users are not allowed to run unsigned scripts on their computers. Since you are the technical support, the company asks you to make sure of this. The company also requires that no other applications should be affected. After a new software restriction policy is created, what is your next action? (choose more than one) A. After a certificate rule is created, the security level should be set to Unrestricted. B. Disallowed should be set as the default security level. C. After a path rule is created, *.vbs files should be added, and the security level should be set to Unrestricted. D. After a path rule is created, the frequently used application should be added, and the security level should be set to Unrestricted. E. After a path rule is created, *.vbs files should be added to the shared network folder, and the security level should be set to Disallowed. Answer: A, E Question:13 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. For all company users, the company has created a software restriction policy and set it to Unrestricted. All authorized corporate scripts have been digitally signed by the security team. What the security care about is that users may execute .vbs scripts from untrusted sources. But according to the security policy of the company, this is not allowed. Since you are the technical support, you have to prevent this from happening. So what configuration should you perform? (choose more than one) A. For \\%userdomain%\sysvol, after a path rule is created, the rule should be set to Disallowed. B. For the Trusted Sites zone, after a network zone rule is created, the rule should be set to Basic User. C. After a path rule for *.vbs is created, the rule should be set to Disallowed.

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


D. For the corporate certificate, after a certificate rule is created, the rule should be set to Unrestricted. E. For the Local Intranet zone, after a network zone rule is created, the rule should be set to Unrestricted. Answer: C, D Question:14 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. There are four departments in the company. Computers in the Accounting have Windows NT Workstation 4.0 with Service Pack 6 installed and are members of the corporate domain. Computers in the Graphics department have Windows Vista installed and are members of their own domain in a separate forest. Computers in the Research department have Windows Vista or Windows XP Professional installed and they are members of a workgroup and run. Computers in the sales department have Windows Vista or Microsoft Windows XP Professional and are members of the corporate domain. According to the company requirement, you must make sure that all the computers in the company use Kerberos to authenticate. What action should you perform to make sure of this? (Choose more than one) A. Between the forest that hosts the Graphics department domain and the Sales department domain, a forest trust should be built. B. In the Accounting department, all the computers should be upgraded to Windows Vista. C. In the Research department, all the computers should be joined to the corporate domain. D. The local policy on each Windows Vista computer should be configured to reject NTLM responses. Answer: B, C Question:15 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. The company has deployed Windows Vista on all company computers. In order to keep data secure, the company wants to perform the backup of Windows Vista computers, if a hard disk failure occurs, a restore can be enabled by the backup. Since you are the technical support, the company assigns this task to you. What action should you perform? A. In order to accomplish your task, automatic restore points should be configured for all disks. B. In order to accomplish your task, the Indexing Service feature should be turned on. C. In order to accomplish your task, Backup Status and Configuration should be run, and Complete PC Backup should be created. D. In order to accomplish your task, Backup Status and Configuration should be run, and Complete File Backup should be created. Answer: C Question:16 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. There is a single Active Directory domain in the company network. A Group Policy object (GPO) named SApp is linked to the Sales organizational unit (OU). The company has configured SApp GPO to assign an application named HRApp. A user is transferred from the sales department to the marketing department. The user account must be moved to the Marketing OU. You are sure that HRApp can be run by the user. You have to work out a solution that permits only users in the Sales OU to run HRApp. What is your solution? A. For users no longer under the scope of the GPO, the HRApp GPO should be modified to uninstall the application.

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


B. For all users that run gpupdate.exe, a logon script should be defined. C. The HRApp GPO link should be configured with the No Override option. D. The Human Resources OU should be configured to block policy inheritance. Answer: A Question:17 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. A user named Tom works in the sales department of your company. He has a Windows Vista computer. This computer is connected to a wireless network. He does not want other computers on the wireless network to discover your computer. Since you are the technical support, he asks for your help to make sure of this. So what action should you perform? A. In order to make sure of this, the Location type of the wireless network should be set to Private. B. In order to make sure of this, Windows Firewall should be disabled. C. In order to make sure of this, the Client should be uninstalled for Microsoft Networks service. D. In order to make sure of this, the Location type of the wireless network should be set to Public. Answer: D Question:18 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. You receive users report that when they connect to an intranet Web site, they receive an information bar prompting them to install an ActiveX control. Users should be allowed to install the ActiveX control without being prompted for confirmation. You have to make sure of this. What action should you perform? A. In Internet Explorer, the Internet Zone settings should be changed to prompt for ActiveX controls automatically. B. The ActiveX Installer feature should be installed. C. You should contact the application manufacturer and ask them to update their software to run under Windows Vista. D. You should ask the users to have the intranet Web site added to the list of Trusted Web sites in Internet Explorer. Answer: D Question:19 You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. Computers that run either the Japanese or English interface of Windows Vista perform the management of Group Policy for Windows Vista computers. The company wants to have a custom.admx file created. Since you are the technical support, you are assigned this task. You must make sure that the new settings will appear in the native language of the computer that is being used to manage the settings. What action should you perform? A. An .admx file should be created for each language. B. An .adml file should be created for each language. C. On all computers that are used to manage the settings, the Windows Remote Management service should be started. D. On all computers that are used to manage the settings, the language should be enabled. Answer: B Question:20

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


You are an IT professional who has experience in supporting and troubleshooting Applications on a Windows Vista Client. You also have experience in deploying Windows Vista, managing security, and troubleshooting network-related issues. At present you are employed as the desktop support technician for a company named Wiikigo. Windows Vista has been installed on the company computers. Users use Windows Mail to send security reports to the head office over the Internet. In order to keep these security reports secure, the company requires that when they are transmitted over the Internet, they must be encrypted. Since you are the technical support, you are asked to make sure of this. So what action should you perform? A. SMTP should be used. B. S/MIME should be used. C. Encrypted File System (EFS) should be used. D. POP3 with Secure Sockets Layer (SSL) should be used. Answer: B

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


For complete Exam 70-622 Training kits and Self-Paced Study Material Visit: http://www.testkingprep.com/70-622.html

http://www.testkingprep.com/

For Latest 70-622 Exam Questions and study guides- visit- http://www.testkingprep.com/70-622.html


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.