Tag Archives: MCSE Certification

70-620 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

QUESTION 1
You are employed as a Desktop Technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com.
Certkingdom.com has acquired a computer named Certkingdom-WS624. The operating system on the computer is
Microsoft Windows XP Professional and its specifications are:
• 1 GB of RAM
• 2GHz processor
• 64-MB video adapter
• 60-GB hard disk with 15 GB of free space
You received instructions for installation of Microsoft Windows Vista on Certkingdom-WS624.
After performing fresh installation you need to identify the which of uCertkingdomrade is needed for
supporting Microsoft Windows Aero Experience?

A. You need to uCertkingdomrade the hard disk to 100 GB.
B. You need to clear 40 GB of free space on the hard disk.
C. You need to uCertkingdomrade the memory to 2 GB of RAM.
D. You need to install a 128 MB of RAM video adapter supporting Microsoft DirectX 9, and
Microsoft Pixel Shader 2.0.
E. You need to uCertkingdomrade the processor to a dual-core processor.

Answer: D

Explanation: To support the Microsoft Windows Aero Experience, you need a video adapter that
has at least 128 MB of RAM, support for Microsoft DirectX 9, and Microsoft Pixel Shader 2.0.


QUESTION 2
You are employed as a network administrator at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com.
A client computer named Certkingdom-WS620 is running Microsoft Windows 2000 with Service Pack 3.
Certkingdom-WS620 also runs some legacy applications. The Certkingdom.com management wants all computers
to be running Microsoft Windows Vista. To this end you have received instructions from the CIO to
uCertkingdomrade Certkingdom-WS620 to Microsoft Windows Vista.
Which two steps should you take to uCertkingdomrade Certkingdom-WS620 and keeping the current applications
intact and not requiring reinstallation?

A. By Installing Windows Vista into a separate partition.
B. By using the Windows Easy Transfer wizard.
C. By uCertkingdomrading to Microsoft Windows XP Professional.
D. By uCertkingdomrading to Windows Vista.
E. By installing the latest version of the Service Pack.
F. By copying your user profile to a removable media.
G. By Performing a clean installation of Windows Vista.
H. By Copying the user profile to the C:\Windows\Users directory.

Answer: C,D

Explanation: To move to Windows Vista without having to reinstall your applications, you need to
do an ‘in-place’ uCertkingdomrade. However, you cannot uCertkingdomrade directly to Windows Vista from
Windows 2000 Professional (you would need a clean install which would delete your applications).
Therefore, you need to uCertkingdomrade to Windows XP Professional first. Then you can uCertkingdomrade to
Windows Vista and keep the applications.


QUESTION 3
You are employed as a network administrator at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All client computers on the Certkingdom.com network run
Microsoft Windows Vista.
Certkingdom.com contains a client computer named Certkingdom-WS621. Certkingdom-WS621 has been assigned to a
Certkingdom.com user named Andy Booth. You received a report from Andy Booth complaining that CertkingdomWS621
is performing slower than it should. You have a suspicion that it could be malware that is
causing the problem.
How can you find out what is causing the problems?

A. You need to run a Windows Defender scan.
B. You need to view the processes list in Task manager.
C. You need to view the startup items in the System Configuration utility.
D. You need to run Disk Defragmenter.

Answer: A

Explanation: Windows Defender is an application that can scan for malware or other potentially
harmful files. You can initiate a Windows Defender scan to scan all the files on your system for
malware or other potentially harmful files.


QUESTION 4
You are employed as a network technician at Certkingdom.com. The Certkingdom.com network consists of a
single Active Directory domain named Certkingdom.com. All client computers on the Certkingdom.com network run
Microsoft Windows Vista.
A Certkingdom.com user named Andy Booth has been assigned a client computer named Certkingdom-WS629.
One morning Andy Booth complains that Certkingdom-WS629 does not produce any sound when he
views a video file clip. You open the Device Manager as shown below.

What configuration change should you make to Certkingdom-WS629?

A. You need to update the driver for the audio device.
B. You need to uninstall the device then run a hardware scan.
C. You need to enable the audio device in Device Manager.
D. You need to change the IRQ for the device.
E. You need to run Microsoft Windows Update and install the latest updates for Certkingdom-WS629.
F. You need to replace the audio device with one that is compatible with Windows Vista.

Answer: C

Explanation: The icon by the sound device (the Creative SB Live! Series device) shows that the
device is disabled. Therefore, to receive audio output from Certkingdom-WS629, you simply need to
enable the device. You can do this by right-clicking on the device and selecting Enable.


QUESTION 5
You are employed as a help desk technician at Certkingdom.com. The Certkingdom.com network consists of a
Workgroup named Certkingdom. The client computers on the Certkingdom.com network run a mix of Windows XP
Professional and Windows Vista. You
The Certkingdom.com management wants to conduct a meeting with all their users. You need to facilitate
this meeting. However, invitation to the Certkingdom.com users are not getting sent as they do not appear
in the Invite people list of the Microsoft Windows Meeting Space meeting.
What should you do to be able to invite all Certkingdom.com users to the Windows Meeting Space
meetings? (Each correct answer presents part of the solution. Choose TWO.)

A. You need to instruct the Certkingdom.com users with Windows XP Professional computers to create an
exception for invitations from Windows Meeting Space in the Microsoft Windows Firewall.
B. You need to uCertkingdomrade the Windows XP Professional computers to Windows Vista.
C. You need to configure the Windows XP Professional computers to use Microsoft NetMeeting to
connect to the meeting.
D. You need to instruct all members of the Certkingdom workgroup to sign in to the People Near Me feature.
E. You need to install Service Pack 3 on the Windows XP Professional computers.

Answer: B,D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

Microsoft 70-442 Q & A / Study Guide

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

QUESTION 1
You work as a contract developer for National Retailers. You are currently working
on the online order application the National Retailers database developer has
informed you that the product parts and components will be stored in a xml data
type column. National Retailers employees are allowed to request product
information regarding a doll or action figure line by clicking a button on the Web
form. The data will only be retrieved if the employee requests details.
You need to design the appropriate data access technologies and must thus choose
the object that you need to use to store the query results for product parts and
component information.
What should you do?

A. Make use of a DataSet object.

B. Make use of an XmlElement object.

C. Make use of an XmlDocument object.

D. Make use of an XmlDocumentFragment object.

Answer: D

Explanation: An XmlDocumentFragment object can store either a well-formed
XML document or a fragment of a document. This would be consistent with the xml
data type which has the ability to store well-formed documents as well as fragments.
1. The National Retailers management wants to expand business by selling their
exclusive doll line on the company Web site
Incorrect Answers:
A: A DataSet object is used when the method returned a relational data set, akin to the
method that is generated from a SELECT statement.
B: An XmlElement object is used to store the results of a SELECT … FOR XML query,
not the contents of a single value.
C: An XmlDocument object must store well-formed XML Documents. It is thus not
compatible with the xml data type.


