REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 

Mag

Charles

Nathaniel

 
 

 

Braindumps of 70-272
Supporting Users and Troubleshooting
Desktop Applications on a Microsoft Windows XP Operating System

Exam Questions, Answers, Braindumps (70-272)

This brain dumps is provided with ratings from different students. I used www.examcheats.net study material and the exam was not a problem.

1: You are a desktop support technician for Abc . All client computers run Windows XP Professional. The network consists of a Windows 2000 Active Directory domain. A department manager reports that some of the files on drive D on her computer were deleted and other data was modified. You need to track when unauthorized users attempt to modify or delete data from drive D on the manager's computer. What should you do first?
A. Run the secedit command on the client computer.
B. Run the gpupdate command on the client computer.
C. Configure the security access control list for drive D on the client computer to audit the Everyone group.
D. Configure the access control list for drive D on the client computer to assign the Deny - Change permission for the Everyone group.
Answer: C
Explanation:
You must track unauthorized attempts to modify or delete the files so auditing the everyone group is the correct choice.
2: You are a desktop support technician for Abc . All client computers run Windows XP Professional and Microsoft Office 2003. A software developer reports that she must be able to install new software, updates, and device drivers on her computer. She also must be able to manage the computer's event logs. She states that she usually logs on to the computer by using a domain user account. You confirm that written company policy allows the developer to perform these tasks on her computer. However, the user account used to perform these tasks must not have access to network resources that require authentication. You need to ensure the computer is configured to meet the developer's requirements. What should you do?
A. Add the developer's domain user account to the computer's local Power Users group.
B. Add the developer's domain user account to the computer's local Administrators group.
C. Create a new local user account on the computer, and add it to the local Power Users group.
D. Create a new local user account on the computer, and add it to the local Administrators group.
Answer: B
Explanation:
Adding the developer's domain account to the computer's local administrators group is correct because she mustmanage computer event logs in addition, to the updates, install new software etc. The local power's users group does not have the required permissions.
3: You are a desktop support technician for Abc . All client computers run Windows XP Professional. The company has a main office and a branch office. The branch office has a wireless network. The Service Set Identifier (SSID) of the wireless network is named CoBranch. Data on the wireless network is protected by using static Wired Equivalent Privacy (WEP) keys. A user travels from the main office to the branch office. The user's portable computer has a wireless network adapter that supports the Wireless Zero Configuration service. The wireless network connection icon in the taskbar notification area indicates that the wireless adapter is connected to CoBranch with a signal strength of Excellent. The user reports that she is unable to access her e-mail messages or connect to any Web sites on the Internet. You discover that the IP address displayed in the Wireless Network Connection Status dialog box is 169.254.66.227. You verify that the branch office DHCP server is running and configured correctly and that other branch office users are able to connect to the wireless network, access their e-mail messages, and view Web sites on the Internet. You need to ensure that the user is able to access her e-mail and connect to Web sites on the Internet. What should you instruct the user to do?
A. Clear the Enable network access control using IEEE 802.1x check box on the Authentication tab of the Wireless Network Connection properties page.
B. Select the Data encryption (WEP enabled) check box on the Wireless Networks Properties tab of the Wireless Network Connection properties page. Then manually enter the network key assigned to the wireless access points.
C. Select the Network Authentication (Shared mode) check box on the Wireless Networks Properties tab of the Wireless Network Connection properties page.
D. Enter the SSID of the branch office wireless network on the Wireless Networks Properties tab of the Wireless Network Connection properties page.
Answer: B
4: You are the desktop application support specialist for Abc .com. Abc .com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. You are trying to help your users to secure their files. If you use the cipher command to generate a recovery agent certificate, what files will be created?
A. .pfx file
B. .cer file.
C. .idx file
D. .lre file
Answer: A, B
Explanation:
To generate a recovery agent certificate, follow these steps:
1. Log on as Administrator.
2. At a command prompt, type cipher /r:filename.
3. When prompted, type a password that will be used to protect the files you create.
This generates both a .pfx file and a .cer file with the file name you specify.
5: You are the desktop application support specialist for Abc .com. Abc .com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. You are trying to help your users to secure their files. It is always recommended that encryption is done on a __________ basis.
A. Per folder
B. Per file
C. Per user
D. Per application
E. None of the above above.
Answer: A
Explanation:
Always encrypt folders, not files. When a folder is encrypted, all files created in that folder are encrypted. Many editing programs save a new copy of the document you are editing. This copy will be encrypted if you encrypt the folder, but it will be plain text if you only encrypt the original file.
6: You are the desktop application support specialist for Abc .com. Abc .com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. Your user asks you what program can be used to open and read a cookie file. Which of the followings programs can help?
A. Notepad
B. Photo Editor
C. Regedt32
D. NetDom
Answer: A
Explanation:
A cookie is a small text file that enables a Web site to personalize its offerings in some way. The Web site downloads the cookie to your hard disk (Internet Explorer stores it in the folder %UserProfile%\Cookies., and then reads the cookie from your hard disk on your subsequent visits to the site.
7: You are the desktop application support specialist for Abc .com. Abc .com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. You want to clean up the cookies inside your computer. Which directory should you look into?
A. %UserProfile%Cookies
B. %UserProfileTemporary Internet Files
C. %UserProfileApplication Data
D. %UserProfileLocal Settings
E. %UserProfileMy Documents
Answer: A
Explanation:
A cookie is a small text file that enables a Web site to personalize its offerings in some way. The Web site downloads the cookie to your hard disk (Internet Explorer stores it in the folder %UserProfile%\Cookies., and then reads the cookie from your hard disk on your subsequent visits to the site.

70-272


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend