Pass4Test의 MCTS 70-622 (Pro:Microsoft Desktop Support - Enterprise.)덤프를 선택하여 MCTS 70-622 (Pro:Microsoft Desktop Support - Enterprise.)시험공부를 하는건 제일 현명한 선택입니다. 시험에서 떨어지면 덤프비용 전액을 환불처리해드리고 MCTS 70-622 (Pro:Microsoft Desktop Support - Enterprise.)시험이 바뀌면 덤프도 업데이트하여 고객님께 최신버전을 발송해드립니다. MCTS 70-622 (Pro:Microsoft Desktop Support - Enterprise.)덤프뿐만아니라 IT인증시험에 관한 모든 덤프를 제공해드립니다.
NO.1 You are a desktop support technician for your company. Your company has a main office and a branch
office. You connect a new computer that runs Windows Vista to the main office network. You need to
ensure that the new computer can discover all the computers on the main office network. You also need
to ensure that all computers on the main office and branch office networks can discover the new
computer.
What should you do?
A. Set the Location type of the network to Public
B. Set the Location type of the network to Private.
C. Configure Windows Firewall to permit traffic on port 3389.
D. Create and assign a new IPSec policy that activates the Default response rule.
Answer: B
NO.2 You are a desktop support technician for your company. The computers in your company run Windows
Vista. A user's computer automatically downloads and installs a critical patch for the vulnerability in a
system DLL file. The user reports that she receives an error emssage when she attempts to start
Windows.
You need to restore the user's computer to a bootable state without installing the earlier upate ifles. You
must achieve this goal by using the minimum ammount of administrative effort. What should you do?
A. Access the recovery console and run fixmbr c:.
B. Start the computer in safe mode and restore the original system DLL file.
C. Perform a system restore from the Windows Vista installation DVD and restore to an earlier date.
D. Access the recovery console from the Windows Vista installation DVD and extract only the original
system DLL file. Then, overwrite te faulty file.
Answer: C
NO.3 You are a desktop support technician for your company. The computers in your company run Windows
Vista.
You need to prevent users from installing devices on their computers. Your solution must achieve this goal
without modifying administrator permissions.
Which two policy settings in group policy object editor should you enable? (Each correct answers
presents part of the resolution. Choose two.)
A. Prevent installation of removable devices.
B. Allow administrators to override device installation policy.
C. Prevent installation of devices that match these device IDs.
D. Allow installation of devices that match any of these device IDs.
E. Prevent installation of devices not described by other policy settings.
Answer: BE
NO.4 You are a desktop support technician for your company.
You set up event forwarding between a source computer and a collecting computer. The collecting
computer has a standard user set to run the subscription. The collecting computer displays the
subscription status as Trying. You verify that there is no error on the source computer and that the firewall
is conifgured correctly. You need to view the subscription run time status.
A. Use the Wecutil.exe command line utility.
B. Analyze the Security event log.
C. Analyze the dtcinstall.log file.
D. Use the Resultant Set of Policy console.
Answer: A
NO.5 You are a desktop support technician for your company. Your company monitors user logon times on a
daily basis.
You need to generate a report when users log on after 9 A.M. and have it send to your e-mail account.
What should you do?
A. Create a new task, add the At Log On trigger, run a custom-created VBS file to check the time, and
send the e-mail message through the VBS script if the time is after 9 A.M.
B. Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, and
send the e-mail message through the VBS script if the time is after 9 A.M.
C. Create a new task, add the At Startup trigger, run a custom-created VBS file to check the time, and
send the e-mail message through the Task Scheduler if the time is after 9 A.M.
D. Create a new task, add the At Log On trigger, run a custom-created VBS file to check the time, and
send the e-mail message through the Task Scheduler if the time is after 9 A.M.
Answer: A
NO.6 You are a desktop support technician for your company. The corporate network has a domain controller
that runs Microsoft Windows Server 2003 and computers that run Microsoft Windows XP Professional
and Windows Vista Business. You set up group policies on the domain controller.
When you logon to the corporate network, only the comptuers that run Windows Vista Business are able
to retrieve the updated policies.
You need to process the group policy for all the computers on the corporate network. Which Internet
Control Message Protocol (ICMP) setting should you enable?
A. Allow incoming echo request
B. Allow incoming mask request
C. Allow outgoing source quench
D. Allow outgoing parameter problem
Answer: A
NO.7 You are a desktop support technician for your company. Your network contains an Active Directory
domain. All Windows Vista computers are joined to the domain. You need to ensure that the settings that
are configured are by using the Local Computer Policy are not applied to the Windows Vista computers.
What should you do?
A. Delete gpmc.msc.
B. Delete gpedit.msc
C. Disable registry policy processing.
D. Turn of Local Group Policy
Answer: D
NO.8 You are a desktop support technician for your company. The computers in your company run Windows
Vista.
The computers run Performance Monitor daily. Performance logging data is saved to a file named
perfmon.log.
You need to view the performance data in an SQL database. What should you do?
A. Use Sort.exe to output a .sql file.
B. Use Fc.exe to perform a binary comparison.
C. Use the type command to pipe the file to a .sql file.
D. Run Relog.exe to export the file to a new output file format.
Answer: D
NO.9 You are a desktop support technician for your company. The computers in your company run
Windows Vista. The computers have the All Comm and Secure Comm policies defined. You assign the All
Comm policy to the computers. You need to ensure that the computers encrypt all outgoing traffic.
What should you do?
A. Delete the All Comm policy.
B. Assign the Secure Comm policy.
C. Configure the All Comm policy to use a mirrored filter.
D. Set the soruce address of the existing filter to My IP Address.
Answer: B
NO.10 You are a desktop support technician for your company. The computers on the corporate network run
Windows XP and Windows Vista in a single domain. The computers that run Windows XP do not appear
on the Network Map diagram. You need to ensure that all the computers appear on the Network Map
diagram. What should you do?
A. Install the UPnP networking serivce on the computers that run Windows XP.
B. Download the Link-Layer Topology Discover (LLTD) Responder component from the Microsoft Website
and install the component on the domain server.
C. Download the LLTD Responder component from the Microsoft Website and install the component on
the computers that run Windows XP.
D. Download the LLTD Responder component from the Microsoft Website and install the component on
the computers that run Windows Vista.
Answer: C
NO.11 You are a desktop support technician for your company.
You need to disable the User Account Control (UAC) feature for local administrators by using the Group
Policy Object Editor. Your solution must not disable UAC for standard users.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set Disabled for the User Account Control. Run all administrators in Admin Approval Mode option.
B. Set Disabled for the User Account Control: Detect application installations and prompt for elevation
option.
C. Set Disabled for the User Account Control: Switch the secure desktoip when prompting for elevation
option.
D. Set Enabled for the User account Control: Admin Approval Mode for the Built-in Administrator account
option.
E. Set Elevate without prompting for the User Account Control: Behavior of the elevation prompt for
administrators in Admin Apprval Mode option.
Answer: AE
NO.12 You are a desktop support technician for your company. Your company has a main office and three
branch offices. A user travels to all the offices with a portable computer that runs Windows Vista.
You need to ensure that the user can access network printers at any office without reconfiguring her
computer.
What should you do?
A. Restart the Printer Spooler service
B. Create a Deploy Printer connection in the User Configuration policy.
C. Create a Deploy Printer connection in the Computer Configuration Policy
D. Ensure that the Background Intelligent Transfer Service (BITS) service is started.
Answer: B
NO.13 You are a desktop support technician for your company. The computers in your company run Windows
Vista.
You need to recommend a solution to enable forwarding of events. The events must be encrypted when
they are forwarded. Which three configurations should you recommend? (Each correct answer presents
part of the solution. Choose three.)
A. Open port 443 on the Windows firewall.
B. Ensure that all users have a user certificate.
C. Ensure that all computers have a computer certificate.
D. Configure the client computers by using winrm.exe
E. Select the Certficate Propagation service startup type to automatic.
Answer: ACD
NO.14 You are a desktop support technician for your company. The computers in your company run Windows
Vista.
A user reports that Disk Defragmenter is running on his computer when he arrives at the office. You
discover that Disk Defragmenter is set to turn at the same time that a software application maintenance
program is set to run.
