You need to prevent users from storing cookies that come from the www.contoso.com Web site. The solution must allow users to browse to the www.contoso.com Web site. What should you do?
A. Add an entry to the Lmhosts file.
B. From the local area connection, add a DNS suffix.
C. From Internet Explorer, modify the Privacy settings.
D. From Internet Explorer, modify the Manage Add-ons settings.
Correct Answer: C
You have a computer that runs Windows XP Professional Service Pack 2 (SP2). Five users share the computer. You need to allow pop-ups from the internal Web servers for all users of the computer. Pop-ups from other Web site must continue to be denied. You log on to the computer by using the local administrator account. What should you do next?
A. Modify the Internet Explorer Pop-up Blocker settings.
B. Move all URLs from the local Web servers to the Internet Explorer Favorites list.
C. From the Local Computer Policy, modify the User Configuration settings.
D. From the Local Computer Policy, modify the Computer Configuration settings.
Correct Answer: A
You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?
A. Run ipconfig /flushdns at the command prompt.
B. Reset the password for the local administrator user account.
C. From the Internet Options in Internet Explorer, clear the AutoComplete history.
D. From the Internet Options in Internet Explorer, delete the Temporary Internet Files.
Correct Answer: C
You are the desktop administrator for your company. The company’s network contains 500 Windows XP Professional computers. The information security department releases new security requirements. The new requirements state that the Telnet service may not be started on any company-owned client computer. You need to create a new security template that prevents the Telnet service from starting on company-owned client computers. You open the Security Configuration and Analysis console on your Windows XP Professional computer. Which portion of the console do you need to configure?
To answer, click the appropriate container in the Security Configuration and Analysis console.
You are a desktop administrator for your company. A EnsurePass user reports that he is unable to use his Bluetooth-enabled mobile phone with his Bluetooth-enabled Windows XP Professional computer. He is trying to play audio from the phone through the speakers on his computer. You verify that other Bluetooth devices work properly with the user’s computer. You test the speakers to make sure they are in working order. You also verify that the mobile phone can send output to a computer. You then discover that the phone cannot detect the computer. You need to ensure that the user can use the phone with his computer. What should you do?
A. Place the phone in Bluetooth discovery mode.
B. Place the user’s computer in Bluetooth discovery mode.
C. Add the phone and the computer to the same Bluetooth Personal Area Network (PAN).
D. Install mobile phone synchronization software on the user’s computer.
Correct Answer: B
You are a desktop administrator for your EnsurePass company. You are responsible for deploying a new application. The application is packaged in an .msi file. You need to deploy the application to only three users in the company. The .msi file contains all of the information necessary to correctly install the application. You need to install the application so that users see information about the installation progress, but no other user interface is displayed during the installation. What should you do?
A. Use the Msiexec.exe program to perform a quiet installation of the application.
B. Use the Msiexec.exe program to perform a passive installation of the application.
C. Create a Group Policy object (GPO) that assigns the application. Link the GPO to the site containing the users who will use the application.
D. Create a Group Policy object (GPO) that advertises the application. Link the GPO to the domain.
Correct Answer: B
You are a desktop administrator for your EnsurePass company. You need to deploy a new application. The application is packaged in an .msi file. The application will be used by only a small number of users. You plan to install the application by using the Msiexec.exe program. You need to ensure that the installation process does not display a user interface. What should you do?
A. Manually perform a passive installation of the application.
B. Manually perform a quiet installation of the application.
C. Use a logon script to run the Msiexec.exe program.
D. Use the Runas utility to run the Msiexec.exe program.
Correct Answer: B
You are the network administrator for one of your EnsurePass’s branch offices. Ten employees work in the branch office. All client computers in the branch office run Windows XP Professional. All client computers have manually configured IP addresses in the 192. 168. 1. 0/24 range. The branch office has a cable modem connection to the Internet. All employees in the branch office need access to the main office by means of a virtual private network (VPN) connection over the Internet. The VPN connection is configured as shown in the exhibit. (Click the Exhibit button.) Employees in the branch office report that they cannot access resources that are located on the main office network. You investigate and discover that you can establish a VPN connection locally on a client computer named Pro1 and can access main office network resources. However, you cannot connect to Pro1 other computers on the branch office network. You want all employees in the branch office to be able to access main office network resources by means of the VPN
connection on Pro1. What should you do?
A. Disable Windows Firewall on the main office VPN connection.
B. Add a port exception to Windows Firewall to allow incoming PPTP traffic on the main office VPN connection.
C. Select the Allow other network users to control or disable the shared Internet connection check box.
D. Configure all client computers in the branch office to obtain IP addresses automatically.
Correct Answer: D
You are a help desk technician for your company. Stefan and Irene are software developers for the company. Stefan is developing a Web application on his Windows XP Professional computer. The computer is named Stefan132. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. When Irene types http://Stefan132 in the Address bar of her Web browser, she cannot access the Web application. However, Stefan can access the Web application by typing http://localhost or http://Stefan132 in the Address bar of his Web browser. He can also access resources on the company network. When you run the Ping command on your computer, you cannot connect to Stefan’s computer. When you attempt to access http://Stefan132 from your computer, Internet Explorer displays “DNS or Server Error.” You need to ensure that Irene can access the Web application on Stefan’s computer. First, you establish a Remote Assistance connection to Stefan’s computer. What should you do next on Stefan’s computer?
A. Run the IPconfig /renew command.
B. Stop and then restart the World Wide Web Publishing service.
C. Ensure that the Everyone group has Allow – Full Control permission on the Inetpub folder.
D. In the properties of the Local Area Connection connection, allow a Windows Firewall exception for port 80.
Correct Answer: D
You are the administrator of a Windows XP Professional computer named Pro1. The computer is connected to the Internet. Pro1 provides Internet access to eight other Windows XP Professional computers that are connected to Pro1. You enable Internet Connection Sharing (ICS) and Windows Firewall on Pro1. You run an application named App1 on Pro1. App1 communicates with an online training company on the Internet. To display an online seminar, the training company needs to contact the App1 application at port 5800. You want to ensure that the training company can connect to the App1 application. What should you do?
A. Configure Windows Firewall to enable the Internet Control Message Protocol (ICMP) Allow redirect option. Then start the App1 application that opens port 5800.
B. Create a new service exception named App1. Use port 5800 as both the external and internal port number.
C. Edit the %systemroot%System32DriversEtcServices file on Pro1 to include a service definition named App1 for port 5800.
D. Change the TCP/IP settings on Pro1 to enable TCP/IP filtering. Permit network traffic on port 5800.
Correct Answer: B
Instant Access to Download Testing Software & PDF File for Microsoft 70-270 Real Exam
Instant Access to Try Microsoft 70-270 Free Demo