You work as a help desk technician at Certkiller .com. The Certkiller .com network contains a single Active
Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000
Server and all client computers run Windows XP Professional.
A Certkiller .com customer named Mia Hamm has contacted you. Mia Hamm said that she cannot run the
macros in a Microsoft Office Excel 2003, which is send by there mother company. Mia Hamm would like to
run the macros without being prompt.
What should you tell her?
You work as a desktop technician at Certkiller .com. The Certkiller .com network contains a single Active
Directory domain named Certkiller .com. The Certkiller .com network contains ten Windows 2000 Server
computers, 500 Windows XP Professional client computers and 1,000 Windows 2000 Professional client
computers.
Certkiller .com contains a Development department. A Certkiller .com employee named Mia Hamm works
in the Development department. Certkiller .com contains a Windows XP Professional workstation named
Certkiller -WS271. Mia Hamm is using this computer. Mia Hamm has contacted you to report the invoice
management application has problems. During the questioning you learned that Mia Hamm has installed a
customer relationship management application on Certkiller -WS271. Before the installation of the
customer relationship management application, the invoice management application worked without any
problems. Mia Hamm needs her invoice management application.
What should you do?
You work as a desktop support technician at Certkiller .com. The Certkiller .com network contains a single
Active Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows
2000 Server and all client computers run Windows XP Professional.
A Certkiller .com user named Kara Lang uses a Windows XP Professional client computer named Certkiller
-WS278. Kara Lang has installed a new software development framework on Certkiller -WS278. When
Kara Lang needs to use the Windows Explorer, the computer hangs. You need to find out if any
components were overwritten when installing the framework.
What tool should you use?
You work as a desktop support technician at Certkiller .com. The Certkiller .com network contains a single
Active Directory domain named Certkiller .com.
A Certkiller .com user named Kara Lang uses a Windows XP Professional computer named Certkiller -
WS270 that has two hard disks. Drive C: has 200 MB of free space and has the Windows 95 operating
system installed on it. Drive D: has 2 GB of free disk space and has the Windows XP Professional
operating system installed on it and secure data files and other information which is encrypted. Kara Lang
has contacted you because she cannot install an accounting application on Certkiller -WS270. She received
the following error: "Disk requirement not been met. Please adhere to the disk requirement before
proceeding with the installation".
Kara Lang installed the accounting application on drive D: which has 2 GB of memory and the accounting
application only needs 500 MB of free space for installation. Kara Lang needs to install the accounting
application.
What should Kara Lang do?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
Windows 2000 Active Directory domain named Certkiller .com.
All client computers on the Certkiller .com network run Windows XP Professional and Microsoft Office
2003.
A department manager at Certkiller .com named Amy Wilson reports that some of the files on drive D on
her computer were deleted and other data was modified.
Certkiller .com requires you to track unauthorized attempts to modify or delete data from drive D on Amy
Wilson's computer.
Which of the following is the task that you should carry out FIRST to achieve this objective?
You work as the desktop support technician at Certkiller .com. The Certkiller .com network consists of a
single Active Directory domain named Certkiller .com. All client computers on the Certkiller .com network
run Windows XP Professional and make use of Microsoft Internet Explorer as their Web browser.
A user named Andy Reid would like to have the highest degree of protection against cookies. This
protection must still allow him to log on to Web sites and store personal data. He would also like to prevent
cookies from advertisers on third-party Web sites from being stored on his computer.
Of the following options, which is the one that you should take to ensure that the Andy Reid's Internet
options are configured properly?
You work as a desktop technician at Certkiller .com. The Certkiller .com network contains a single Active
Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000
Server and all client computers run Windows XP Professional.
A Certkiller .com customer named Ally Wagner has contacted you. She is the administrator of there
company. Ally Wagner has downloaded an Excel spreadsheet from the Internet to perform a lot of
calculations. When Ally Wagner opens the Excel spreadsheet, it automatically runs Macro virus. Ally
Wagner wants to ensure that only signed macros from trusted sources are allowed to run in Excel
spreadsheet. Ally Wagner does not want the other users to modify or change the list of trusted sources.
What should you advice Ally Wagner to do on the Security dialog box in Excel?
You work as a helpdesk technician at Certkiller .com. The Certkiller .com network contains a single Active
Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows 2000
Server and all client computers run Windows XP Professional.
Certkiller .com contains a Development department and a Sales department. The Development department
does research on software and the Sales department sells the applications, software and computers.
Certkiller .com also has a help desk team which helps the customers which has problems with there
software or computers that was bought at Certkiller .com.
You are using Windows Messenger to converse with the customers and to receive Remote Assistance
invitations. You have upgraded a Windows XP Professional computer with Service Pack 2, which belongs
to a customer named Rory Allen. You need to allow Rory Allen to contact you with Windows Messenger to
receive Remote Assistance request because he contacts you frequently for assistance.
What should you do on Rory Allen's computer?
You work as the network administrator at Certkiller .com. The Certkiller .com network consists of a single
Active Directory domain named Certkiller .com. All servers on the Certkiller .com network run Windows
Server 2003 and all client computers run Windows XP Home Edition with Service Pack 2 (SP2).
Certkiller .com contains a computer that does not have file and print sharing enabled.
A Certkiller .com user named Rory Allen is a member of the Sales department. Rory Allen complains that
he cannot successfully use the ping command to connect to another computer on his home network. You
discover that Rory Allen has two computers that run Windows XP Home Edition on the network. Windows
Firewall is enabled on both computers.
What should you do to ensure that Rory Allen can receive a ping response from the computers that run
Windows XP?
Given the statement below:
"Outlook Express is set by default to prevent you from saving any attachment that could possibly be a
virus." Which of the following adequately describes how you would rate the above statement?