You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller
.com uses, Windows XP Professional is one of the mainstream Operating Systems that have been
deployed. Your most important task is to assist in the configuration and maintenance of desktop
applications. You are currently planning to set up application caching.
Is it true that even application programs can be cached?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller
.com uses, Windows XP Professional is one of the mainstream Operating Systems that have been
deployed. Your most important task is to assist in the configuration and maintenance of desktop
applications. You need to be capable of starting Internet Explorer as quickly as possible.
Which of the following is the command that you should utilize so that you could have Internet Explorer open
without a home page?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. Of the variety of windows computers that Certkiller
.com uses, Windows XP Professional is one of the mainstream Operating Systems that have been
deployed. Your most important task is to assist in the configuration and maintenance of desktop
applications.
Which of the following is the folder that the shortcut will be stored in, when you add a shortcut of any kind to
your Internet Explorer's Links toolbar?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional.
Your most important task is to assist in the configuration and maintenance of desktop applications. There is
an Outlook Express address book on your desktop that contains contact information of multiple identities.
You want to the contacts of all the identities defined in the Outlook Express address book.
What should you do?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional.
A user named Rory Allen reports that he can log on to his computer, but he is unable to access the
Certkiller .com network.
When you run the ping command from your computer, you find that you cannot access the Rory Allen's
computer. Rory Allen confirms that his network cable is attached and that the lights on the back of the
network adapter are blinking.
You then decide to run the ipconfig command from the Rory Allen's computer, and discover that the IP
configuration does not match the network's IP information.
Which of the following is the task that you should complete FIRST to help Rory Allen gain network access?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional.
When a user named Amy Walsh reports that she is unable to browse the network or access her e-mail
messages, you discover that Amy Walsh's mapped network drives are not accessible.
You then search for the proper default gateway address for Amy Walsh's subnet, but you are unable to ping
to the gateway address from her computer.
Which of the following adequately describes the most likely reason for this problem?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional.
When a user named Amy Wilson reports that she is unable to connect to the Internet, you find that the she
is able to connect to all internal network resources.
You also discover that she can connect to external resources via IP address, but not by name.
Of the following tasks, which is the one that you should complete to make sure that Amy Wilson can
connect to internal and external resources by name?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional and Microsoft Office 2003. A manager at Certkiller .com named Andy Booth
uses a client computer called Certkiller -WS271.
Andy Booth reports that he is unable to modify the files in a shared folder located on his computer, named
MyDocs. After a brief investigation, you discover that a folder named C:\Docs on Andy Booth's computer is
shared as MyDocs and that he is able to modify the files when accessing them via C:\Docs.
Andy Booth informs you that other users will need to access and modify the documents contained in
MyDocs, and that these users will be connecting through a domain user account.
The CIO instructs you to make sure that Andy Boothand all other required users are able to modify the files
by accessing them through MyDocs.
Which of the following is the option that you should take to achieve this objective?
You work as a desktop technician at Certkiller .com.
The Certkiller .com network contains a single Active Directory domain named Certkiller .com. All servers on
the Certkiller .com network run Windows Server 2003 and all client computers run Windows XP
Professional.
Certkiller .com contains a Manufacturing department that has a client computer named Certkiller -WS274.
Certkiller -WS274 hosts a new shared folder named CKTargets. The default share and NTFS permissions
are in effect for CKTargets.
Certkiller .com appoints a user named Rory Allen as the manager of the Manufacturing department. Rory
Allen uses a workstation named Certkiller -WS275. Rory Allen's user account is included in all default group
memberships.
You want Rory Allen to manage the CKTargets shared folder Certkiller -WS274.
You assign the Allow - Full Control NTFS permission for CKTargets to Rory Allen's user account. You
instruct Rory Allen to start handling requests for changes that need to be made to CKTargets and its
associated subfolders and files.
Two days later, Rory Allen complains that he cannot create new subfolders within the folder. He also cannot
add files to the folder. Rory Allen is attempting to make these changes while logged on to Certkiller -
WS275. You want to assign Rory Allen with the least amount of permissions needed to effectively manage
the CKTargets folder.
What should you do?
You work as a desktop technician at Certkiller .com. The Certkiller .com network contains a single Active
Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000
Server and all client computers run Windows XP Professional and Microsoft Office XP.
Certkiller .com contains a Research department. The Research department contains a client computer
named Certkiller -WS272 that is shared between several employees in the Research department. The
manager of the Research department has asked you to create a shared folder on Certkiller -WS272. The
manager wants only the Research department employees who use Certkiller -WS272 to be able to read,
delete and modify files in the shared folder.
You create a shared folder on Certkiller -WS272 and give the shared folder the name CK_Research. What
should you do next?