QUESTION 2
You work as the database developer for National Retailers. You need to optimize
the indexing strategies and are thus designing the indexes for the Sales.Orders table.
The query in the following exhibit is frequently executed, though it is not the most
commonly executed query.
SELECT Salesrepresentative, SUM(Commission)
FROM Sales.Orders
WHERE Date BETWEEN @ startDate AND @ endDate
GROUP BY Salesrepresentative
ORDER BY Salesrepresentative
You need to use the appropriate statement to create the best index to accommodate
this query.
What should you do?

A. Use the following statement:
CREATE INDEX ix_Commission
ON Sales.Orders(Salesrepresentative, Date, Commission)

B. Use the following statement:
CREATE CLUSTERED INDEX ix_Commission
ON Sales.Orders(Salesrepresentative, Date)

C. Use the following statement:
CREATE INDEX ix_Commission
ON Sales.Orders(Date)
INCLUDE (Salesrepresentative);

D. Use the following statement:
CREATE INDEX ix_Commission
ON Sales.Orders(Date, Salesrepresentative)
INCLUDE (Commission);

Answer: D

Explanation: The Date column is used to select the records and the
Salesrepresentative column is used to group and order the records. This means that
both these columns have to be key columns. The Date column is used in a
BETWEEN comparison, thus it should also be the first in the query. Furthermore,
it has higher selectivity than the Salesrepresentative column.
1. Sales Representatives should also be allowed to check the current commissions due to them.
Incorrect Answers:
A: The column used for equality or BETWEEN comparisons should be listed first. This
must then be followed by the most selective column, then the rest of the predicate
columns in order of decreasing selectivity. And, although it is possible that you can
create an index by using a computed column as the key column, it is recommended that
key columns be kept as narrow as possible. This means that making use of an included
column for Commission is a better option.
B: A Clustered index should have high selectivity. The Salesrepresentative column does
not have high selectivity. This means that this clustered index will not be appropriate for
any other queries done against the table like retrieving order information for instance. A
table can only have one unique index.
C: The Salesrepresentative column is used in the GROUP BY clause. Thus it would be
better suited as the key column rather than an included column. Furthermore, this is not a
covering index as it does not include Commission as an included column.


QUESTION 3
You work as the database developer for National Retailers. While busy designing
queries for the retrieval of data from XML sources, you are writing a script that
will generate an XML file to be imported into the collections application. This
application assumed XML data includes both elements and attributes.
You need to make a choice of the most appropriate type of Transact-SQL statement
to use to retrieve the data from the database.
What should you do?

A. Make use of the OPENXML Transact-SQL statement.

B. Make use of the sp_xml_preparedocument stored procedure.

C. Make use of the SELECT … FOR XML AUTO Transact-SQL statement.

D. Make use of the SELECT … FOR XML PATH Transact-SQL statement.

Answer: D

Explanation: The FOR XML PATH clause of the SELECT
statement will allow you to use XPath to define the structure for the XML data that
is returned. This structure can include both elements and attributes.
1. The Chicago office handles debt collection. All customers with an outstanding balance
over 60 days are also sent to the Chicago office. The accounting department makes use of
a collections application that imports XML data.
Incorrect Answers:
A: The OPENXML statement is used to insert XML data into relational tables. Not to
retrieve a resultant set formatted as XML from relational tables.
B: The sp_xml_preparedocument system stored procedure is used prior to calling OPENXML.
C: The FOR XML AUTO clause of the SELECT statement will generate a result set of
nested elements and as such do not make allowance for a mix of elements and attributes.


QUESTION 4
You are busy designing the database query strategy for National Retailers that will
retrieve the result set used to report on monthly sales trends. To this end you are
designing the stored procedure. This stored procedure will be used by an
application that makes use of Microsoft Visual C# .NET.
Of the requirements that you need to keep in mind is that the analysts need the
ability to retrieve a result set with approximately 100 records and scroll through
them to gather information. These analysts will need the ability to locate records
based on either factory or product I
D. They do NOT update any data. You thus
need to design the most appropriate cursor strategy for National Retailers.
What should you do?

A. Create a server-side static cursor.

B. Create a server-side dynamic cursor.

C. Create a client-side forward-only cursor.

D. Use a default result set and do not create a cursor.

Answer: D

Explanation: The Default Result Set caches all records in the result set to the client.
This will thus reduce round trips across the network to one and prevent data from
being stored in the tempdb.
1. Regularly at the end of each month, reports are generated manually and e-mailed to the
Chicago office. Monthly sales and invoice aging information is included in these reports.
Incorrect Answers:
A: If you create a Server-side static cursor it will consume server resources and require a
round-trip across the network each time the client fetches data. Furthermore the cursor
will then be stored in tempdb.
B: A Server-side dynamic cursor does require a round-trip across the network every time
a client fetches data.
C: Creating a Client-side forward-only cursor will not allow analysts to scroll through
the data the way that they require to. These cursors only support the ability to fetch the
next record and not to move to a specific record.


QUESTION 5
You work as the database developer for National Retailers. You are currently
designing the code that will retrieve the product information for the online order
application. To this end you need to determine the appropriate type of object that
you should create to return to the Web application. The Web application will
require that information such as product name, product description, and product
price information be returned in response to a search request.
What should you do?

A. Use a Transact-SQL stored procedure.

B. Use an extended stored procedure.

C. Use a table-valued user-defined function.

D. Use a Common Language Runtime (CLR) user-defined function.

Answer: A

Explanation: The online application accesses data via a Native XML Web service.
This means that you are limited to using an object that can be exposed as a Web
method. A Transact-SQL stored procedure can return the required information and
can be exposed as a Web method.
1. The National Retailers management wants to expand business by selling their
exclusive doll line on the company Web site.
2. The future online Sales application will be outsourced. NRCH-DB02 will host a
database to support the e-commerce application. The e-commerce application will make
use of Simple Object Access Protocol (SOAP) to retrieve product information and submit
orders.
Incorrect Answers:
B: An Extended stored procedure cannot be exposed as a Web method.
C: A Table-valued user-defined function cannot be exposed as a Web method.
D: A CLR user-defined function is not required because the data can be retrieved using
Transact-SQL.


QUESTION 6
You are designing the error-handling routines for National Retailers. You are
creating a function that will be used to check the audit trail for the products. This
function must raise a custom error in the event of the audit trail not being
verifiable. Do bear in mind that the code to check the audit trail requires a query
and a cursor.
What should you do?

