logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification Comments

  • Question
  • Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do?


  • Options
  • A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker.
  • B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.
  • C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter.
  • D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.

  • Correct Answer
  • On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate. 


  • Microsoft Certification problems


    Search Results


    • 1. Programs from the same developer, sold bundled together, that provide better integration and share common features, toolbars and menus are known as_________ ?

    • Options
    • A. integrated software packages
    • B. personal information managers
    • C. software processing packages
    • D. software suites
    • Discuss
    • 2. What do you mean by APM ?
    • Discuss
    • 3. Both Joyel and Susy share a Windows 10 tablet with different user accounts. Joyel needs to access some files in Susy?s Documents folder. How can he do this ?

    • Options
    • A. Joyel can access the files only if he has administrative rights
    • B. Susy must choose to make the Documents folder Public for Joyel to see them
    • C. Joyel can, by default, see and access the files in any Documents folder on this computer
    • D. Joyel cannot access those files without Susy moving them to another folder
    • Discuss
    • 4. Paint programs keep track of every __________ placed on the screen.

    • Options
    • A. Object
    • B. Image
    • C. Color
    • D. Pixel
    • Discuss
    • 5. What is plug and play ?
    • Discuss
    • 6. You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. You need to identify how much space is required to complete the migration. What should you do?

    • Options
    • A. On Computer1 run Loadstate c:\store /nocompress
    • B. On Computer1 run Scanstate c:\store /nocompress /p
    • C. On Computer2 run Loadstate \\computer1\store /nocompress
    • D. On Computer2 run Scanstate \\computer1\store /nocompress /p
    • Discuss
    • 7. You have a reference computer that runs Windows 7. You plan to deploy an image of the computer. You create an answer file named answer.xml. You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image?

    • Options
    • A. Imagex.exe /append answer.xml /check
    • B. Imagex.exe /mount answer.xml /verify
    • C. Sysprep.exe /reboot /audit /unattend:answer.xml
    • D. Sysprep.exe /generalize /oobe /unattend:answer.xml
    • Discuss
    • 8. Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Service Pack 3 (SP3). You install and configure Microsoft Windows Server Update Services (WSUS) 3.0 on a member server named Server1. You create a new Group Policy Object named GPO1 that enables automatic updating. You link GPO1 to the domain. You need to ensure that each client computer obtains software updates from Server1. What should you do?

    • Options
    • A. On each client computer, run Gpupdate /Force.
    • B. On each client computer, run wuauclt /detectnow.
    • C. From GPO1, configure the Enable client side targeting setting.
    • D. From GPO1, configure the Specify intranet Microsoft update service location setting.
    • Discuss
    • 9. You have a computer that runs Windows 7. A printer is installed on the computer. You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer. You need to ensure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the print jobs of other users. What should you do?

    • Options
    • A. From the printer's properties, assign the Print permission to the Sales group.
    • B. From the printer's properties, assign the Manage Documents permission to the Sales group.
    • C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
    • D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
    • Discuss
    • 10. You are a member of a team of developers creating several ASP.NET applications for XYZ. You want to create a reusable toolbar that will be used in each of the applications. The toolbar will be displayed at the top of each page viewed by the user. The contents of the toolbar will vary depending on options each user selects when creating a profile. You want to be able to add the toolbar to the ASP.NET toolbox for each of the developers on your team.What should you do?

    • Options
    • A. Create a new Web Control Library project. Create the toolbar within a Web custom control.
    • B. Add a new Web user control to your ASP.NET project. Create the toolbar within the Web user control.
    • C. Add a new Web Form to your ASP.NET project. Design the toolbar within the Web Form and save the Web Form with an .ascx extension.
    • D. Add a new component class to your ASP.NET project. Design the toolbar within the designer of the component class.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment