Plug and Play is a technology wherein hardware components that are installed on PC's using Microsoft operating system are immediately recognized and made usable This means that the drivers necessary to make it work are already available in the operating system package
Microsoft Certification problems
Search Results
1. Why that you cannot overload the scope resolution operator (::) ?
Correct Answer: The main reason why the (::) cannot be overloaded is that only operators that take in values as parameters can be overloaded The scope resolution operator does not take a value as parameter
2. As a network administrator you have been requested to move a printer from your company's Marketing OU to your company's Research OU. After the move you test the printer and find that the local administrator assigned to the Marketing OU still has access and can remove print jobs from it. What can you do to change this?
Options
A. Remove the permissions for the local administrator from the printer.
B. Remove printer permissions from the local administrator.
Correct Answer: Remove the permissions for the local administrator from the printer.
3. Your network consists of a single Active Directory domain. You have 10 Web servers run Windows Server 2003 Service Pack 2 (SP2). You need to archive all of the application event logs for all the Web servers. The archived logs must contain all information from the original logs. What should you do?
Options
A. Connect to each Web Server by using Event Viewer. Save the Application logs as the CSV file type.
B. Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
C. On each Web server, open the Security Configuration and Analysis snap in, analyze the computer, and then export the settings.
D. Run Security Configuration Wizard for each Web Server. Save the data to an .inf file.
Correct Answer: Connect to each Web Server by using Event Viewer. Save the Application logs as the Event Log file type.
4. You have a computer that runs Windows 7. You need to confirm that all device drivers installed on the computer are digitally signed. What should you do?
Options
A. At a command prompt, run Verify.
B. At a command prompt, run Sigverif.exe.
C. From Device Manager, click Scan for hardware changes.
D. From Device Manager, select the Devices by connection view.
Correct Answer: At a command prompt, run Sigverif.exe.
5. You recently been promoted to Network Administrator for DLM Shipping. When you took over this position the first thing you notice is this Windows 2000 environment using DNS naming convention, root domain is DIM.COM, with numerous child domains. User accounts are stored in the child domains. However your supervisor informs you that root domain is misspelled and should be DLM.COM. He explains this is causing tremendous problems with the users and customers. He wants you to rename the domain. What will happen if you rename this root domain server?
Options
A. When you rename the root domain server you will only have to rebuild the user accounts since the root domain holds the authentication (SAM) database.
B. When you rename the root domain server you will simply rename the child domain also.
C. When you rename the root domain server you will lose the entire network orphaning the child domains.
D. When you rename the root domain server you will not need to do anything else since domain names are inherited the child domains will acquire the new domain name.
7. Both Joyel and Susy share a Windows 10 tablet with different user accounts. Joyel needs to access some files in Susy?s Documents folder. How can he do this ?
Options
A. Joyel can access the files only if he has administrative rights
B. Susy must choose to make the Documents folder Public for Joyel to see them
C. Joyel can, by default, see and access the files in any Documents folder on this computer
D. Joyel cannot access those files without Susy moving them to another folder
Correct Answer: APM is abbreviated as Advanced Power Management, which was developed by Microsoft and Intel as an API This API is mainly utilised for power management, and is very useful especially to those using Windows on their laptops or desktops
9. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as_________ ?
10. Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?
Options
A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.