A. Use the following error-handing method:
— Perform query and open the cursor
— Run code that iterates through the cursor and checks the audit trail
IF @@ERROR
RAISERROR @@ERROR

B. Use the following error-handing method:
BEGIN TRY
— Perform query and open the cursor
— Run code that iterates through the cursor and checks the audit trail
END TRY
BEGIN CATCH
RAISERROR (@myCustomError, 15)
END CATCH

C. Use the following error-handing method:
–Perform query and open the cursor
–Fetch the first row
WHILE /*not the last row*/
IF /*Code that checks the audit trail*/
–Fetch the next row
ELSE
SET @@ERROR = @myCustomError
END WHILE

D. Use the following error-handing method:
–Perform query and open the cursor
–Fetch the first row
WHILE /*not the last row*/
IF /*Code that checks the audit trail*/
— Fetch the next row
ELSE
RAISERROR (@myCustomError, 15)
END WHILE

Answer: D

Explanation: You need to pass the error message back to the application via an IF
ELSE statement to check the values in a row, then calling RAISERROR in the event
of the values being invalid. The RAISERROR function will allow you to send an
error message up the calling chain.
1. Industry regulations require an audit trail for all components and parts that go into a
doll or action figure. The audit trail must be able to use the UPC number on the package
to trace all the components and parts, who supplied the components and parts, and what
date the components and parts were shipped. Components and parts information must be
entered at the time the product line is created and cannot be altered after the quality
inspection. Attempts to modify components and parts information after the inspection
time must be logged.
2. Only product lines with an intact audit trail can be shipped. If an audit trail is not
available, the product line must be destroyed. The product line application includes a
verification routine that checks a specific product line’s audit trail. The application makes
use of structured error handling to react to a product line that must be destroyed.
Incorrect Answers:
A: The requirements will not be met if you use @@ERROR after iterating through the
cursor. The @@ERROR global variable contains the error number generated by the last
statement. Thus if will only include an error number if the last statement to process the
cursor is responsible for the error.
B: Using a TRY … CATCH block within a function is not possible.
C: @@ERROR is a global variable that is automatically set by SQL Server every time a
statement executes. Thus you cannot set @@ERROR.


QUESTION 7
You are designing the error-handling routines for the National Retailers Web
application. In the event of a customer failing to enter valid payment information,
you need to send a custom error to the calling application. Furthermore, this error
message has to be localized to the user’s language. The Web application will pass the
language when it opens a connection to the database server. You thus need to decide
which would be the most appropriate way to support error messages in multiple
languages.
What should you do?

A. A CASE statement should be added to the CATCH block.
Then call RAISERROR with a different error message for each language.

B. A different error number should be used for each language version.
Then a CASE statement should be added to the trigger and call RAISERROR with
the language-specific error.

C. Add a message for each language using sp_addmessage.
A different error number should be used for each language version.
Raise the error in the @@ERROR global variable.

D. Add a message for each language using sp_addmessage.
The same error number should be used for each language version.
Call RAISERROR from the trigger.

Answer: D

Explanation: The same error numbers should be used when adding an error
message for each language. This will allow SQL Server to match the session
language to the error message language when you call RAISERROR. The
sp_addmessage stored procedure is used to add an error message.
1. The National Retailers management wants to expand business by selling their
exclusive doll line on the company Web site.
2. The future online Sales application will be outsourced. NRCH-DB02 will host a
database to support the e-commerce application. The e-commerce application will make
use of Simple Object Access Protocol (SOAP) to retrieve product information and submit
orders.
Incorrect Answers:
A: A CASE statement should not be added to the CATCH block and then call
RAISERROR with a different error message for each language. This will make
maintenance quite difficult since you will then be required to modify the code that calls
RAISERROR if a message changes or you need to add a language.
B: There is no need to use a different error number for each different language version
and then add a CASE statement to the trigger. This option will work, though it will be
difficult to maintain since the trigger will then have to be modified each time a language
is added. It will also require more programming effort instead of allowing SQL Server to
choose the right language for the error message.
C: If you raise the error in @@ERROR, then the error associated with the last statement
will be raised and not the custom error message. Also, there is no need to define a
different error number for each language version.


QUESTION 8
You are designing the error-handling routines for National Retailers. You thus need
to design the code that will validate the audit trail for a product batch.
Users that do not enjoy membership of the sysadmin role will run the
fn_ValidateBatch function. You need to use the appropriate statements to ensure
that in the event of an invalid audit trail, an error is raised to the calling application
and an event is written to the application log.
What should you do?

A. Use the following statements:
sp_addmessage (@msgnum=50888, @severity=15, @msgtext=”Batch” + @b “cannot be
validated.”)
and
RAISERROR(50888, @batchnum, WITH LOG)

B. Use the following statements:
sp_addmessage (@msgnum=50888, @severity=16, @msgtext=”Batch %b cannot be
validated.”)
and
RAISERROR (50888, WITH SETERR, @batchnum)

C. Use the following statements:
sp_addmessage (@msgnum=50888, @severity=16, @msgtext=”Batch %b cannot be
validated.”)
and
RAISERROR (50888, %batchnum)

D. Use the following statements:
sp_addmessage (@msgnum=50888, @severity=16, @msgtext=”Batch %b cannot be
validated.”)
and
RAISERROR(50888, @batchnum, WITH LOG)

E. Use the following statements:
sp_addmessage (@msgnum=50888, @severity=21, @msgtext=”Batch %b cannot be
validated.”)
and
RAISERROR(50888, @batchnum, WITH LOG)

Answer: D

Explanation: By specifying the 16 severity level, you ensure that the users who do
not belong to the sysadmin role have the ability to raise the error. Also this option
displays the correct syntax for using arguments in a message text string. By default,
only messages with a severity level of over 19 are logged to the application log. This
can be overridden by specifying WITH LOG when calling RAISERROR.
1. Industry regulations require an audit trail for all components and parts that go into a
doll or action figure. The audit trail must be able to use the UPC number on the package
to trace all the components and parts, who supplied the components and parts, and what
date the components and parts were shipped. Components and parts information must be
entered at the time the product line is created and cannot be altered after the quality
inspection. Attempts to modify components and parts information after the inspection
time must be logged.
Incorrect Answers:
A: This option would be correct except for the severity level of 15. By default, only
messages with a severity level of over 19 are logged to the application log. This option
does not offer any overriding probabilities to have the error logged to the application log.
B: This option is only partly correct. But you should not raise the error by specifying
SETERR. This will result in @ERROR and ERROR_NUMBER to be set to 50000. You
do not make use of a concatenated string to use an argument in the message text.
C: The RAISERROR (50888, $batchnum) is the incorrect syntax. A local variable starts
with an @ and not a %. Also this option will not cause the application to be logged to the
application log.
E: You should not specify a severity of 21. Messages with this severity level can only be
raised by members of the sysadminrole.


QUESTION 9
You work as the database developer for National Retailers. You are currently
designing the indexes that will be used for the OnlineSales.Customers table. The
following exhibit illustrates the most common query that will be used.
SELECT FirstName, LastName, Address, City, State, Zip
FROM OnlineSales.Customers
WHERE CustomerID = @emailAddress
You thus need to select the best statement that should be used to create this index
that will accommodate this query.
What should you do?

A. Use the following statement:
CREATE INDEX ix_custInfo
ON OnlineSales.Customer(CustomerID)
INCLUDE (FirstName, LastName, Address, City, State, Zip);

B. Use the following statement:
CREATE INDEX ix_custInfo
ON OnlineSales.Customer(LastName, FirstName)
INCLUDE Address, City, State, Zip;

C. Use the following statement:
CREATE CLUSTERED INDEX ix_custInfo
ON OnlineSales.Customer(CustomerID, FirstName, LastName, Address, City, State,
Zip);

D. Use the following statement:
CREATE CLUSTERED INDEX ix_custInfo
ON OnlineSales.Customer(CustomerID)
INCLUDE (LastName, Address, FirstName, City, Zip, State);

Answer: A

Explanation: Making use of this statement will create an index with a small unique
key that covers the entire query. For optimal performance a small key size that
includes the columns used in the
WHERE clause and other predicates or in joins are recommended. In this scenario
the only required key column would be the CustomerID column. Then you can
include the rest of the columns as non-key columns. This means that you need to
create the index as a non-clustered index because non-key included columns are not
supported for clustered indexes.
1. The National Retailers management wants to expand business by selling their
exclusive doll line on the company Web site.
Incorrect Answers:
B: This index would not be used for the query because the CustomerID column is not
listed as a key column.
C: This statement, if created will result in an index with 344 bytes in the key column.
Though it is possible, it is not optimal since it is better to create an index with a smaller
key column and included columns.
D: This is incorrect because you cannot make use of included columns in a clustered
index.


QUESTION 10
National Retailers require a database that will support the e-commerce application.
You need to find a way to provide the e-commerce application with information
about the existing inventory. The database must determine the nearest factory that
has the product ordered in stock and send the order to that specific factory to have
it fulfilled.
You thus need to determine how the inventory information should be made
available to the e-commerce application while providing the best possible
performance when placing the order.
What should you do?

A. Query the database server at each factory using OPENROWSET from a stored
procedure run on NRCH-DB02.

B. At each factory implement an https: endpoint on the database server and expose a
Web method that checks inventory.

C. Replicate the data from the database servers at the different factories to the
NRCH-DB02 server using merge replication.

D. Use a linked server for the database server at each factory at NRCH-DB02.

Answer: C

Explanation: Using merge replication to replicate all data from the factories to
NRCH-DB02 will make the data available locally and improve query performance when
an order is placed. This is the best type of replication to use in this case because there
could be conflicts by orders placed over the Web and order places by the Sales
representatives at each factory. Also in a case where the different sites/factories are not
well-connected making use of merge replication makes sense. And in this case the
factories are connected to the Chicago office by demand-dial links.
1. The National Retailers management wants to expand business by selling their
exclusive doll line on the company Web site.
2. The future online Sales application will be outsourced. NRCH-DB02 will host a
database to support the e-commerce application. The e-commerce application will make
use of Simple Object Access Protocol (SOAP) to retrieve product information and submit
orders.
Incorrect Answers:
A: Making use of OPENROWSET to query each database server at each factory from a
stored procedure on NRCH-DB02 will result in one or more remote queries to be sent
across the network for each product ordered.
B: Making use of an https: endpoint will result in more overhead than is required. There
is already a demand-dial connection between the Chicago office and the different
factories. Thus there is no firewall that restricts incoming protocol to only https:. Making
use of a SOAP request will result in even more overhead than a remote query.
D: Making use of a linked server for the database server at each factory and performing a
remote query is not the best solution because each product that is ordered will cause at
least one, and possible more, remote queries to be sent across the network.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Free Microsoft 70-291 Q & A / Study Guide Part II

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


 

 

 

QUESTION 1:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
print server named Certkingdom -PR01 that has a built-in network interface.
A Certkingdom.com user named Andy Reid is a member of the Research and
Development department. Andy Reid complains that he cannot print to a print
device attached to Certkingdom -PR01.
You have received instruction to ensure that Andy Reid can print to the print
device. First you verify that the IP address for Certkingdom -PR01 is correct and that
the latest drivers for the print device are installed. You now want to verify that the
print jobs are being sent to the correct MAC address for Certkingdom -PR01.
What should do?

A. On Certkingdom -PR01, run the net session command.
B. On Certkingdom -PR01, run the netstat command.
C. On Certkingdom -PR01, run the netsh command.
D. On Certkingdom -PR01, run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of
users on a server, to see if users have files open, and to see how long each user’s session
has been idle. Net session manages server computer connections – used without
parameters, net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to display TCP/IP and port information.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 2:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets. All servers on the Certkingdom.com network run
Windows Server 2003 and all client computers run Windows XP Professional. All
servers are located in a central data center that uses a single IP subnet and all client
computers are located in one subnet.
The data center contains two routers named Certkingdom -SR01 and
Certkingdom -SR02, two domain controllers named Certkingdom -DC01 and
Certkingdom -DC02, and two file servers named Certkingdom -SR03 and
Certkingdom -SR04. The IP addresses of these servers are indicated in the table
below.

Host name IP address
Certkingdom-DC01 10.10.10.1
Certkingdom -DC02 10.10.10.2
Certkingdom -SR01 10.10.1.1
Certkingdom -SR02 10.10.1.2
Certkingdom -SR03 10.10.11.1
Certkingdom -SR04 10.10.11.2

You have received instruction from the CIO to install a new database server in the
data center. You install Windows Server 2003 on a new server computer named
Certkingdom -DB01 and hand it over to a database administrator named Dean
Austin. Dean Austin installs Microsoft SQL Server 2005 and makes some changes to
the TCP/IP settings on Certkingdom -DB01 as shown in the following table.

Parameter Value
IP address 10.10.1.3
Subnet mask 255.255.255.0
Default gateway 10.10.1.2

Later, Dean Austin complains that Certkingdom -DB01 cannot communicate with the
other servers in the data center. All other servers in the data center can
communicate with the other servers as well as the client computers. You log on to
Certkingdom -DB01 and attempt to ping Certkingdom -DC01 but you receive the
following error message: “Destination host unreachable”.
What should you do to ensure that Certkingdom -DB01 can communicate with the
other computers in the Certkingdom.com network?

A. Configure Certkingdom -DB01 with a default gateway of 10.10.1.1.
B. Configure Certkingdom -DB01 with a subnet mask of 255.255.0.0.
C. Configure Certkingdom -DB01 with an IP address of 10.10.10.3.
D. Configure Certkingdom -DB01 with an IP address of 10.10.11.3.