You need to ensure that Disk Defragmenter runs at 3 A.M. on the user's computer. You must achieve this
goal by using the minimum amount of administrative effort.
What should you do?
A. In Task Scheduler, locate the Disk Defragment task and set it to 3 A.M.
B. In Local Group Policy, set the Disk Defragmenter program to run at 3 A.M.
C. Open Task Scheduler and crate a new task to run the Disk Defragmenter program at 3 A.M.
D. Configure a Group Policy Object across the domain and set the Disk Defragmenter program to run at 3
A.M.
Answer: A
NO.15 You are a desktop support technician for your company. All client computers at the company run
Windows Vista. The company uses Windows Server 2003 virtual private network (VPN) servers. You
need to recommend a solution to simplify the setup of VPN connections on client computers.
What should you recommend?
A. Create an .ins file and distribute it to all users.
B. Use the Connection Manager Administration Kit (CMAK) to build a service profile.
C. Configure Group Policy and the Network Connections options under Computer Configuration.
D. Configure Group Policy and the Network Connections options under User Configuration.
Answer: B
NO.16 You are a desktop support technician for your company. The computers in your company run Windows
Vista.
Users send security reports to the main office over the Internet using Windows Mail.
You need to recommend a solution to ensure that the security reports are encrypted when they are
transmitted over the Internet.
What should you recommend?
A. Use S/MIME.
B. Use POP3 with Secure Sockets Layer (SSL).
C. Use Encrypted File System (EFS).
D. Use SMTP.
Answer: A
NO.17 You are a desktop support technician for your company. The company's network consists of 10
Windows Vista computers and a server installed with Windows Server Update Services (WSUS). You
must centralize Windows Updates from Microsoft on all the computers.
You need to configure all the computers to retrieve updates from the WSUS server. What should you do?
A. Ensure the intranet statistics server and intranet Microsoft Update servers are hosted on different
servers
B. Ensure the intranet statistics server and intranet Microsoft Updates services are configured on the
Windows Vista computers.
C. Ensure that the Allow non-administrator to receive update notification Group Policy is enabled on all
the computers.
D. Ensure that all computers are in the same workgroup as the WSUS server.
Answer: B
NO.18 You are a desktop support technician for your company. The Computers in your company run Windows
XP. You upgrade the comptuers to Windows Vista. You download new updates by using Windows Update
Agent. You discover that the update files are corrupted.
You need to force Windows Update Agent to download the entire update again.
What should you do?
A. Run the wuauclt.exe /detectnow command.
B. Run the wuauclt.exe /resetauthorization /detectnow command.
C. Stop the Windows Updates server and rename the C:\Program Files\WindowsUpdate folder. Then,
restart the Windows Update Service.
D. Stop the Windows Update service and rename the %systemroot%\SoftwareDistribution folder. Then,
restart the Windows Update service.
Answer: D
NO.19 Download the LLTD Responder component from the Microsoft Website and install the component on
the computers that run Windows XP. The computers on the corporate network run Windows Vista. The
computers are configured to obtain IP addreses automically. A user reports that he cannot access
resources on the corporate network. You discover that the IP address of the users computer is
169.254.17.9 with a 16-bit subnet mask. You restart the computer, but the user still cannot access
resources on the corporate network.
You need to ensure that the user can access resources on the corporate network. What should you do?
A. Run the ipconfig / flushdns command with elevated privileges.
B. Run the net start "Workstation" command with elevated privileges
C. Run the net start "DHCP Client" command with elevated privileges.
D. Run the ipconfig / release command with elevated privileges and run the ipconfig / renew command.
Answer: C
NO.20 You are a desktop support technician for your company. Your company comuters run Windows Vista.
You need to verify the updates that have been installed on your Windows Vista computer.
Which two actions should you perform.? (Each correct answer present a complete solution. Choose two.)
A. Click on View update history in the Windows Update applet.
B. Analyze the Security event log.
C. Click Check for updates in Windows Update applet.
D. Open the ReportingEvents.log file under %systemroot%\SoftwareDistribution to check whether the
update is applied.
Answer: AD