1.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller .com uses, Windows XP Professional is one of the mainstream Operating Systems that have been deployed. Your most important task is to assist in the configuration and maintenance of desktop applications. You are currently planning to set up application caching. Is it true that even application programs can be cached?
2.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller .com uses, Windows XP Professional is one of the mainstream Operating Systems that have been deployed. Your most important task is to assist in the configuration and maintenance of desktop applications. You need to be capable of starting Internet Explorer as quickly as possible. Which of the following is the command that you should utilize so that you could have Internet Explorer open without a home page?
3.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller .com uses, Windows XP Professional is one of the mainstream Operating Systems that have been deployed. Your most important task is to assist in the configuration and maintenance of desktop applications. Which of the following is the folder that the shortcut will be stored in, when you add a shortcut of any kind to your Internet Explorer's Links toolbar?
4.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network run Windows XP Professional. Your most important task is to assist in the configuration and maintenance of desktop applications. There is an Outlook Express address book on your desktop that contains contact information of multiple identities. You want to the contacts of all the identities defined in the Outlook Express address book. What should you do?
5.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network run Windows XP Professional. A user named Rory Allen reports that he can log on to his computer, but he is unable to access the Certkiller .com network. When you run the ping command from your computer, you find that you cannot access the Rory Allen's computer. Rory Allen confirms that his network cable is attached and that the lights on the back of the network adapter are blinking. You then decide to run the ipconfig command from the Rory Allen's computer, and discover that the IP configuration does not match the network's IP information. Which of the following is the task that you should complete FIRST to help Rory Allen gain network access?
6.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network run Windows XP Professional. When a user named Amy Walsh reports that she is unable to browse the network or access her e-mail messages, you discover that Amy Walsh's mapped network drives are not accessible. You then search for the proper default gateway address for Amy Walsh's subnet, but you are unable to ping to the gateway address from her computer. Which of the following adequately describes the most likely reason for this problem?
7.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network run Windows XP Professional. When a user named Amy Wilson reports that she is unable to connect to the Internet, you find that the she is able to connect to all internal network resources. You also discover that she can connect to external resources via IP address, but not by name. Of the following tasks, which is the one that you should complete to make sure that Amy Wilson can connect to internal and external resources by name?
8.
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network run Windows XP Professional and Microsoft Office 2003. A manager at Certkiller .com named Andy Booth uses a client computer called Certkiller -WS271. Andy Booth reports that he is unable to modify the files in a shared folder located on his computer, named MyDocs. After a brief investigation, you discover that a folder named C:\Docs on Andy Booth's computer is shared as MyDocs and that he is able to modify the files when accessing them via C:\Docs. Andy Booth informs you that other users will need to access and modify the documents contained in MyDocs, and that these users will be connecting through a domain user account. The CIO instructs you to make sure that Andy Boothand all other required users are able to modify the files by accessing them through MyDocs. Which of the following is the option that you should take to achieve this objective?
9.
You work as a desktop technician at Certkiller .com. The Certkiller .com network contains a single Active Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows Server 2003 and all client computers run Windows XP Professional. Certkiller .com contains a Manufacturing department that has a client computer named Certkiller -WS274. Certkiller -WS274 hosts a new shared folder named CKTargets. The default share and NTFS permissions are in effect for CKTargets. Certkiller .com appoints a user named Rory Allen as the manager of the Manufacturing department. Rory Allen uses a workstation named Certkiller -WS275. Rory Allen's user account is included in all default group memberships. You want Rory Allen to manage the CKTargets shared folder Certkiller -WS274. You assign the Allow - Full Control NTFS permission for CKTargets to Rory Allen's user account. You instruct Rory Allen to start handling requests for changes that need to be made to CKTargets and its associated subfolders and files. Two days later, Rory Allen complains that he cannot create new subfolders within the folder. He also cannot add files to the folder. Rory Allen is attempting to make these changes while logged on to Certkiller - WS275. You want to assign Rory Allen with the least amount of permissions needed to effectively manage the CKTargets folder. What should you do?
10.
You work as a desktop technician at Certkiller .com. The Certkiller .com network contains a single Active Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000 Server and all client computers run Windows XP Professional and Microsoft Office XP. Certkiller .com contains a Research department. The Research department contains a client computer named Certkiller -WS272 that is shared between several employees in the Research department. The manager of the Research department has asked you to create a shared folder on Certkiller -WS272. The manager wants only the Research department employees who use Certkiller -WS272 to be able to read, delete and modify files in the shared folder. You create a shared folder on Certkiller -WS272 and give the shared folder the name CK_Research. What should you do next?