Answer: B

Explaination: Large networks are subdivided to create smaller subnetworks to reduce
overall network traffic by keeping local traffic on the local subnet and sending all
nonlocal traffic to the router. In order to create a subnetwork, we need to have a system
for addressing that allows us to use the network ID and host ID within the class-based
system. This is accomplished through the use of a subnet mask. To determine the
appropriate custom subnet mask (typically referred to simply as subnet mask) for a
network, you must first:
1. Determine the number of host bits to be used for subnetting.
2. Determine the new subnetted network IDs.
3. Determine the IP addresses for each new subnet.
4. Determine the appropriate subnet mask.
Incorrect Answers:
A: You need to assign the correct subnet mask to ensure connectivity.
C, D: The problem in this scenario is not a faulty IP address. It is the appropriate subnet
mask that has to be determined to enable connectivity.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 3:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets named Subnet A and Subnet B. Subnet A and
Subnet B are connected by a router. All computers on the Certkingdom.com network
are configured with static IP addresses. All network servers run Windows Server
2003 and all client computers run Windows XP Professional.
Certkingdom.com hires a new Sales manager named Amy Wilson. You install a new
client computer named Certkingdom -WS291 for Amy Wilson. You then add
Certkingdom -WS291 to Subnet A. The relevant portion of the network is configured
as shown in the exhibit.

However, Amy Wilson complains that Certkingdom -WS291 cannot communicate
with other hosts on the network.
What should you do to ensure that Certkingdom -WS291 can communicate with all
local and remote computers on the Certkingdom.com network?

A. Configure Certkingdom -WS291 with a default gateway of 192.168.28.84.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.2.1.
C. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.128.
D. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.192.

Answer: C

Explaination: It is evident from the exhibit that the file server and
Certkingdom -WS291 have a different subnet mask. This is the reason why they
cannot communicate with each other. You must therefore change the subnet mask
of Certkingdom -WS291 to 255.255.255.128.
Incorrect Answers:
A, B: The problem is not the gateway IP address that is faulty, but rather the subnet
mask.
D: This option suggests the correct object that has to be changed, but it gives the wrong
subnet mask.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 4:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and branch offices in Dallas and
Miami. All servers on the Certkingdom.com network run Windows Server 2003 and all
client computers run Windows XP Professional. You work in the Miami branch
office.
The network at the Miami branch office consists of 25 different subnets, each with a
maximum of six computers. The network administrator at headquarters has
allocated the 192.168.3.0/24 network address to the Miami branch office.
You install a new server named Certkingdom -SR21 in the Miami branch office. You
need to configure the Internet Protocol (TCP/IP) properties for Certkingdom -SR21.
You configure Certkingdom -SR21 with an IP address of 192.168.3.44. What subnet
mask should you use?

A. A subnet mask of 255.255.255.0.
B. A subnet mask of 255.255.255.128.
C. A subnet mask of 255.255.255.192.
D. A subnet mask of 255.255.255.240.
E. A subnet mask of 255.255.255.248.

Answer: E

Explaination: The network address is: 192.168.2.0/24, which means
11111111.11111111.11111111.0 in binary.
Therefore, you can use the last octet to configure the 30 subnets and 6 hosts in each
subnet
You need only six host PCs. When you convert to binary, it is: 00000111. As a result,
you use 3 bits.
This leaves 5 bits for the subnets 11111000 converted to decimal:
128+64+32+16+8=248, therefore the subnet mask will be: 255.255.255.248.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p.57


QUESTION 5:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and a branch office in Dallas. All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. You work in the Dallas branch office.
The network at the Dallas branch office consists of a single subnet that contains 150
client computers and 12 servers. The network administrator at headquarters has
allocated the 10.10.0.0/16 network address to the Dallas branch office.
You have received instruction from your manager to place all servers at the Dallas
branch office into a separate subnet that uses the 192.168.10 public addressing
scheme. Your manager asks you to make allowance for a maximum of 30 servers in
the new subnet.
Which subnet mask should you use for the new subnet?

A. 255.255.255.224
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

Answer: A

Explaination: A 255.255.255.224 subnet mask gives five host address bits, so the
maximum number of host addresses is 2 ^ 5 – 2 = 30 host addresses. Thus
255.255.255.224 is the only subnet mask that will allow for sufficient IP addresses in
case of further growth, whilst still conserving as many current addresses as possible.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 62


QUESTION 6:

DRAG DROP
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
You have installed a new server named Certkingdom -SR06 on the network. The
relevant portion of the network is shown on the exhibit.

You want to configure Certkingdom -SR06 with a valid static IP configuration.
Certkingdom -SR06 must be able to communicate with all hosts on the network and
on the internet. You also need to configure Certkingdom -SR06 to use the DNS server
on the local subnet for name resolution. In addition, you must configure redundancy
for name resolution.
How should you configure Certkingdom -SR06?
To answer drag the appropriate IP addresses and Subnet masks to the appropriate
places.

Answer:

Explaination:
The Class C address 192.168.0.100 has to be the IP address to enable
Certkingdom -SR06 to communicate with all hosts on the network and on the internet
as 192.168.0.1, 192.168.0.2 and 192.168.0.110 are already in use. 192.168.5.2 and
192.168.5.100 are on the wrong subnet, and besides, 192.168.5.12 is already in use.
The subnet mask for this Class C address is 255.255.255.0. The default gateway
should be 192.168.0.1. To configure redundancy for name resolution, configure the
preferred DNS server/primary address as 192.168.0.2, and the alternate DNS
server/secondary address as 192.168.5.2.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 80-116


QUESTION 7:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. You work in the Miami branch
office.
The Miami branch office has a file server named Certkingdom -SR25 that hosts
critical documents. Certkingdom -SR25 is configured with a DHCP client reservation.
Certkingdom.com users from all three offices download documents from
Certkingdom -SR25.
One day Certkingdom.com users complain that they cannot access the documents on
Certkingdom -SR25. You discover that the DHCP server has failed. The DHCP server
is located at headquarters.
You have received instruction from the CIO to ensure that Certkingdom -SR25 is
available even if it is unable to obtain or renew a lease from the DHCP server.
How could you accomplish this task?

A. On the DHCP server, increase the DHCP lease period.
B. Configure alternate IP settings for Certkingdom -SR25 on the Alternate Configuration
tab of the Internet Protocol (TCP/IP) properties.
C. Configure the DHCP scope in the 169.254.0.1. – 169.254.255.254 range.
D. On the DHCP server, configure the DHCP 001 Resource Location Servers reservation
option for Certkingdom -SR25.

