Microsoft Certification Questions

Q:

You want to monitor and configure your organization's removable media, including a tape library and optical discs. Which Windows 2000 tool can you use to do this?

A) Remote Storage B) Sounds and Multimedia
C) Imaging D) Removable Storage
 
Answer & Explanation Answer: D) Removable Storage

Explanation:

Removable Storage is the Windows 2000 tool used to manage removable media. Remote Storage is not the correct answer here because it is used  to manage nonremovable (fixed) media on a Windows 2000 computer

Report Error

View Answer Report Error Discuss

0 1670
Q:

Someone has created a new document using Word 2010 and sent you a copy. The document is not protected and you have rights to view the content and even make changes. However, they have inserted a hyperlink to a company website but when you click the hyperlink nothing happens. What might be wrong?

A) Hyperlinks do not open automatically, you need to paste them into your web browser B) You need to hold the Ctrl key whilst clicking the hyperlink
C) Its impossible to add hyperlinks to a document. Maybe they formatted it to look like a link. D) You need to hold the Alt key whilst clicking the hyperlink
 
Answer & Explanation Answer: B) You need to hold the Ctrl key whilst clicking the hyperlink

Explanation:
Report Error

View Answer Report Error Discuss

2 1643
Q:

You are planning to install and configure network services for ineroperability on your Windows 2000 Server computer. You specifically want this server to maintain and advertise a list of services that use the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol. What service should you install?

A) Indexing Service B) NNTP Service
C) RIP Listener D) SAP Agent
 
Answer & Explanation Answer: D) SAP Agent

Explanation:

The SAP Agent enables a Windows 2000 computer to maintain and advertise a list of servers (such as NetWare servers) that use the NWLink IPX/SPX/NetBIOS Compatible Transport Protocol.

Report Error

View Answer Report Error Discuss

0 1620
Q:

You want to move the Philadelphia OU from the acme1.com domain to the acme2.com domain. Which tool should you use?

A) MoveTree.exe B) The move command -line utility
C) Server Extensions Administrator D) Active Directory Domains and Trusts
 
Answer & Explanation Answer: A) MoveTree.exe

Explanation:

Use MoveTree.exe to move Active Directory objects from one domain to another.

Report Error

View Answer Report Error Discuss

0 1616
Q:

You develop a Windows-based application that enables to enter product sales. You add a subroutine named XYZ.

 

You discover that XYZ sometimes raises an IOException during execution. To address this problem you create two additional subroutines named LogError and CleanUp. These subroutines are governed by the following rules:

• LogError must be called only when XYZ raises an exception.
• CleanUp must be called whenever XYZ is complete.

 

 You must ensure that your application adheres to these rules. Which code segment should you use?

A) try { XYZ(); LogError(); } catch (Exception e) { CleanUp(e); } B) try { XYZ(); } catch (Exception e) { LogError(e); CleanUp(); }
C) try { XYZ(); } catch (Exception e) { LogError(e); } finally { CleanUp(); } D) try { XYZ(); } catch (Exception e) { CleanUp(e); } finally { LogError(); }
 
Answer & Explanation Answer: C) try { XYZ(); } catch (Exception e) { LogError(e); } finally { CleanUp(); }

Explanation:

We must use a try…catch…finally construct. First we run the Comapany() code in the try block.Then we use the LogError() subroutine in the catch statement since all exceptions are handled here. Lastly we put the CleanUp() subroutine in the finally statement since this code will be executed regardless of whether an exception is thrown or not.

Report Error

View Answer Report Error Discuss

0 1613
Q:

You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed.

 

The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy.

 

You need to implement security in the assembly. What should you do?

A) Implement declarative security and execute the permission demand to allow access to the file system and Windows registry. B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
C) Implement imperative security and execute the permission demand to allow access to the file system and Windows registry. D) Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.
 
Answer & Explanation Answer: B) Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.

Explanation:

You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

 

You must use the Assembly (assembly) directive when specifying these actions as follows: 

 

Option A:

There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

 

 Option C, D:

Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.

Report Error

View Answer Report Error Discuss

0 1609
Q:

You would like to use the command line to end an application that a Terminal Services client is running. What command can you use?

A) Tscon B) Tsprof
C) Tsend D) Tskill
 
Answer & Explanation Answer: D) Tskill

Explanation:

Tskill ends a process. Since you want to stop an application, this is the command you would use.

Report Error

View Answer Report Error Discuss

0 1609
Q:

You create English, French, and German versions of a test engine ASP.NET application you are developing for XYZ Inc. You have separate resource files for each language version.You need to deploy the appropriate resource file based on the language settings of the server. What should you do?

A) Create an installer and set the Installer.Context property for each version of your application. B) Create an installer that has a launch condition to verify the locale settings.
C) Create an installer that has a custom action to install only location-specific files. D) Create an installer that has an MsiConfigureProduct function to install the appropriate version.
 
Answer & Explanation Answer: C) Create an installer that has a custom action to install only location-specific files.

Explanation:

Custom actions are a Windows Installer feature that allows you to run code at the end of an installation to perform actions that cannot be handled during installation. This is an appropriate solution for this scenario as we only want to deploy the resource files on the server. 

 

Incorrect Answers:

 

A: We just want to deploy the resource files. We do not need to set the Context property in the application.

 

B: We don’t need any launch conditions. We just want to deploy the resource files.

 

D: We just want to deploy the resource files.

Report Error

View Answer Report Error Discuss

0 1553