Answer: B

Explaination: Windows Server 2003 includes the Alternate Configuration feature.
The Windows Server 2003 servers can be configured to use an alternate static IP
configuration if a DHCP server is unavailable. When a DHCP client determines that
the DHCP server is unavailable, it will automatically change over and also configure
the TCP/IP stack with the static address information specified on the Alternate
Configuration tab of the Internet Protocol (TCP/IP) properties.
Incorrect Answers:
A: Increasing the lease period would result in DHCP clients requesting leases less
frequently, but won’t guarantee that Certkingdom -SR25 will be available when the DHCP
server is down.
C: Modifying the DHCP scope to the 169.254.0.1. – 169.254.255.254 range will still be
reliant on the DHCP server.
D: Configuring the DHCP 001 Resource Location Servers reservation option for
Certkingdom -SR25 on the DHCP server will not ensure that Certkingdom -SR25 will
receive an IP address or have the IP address renewed.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 114, 117


QUESTION 8:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR34. Certkingdom -SR34 is configured as a DHCP server
and has been authorized in Active Directory. The Telnet service has been installed
and started on Certkingdom -SR34.
One day Certkingdom.com users complain that they cannot access network resources.
Your investigations reveal that the DHCP Server service on Certkingdom -SR34 has
stopped. You install the administrative tools on a client computer named
Certkingdom -WS291 and log on to the computer. When you open the DHCP console
on Certkingdom -WS291 and attempt to connect to Certkingdom -SR34, you receive an
error message that states: “Cannot find the DHCP Server.” You then attempt to
ping Certkingdom -SR34 but fail.
How can you connect to the DHCP Server service on Certkingdom -SR34 by using the
DHCP console on Certkingdom -WS291?

A. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcp
command.
B. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcpserver
command.
C. Establish a Telnet session to Certkingdom -SR34 and then run the ipconfig /renew
command.
D. On Certkingdom -WS291, run the netsh dhcp server\\ Certkingdom -SR34 show server
command.

Answer: B

Explaination: You can start the DHCP Server service by executing the Net Start
Dhcpserver command at the command prompt.
Telnet is a protocol that enables an Internet user to log on to and enter commands on a
remote computer linked to the Internet, as if the user were using a text-based terminal
directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. The
term telnet also refers to the software (client or server component) that implements this
protocol.
Given the fact that you can ping Certkingdom -SR34 you should then establish a Telnet
session to Certkingdom -SR34 and then run the appropriate command.
Reference:
J. C. Mackin & Ian McLean, MCSA/MCSE self-paced training kit (exam 70-291):
implementing, managing, and maintaining a Microsoft Windows Server 2003 network
infrastructure, Microsoft Press, Redmond, 2004, p. 7-23


QUESTION 9:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR51 that is configured as a print server for a print
device that has a built-in network interface. The print device is used by the Sales
department to print Sales reports.
A Certkingdom.com user named Clive Allen is a member of the Sales department. Clive
Allen complains that he cannot print to the print device attached to
Certkingdom -SR51.
You verify that the IP address for Certkingdom -SR51 is correct and that the correct
drivers for the print device are installed. You now want to verify that the print jobs
are being sent to the correct MAC address for Certkingdom -SR51.
You log on to Certkingdom -SR51. What should you do next?

A. Run the net session command.
B. Run the netstat command.
C. Run the netsh command.
D. Run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap
command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of users
on a server, to see if users have files open, and to see how long each user’s session has
been idle. Net session manages server computer connections – used without parameters,
net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to show what ports your computer is listening on.: -R is used to reload your
LMHOSTS file located in %systemroot%\system32\drivers\etc., -r will show you which
name resolutions have been answered via broadcasts, and which have been answered via
a NetBIOS name server, -RR switch of the command utility refreshes your NetBIOS
name with a configured WINS server.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 10:

Network Topology Exhibit:

LAN Settings Exhibit:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
Microsoft Internet Security and Acceleration (ISA) Server computer named
Certkingdom -SR01, a DNS server named Certkingdom -SR02, a DHCP server named
Certkingdom -SR03, a file server named Certkingdom -SR21, and a Web server named
Certkingdom-SR25. Certkingdom -SR25 also serves as a central antivirus server.
Certkingdom -SR21 is located on the 10.10.11.0 subnet and Certkingdom -SR25 is
located in the perimeter network. Certkingdom -SR21 contains antivirus software
that checks for new virus definitions on Certkingdom -SR25 every hour. You can also
access Certkingdom -SR25 through a virus update Web page to perform manual
virus definition updates.
Certkingdom -SR03 suffers a catastrophic failure and is removed from the network.
Due to budgetary constraints, a replacement for Certkingdom -SR03 will only be
acquired in the next financial year. You need to redesign network addressing
scheme, and change the IP addresses for Certkingdom -SR01 to the addresses shown
in the Network Topology exhibit.
Certkingdom -SR02 contains the new host (A) resource records for
Certkingdom -SR01.
You receive reports about a new virus threat and want to protect the network
immediately by manually downloading the new virus definitions to
Certkingdom -SR21. you log on to Certkingdom -SR21 but discover that you cannot
access the virus update Web page on Certkingdom -SR25. The static TCP/IP
configuration on Certkingdom -SR21 uses Certkingdom -SR02 as the preferred DNS
server.
You confirm that Certkingdom -SR01 is configured properly. On Certkingdom -SR21,
you view the Internet Explorer LAN settings that are shown in the LAN Settings
exhibit.
What should you do to allow Certkingdom -SR21 to connect to Certkingdom -SR25?

A. At a command prompt on Certkingdom -SR21, run the ipconfig /flushdns command.
B. In the LAN settings of Internet Explorer on Certkingdom -SR21, select the
Automatically detect settings check box.
C. At a command prompt on Certkingdom -SR01, run the ipconfig / flushdns command.
D. At a command prompt on Certkingdom -SR01, run the ipconfig /registerdns command.

Answer: A

Explaination: Running the ipconfig /flushdns command will flush and reset the DNS
resolver cache which is necessary to allow connection. Run this command on
Certkingdom -SR21 to connect to Certkingdom -SR25.
Incorrect Answers:
B: Selecting the “Automatically detect settings” checkbox is not going to allow
Certkingdom -SR21 to connect to WWW.
C: The ipconfig /flushdns command flushes and resets the DNS resolver cache. This is
not what is necessary.
D: The ipconfig /registerdns command refreshes all DHCP leases and registers any related
DNS names. This option is available only on Windows 2000 and newer computers that
run the DHCP Client service. This is not going to allow Certkingdom -SR21 to connect to
WWW when it is run on Certkingdom -SR01.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 311


QUESTION 11:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
DHCP server named Certkingdom -SR15 that is configured with a single scope.
Certkingdom.com hires a new Sales manager named Andy Reid. You install a new client
computer named Certkingdom -WS291 for Andy Reid. You connect
Certkingdom -WS291 to the network by plugging the network cable into the network
adapter on Certkingdom -WS291 and attempt to connect to Certkingdom -SR25.
However, you cannot access any of the servers on the network. When you open a
command prompt on Certkingdom -WS291 and run the ipconfig /renew command,
you receive the following response.

You log on to a client computer named Certkingdom -WS292 and run the ipconfig
/renew command successfully.
What should you do to ensure that Certkingdom -WS291 can receive its IP address
configuration from the Certkingdom -SR25?

A. Restart the DHCP service on Certkingdom -SR25.
B. Restart Certkingdom -WS291.
C. Restart Certkingdom -SR25.
D. Add additional IP addresses to the scope on Certkingdom -SR25.

Answer: B

Explaination: It is probable that the TCP/IP stack has a problem because the
computer is unable to send a DHCP discover broadcast packet. This can happen
when you insert a network cable after the PC has been started. You should restart
the client PC to successfully obtain a new IP address.
Incorrect Answers:
A, C, D: This is unnecessary because Certkingdom -WS292 did obtain an IP address from
the DHCP server, thus indicating that the DHCP server configuration is not the issue.
Reference:
Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290:
Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD
Training System, p. 629


QUESTION 12:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. The Certkingdom.com network
contains a DHCP server named Certkingdom -SR01. The relevant portion of the
network is shown in the following network diagram.

You work at headquarters. A Certkingdom.com employee named Andy Booth is one of
three employees that are relocated to headquarters from the Dallas office. Andy
Booth uses a portable client computer named Certkingdom -WS291. Andy Booth
complains that when he plugs Certkingdom -WS291 into the LAN connection in his
new cubicle, he cannot connect to network resources on the LAN or the Internet.
None of the other employees are experiencing the same problem.
When you run the ipconfig command from a command prompt on
Certkingdom -WS291, you see the output as shown in the exhibit.

What should you do to allow Certkingdom -WS291 to connect to network resources
on the LAN or the Internet?

A. Configure Certkingdom -WS291 with a subnet mask of 255.255.240.0.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.3.12.
C. Configure Certkingdom -WS291 with a primary DNS suffix of Certkingdom.com
D. Configure Certkingdom -WS291 to automatically lease an IP address from
Certkingdom -SR01.

Answer: D

Explaination: The client computers on the subnet use DHCP to obtain their IP
configurations. Certkingdom -WS291 has a static IP address, and therefore cannot
obtain a valid IP configuration from the DHCP server.
Incorrect Answers:
A: By changing the subnet mask you will not ensure that Certkingdom -WS291 will
connect to other computers and the Internet.
B: Changing the default gateway will not enable Certkingdom -WS291 LAN connection.
Besides, 192.168.3.12 is the IP address of the DHCP server.
C: Adding a primary DNS suffix means that only domain names listed in that window
will be tried for resolution purposes. Both the connection-specific and primary DNS
suffix are ignored.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, p. 515


QUESTION 13:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows 2000 Professional. Certkingdom.com has headquarters in
London and branch offices in Paris, Berlin, Milan, Madrid, Stockholm, Warsaw,
Minsk, and Athens. Each branch office has a server that provides DHCP Server
services and between two to twenty client computers. A client computer in each
branch office is configured with a shared dial-up connection. You work at
headquarters.
The Berlin branch office has only two client computers named Certkingdom -WS291
and Certkingdom -WS292. A Certkingdom.com user named Kara Lang works in the
Berlin office. One morning Kara Lang complains that the shared dial-up connection
on Certkingdom -WS291 is no longer working.
Your investigation reveals that Certkingdom -WS292 can connect to shared folders
on Certkingdom -WS291 and that Certkingdom -WS291 can connect to the network at
headquarters. However, Certkingdom -WS292 cannot connect to resources on the
network at headquarters.
What should you do to ensure that both Certkingdom -WS291 and
Certkingdom -WS292 can connect to resources on the network at headquarters?

A. Reconfigure Internet Connection Sharing on Certkingdom -WS291.
B. Configure the shared dial-up connection on Certkingdom -WS291 so that automatic
dialog is enabled.
C. Configure Certkingdom -WS292 to receive an IP lease from a DHCP server.
D. Configure Certkingdom -WS292 to use Certkingdom -WS291 for DNS name resolution.

Answer: C.

Explaination: The problem is most likely caused by an incorrect or non-existent
default gateway setting on Certkingdom -WS292. If you configure
Certkingdom -WS292 to use DHCP to obtain IP addressing information,
Certkingdom -WS292 will receive the correct settings from the ICS service on
Certkingdom -WS291.
Incorrect Answers:
A: The question refers to a shared dial-up connection on Certkingdom -WS291 not
working. If the dial-up connection is shared, then Internet Connection Sharing is enabled
already.
B: The question states that Certkingdom -WS291 automatically connects to the network at
the main office whenever the user on Certkingdom -WS291 attempts to access resources
located on the main office network. This indicates that automatic dial-up is already
configured.
D: Certkingdom -WS291 is not a DNS server. The ICS service has a DNS proxy that
would pass DNS requests to whichever DNS server Certkingdom -WS291 is using.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapters 1 & 2, pp. 45, 124


QUESTION 14:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows NT Workstation 4.0. The network contains 2,500 client
computers that are configured with static IP addresses.
Certkingdom.com issues a new network policy that requires all network computers to
have dynamically assigned IP configurations. You enable the DHCP Server service
on a member server named Certkingdom -SR25. Three network support technicians
have been instructed to configure the IP properties on all client computers to
receive a DHCP lease from Certkingdom -SR25.
It is estimated that the change over will take two weeks to complete. You need to
ensure that the DHCP server will not lease an IP address that is statically
configured on a computer that the network support technicians have not yet seen to.
What should you do?

A. On Certkingdom -SR25, configure Conflict detection attempts to 1.
B. On Certkingdom -SR25, configure Conflict detection attempts to 3.
C. On Certkingdom -SR25, configure client reservations for each client computer’s MAC
address.
D. On Certkingdom -SR25, activate and reconcile the scopes.

Answer: A

Explaination: When conflict detection attempts are set, the DHCP server uses the
Packet Internet Groper (ping) process to test available scope IP addresses before
including these addresses in DHCP lease offers to clients. A successful ping means
that the IP address is in use on the network. This results in the DHCP server not
offering to lease the address to a client.
If the ping request fails and times out, it indicates that the IP address is not in use on the
network. In this case, the DHCP server offers to lease the address to a client. Each
additional conflict detection attempt delays the DHCP server response by a second while
waiting for the ping request to time out. This in turn increases the load on the server. A
value of no greater than two (2) is recommended for ping attempts.
Incorrect Answers:
B: Due to the latency involved in ping attempts, the higher the conflict detection value is
set, the longer the lease process will be for every client that uses the DHCP server.
C: Configuring client reservations for each client computer MAC address will involve a
physical visit to each and every client computer if you do not ping it successfully.
D: The scope would already be activated in this scenario.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, pp. 208-209


QUESTION 15:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and client
computers run Windows XP Professional, Windows 2000 Professional, or Windows
NT Workstation. All client computers are configured with default settings.
The Certkingdom.com network contains a server named Certkingdom -SR31 that
functions as a DHCP and DNS server, and a server named Certkingdom -SR38 that
contains antivirus server software. All DNS zones on Certkingdom -SR31 are enabled
for DNS dynamic updates. The computer account for each client computer is the
owner of its own DNS host record. No other server provides DNS services.
What must you do to ensure that Certkingdom -SR38 can contact client computers by
using fully qualified domain names (FQDNs) to propagate virus definition updates?

A. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records only
if requested by the DHCP clients option.
B. On Certkingdom -SR38, modify the Always dynamically update DNS A and PTR
records option.
C. On Certkingdom -SR31, modify the Discard A and PTR records when lease is deleted
option.
D. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records for
DHCP clients that do not request dynamic updates (for example, clients running
Windows NT 4.0) option.

Answer: D

Explaination: Dynamically Update DNS A And PTR Records For DHCP Clients That
Do Not Request
Updates – This checkbox lets you handle these older clients graciously by making the
updates using a separate mechanism. When checking this check box you will ensure that
Certkingdom -SR38can resolve FQDNs for all client computers on the network under the
given circumstances and the role that Certkingdom -SR31 plays.
Incorrect Answers:
A: Dynamically Update DNS A And PTR Records Only If Requested By The DHCP
Clients – This radio button (which is on by default) tells the DHCP server to register the
update only if the DHCP client asks for DNS registration. When this button is active,
DHCP clients that aren’t hip to DDNS won’t have their DNS records updated. However,
Windows 2000, XP, and Server 2003 DHCP clients are smart enough to ask for the
updates.
B: Always Dynamically Update DNS A And PTR Records – This radio button forces the
DHCP server to register any client to which it issues a lease. This setting may add DNS
registrations for DHCP-enabled devices that don’t really need them, like printer servers;
however, it allows other clients (like Mac OS, Windows NT, and Linux machines) to
have their DNS information automatically updated. This is not what is required.
C: Discard A And PTR Records When Lease Is Deleted – When a DHCP lease expires,
what should happen to the DNS registration? Obviously, it would be nice if the DNS
record associated with a lease vanished when the lease expired; when this checkbox is
checked (as it is by default), that’s exactly what happens. If you uncheck this box, your
DNS will contain entries for expired leases that are no longer valid; when a particular IP
address is reissued on a new lease, the DNS will be updated, but in between leases you’ll
have incorrect data in your DNS-always something to avoid.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 246


 

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 

Free cooling lures Facebook to Arctic’s edge

Data center in northern Sweden will use outside air year-round to cool machines, draw on renewable hydroelectricity for powerIn a move that will further bolster Facebook’s green data center credentials, the social networking giant plans to build an enormous new 120MW data center in Luleå, Sweden, just 62 miles south of the Arctic Circle. The company will make the official announcement Thursday, according to the Telegraph.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

The allure of the locale is three-fold: First, it’s a prime location for taking advantage of free cooling — that is, using outside air to chill machines instead of running costly CRAC (computer room air conditioner) units 24/7. Second, dams on the Luleå river generate an abundance of renewable electricity — enough so that half is exported — so Facebook needn’t worry about an energy shortfall any time soon. Third, Sweden has a dense fiber-optic network, which means data can flow reliably and easily through Finland and on into Eastern Europe and Russia.

For the past few years now, organizations have struggled with strategies to cut costs and energy consumption within their data centers. Free cooling has proven a paricularly desirable technique as the cost of generating artificially chilled air can be quite considerable. Facebook employs free cooling at its data center in Prineville, Ore., for example, though the AC sometimes needs to be turned on during the summer. That contributes to the facility’s remarkably low PUE (Power Utilization Effectiveness); Facebook claims the figure is 1.07.

This new Luleå facility — the first Facebook data center to be built outside the United States — could be cooled freely throughout the year: The average temperature in the region is around 35.6 degrees Fahrenheit, according to the Telegraph, and the temperature has not exceeded 86 degrees for more than 24 hours for the past 50 years. ASHRAE (American Society of Heating, Refrigerating and Air-Conditioning Engineers) recommends operating data centers at a temperature range of 64.4 to 80.6 degrees.

Notably, server vendors are taking note of the growing trend toward using outside air to cool datacenters. Earlier this year, Dell began to warranty servers running in temperatures as high as 133 degrees.

The abundance of renewable energy is another boon for Facebook, as it earns the company eco-points by reducing its overall carbon footprint. Other data center operators, too, have turned to alternative energy to cut operation costs and to improve cut emissions. Google, for example, has a huge solar installation, while Fujitsu installed a hydrogen fuel cell at its Sunnyvale, Calif., campus.

Microsoft CRM App Update Adds Social Networking Features

Microsoft (NSDQ:MSFT) has delivered an update for its Dynamics CRM on-premise and cloud applications, adding new social networking features and a way to administer the CRM Online applications in conjunction with the Office 365 cloud application set.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

The on-premise Dynamics CRM and cloud-based Dynamics CRM Online are currently used by some 30,000 customers with 2 million users, said Seth Patton, senior marketing director for Dynamics CRM, in an interview. More than 1,200 solution providers are now certified in the CRM competency within the Microsoft Partner Network program.

Dynamics CRM Online has been gaining “huge market momentum among customers and partners” since Microsoft made it available worldwide earlier this year, Patton said, with two out of three new customers choosing the cloud-based applications and one-third going with the on-premise version.

Microsoft is in heavy competition with Salesforce.com in the market for cloud CRM services, as well as with Oracle (NSDQ:ORCL), SAP (NYSE:SAP) and others in the CRM arena.

When Microsoft launched the 2011 release of Dynamics CRM earlier this year the company committed to updating the software twice a year and the November 2011 service update fulfills that promise, Patton said.

Microsoft’s strategy for adding social networking capabilities to Dynamics CRM includes integrating it with other Microsoft collaboration applications, such as SharePoint and Lync, and adding new capabilities directly into the CRM applications. Patton said that approach is more productive for users than Salesforce’s Chatter social networking application.

“It’s not about being more social. It’s about creating better customer interactions,” Patton said.

The November 2011 update includes a new activity feed capability that provides configurable, real-time notifications on significant relationships and business events. And those activity feeds can be seen on Windows Phone 7 devices through a new application developed for that mobile operating system.

The new Dynamics CRM release also offers new micro-blogging and conversations capabilities, the latter for posting questions, observations, suggestions and status updates.

While Dynamics CRM is already integrated with Office 365 from a user standpoint, the Dynamics CRM November 2011 update is based on the same administrative, provisioning and billing platform as Office 365, simplifying those chores for IT administrators. Patton said the unified administrative interface should make it easier for channel partners to sell the Dynamics CRM Online service.

Also new in the November 2011 release are improved disaster recovery features with in-region replication for data protection and business continuity.

Windows 8 Tiles Metro-Style UI on Windows 7

Windows 8 would ditch the Windows 7 Aero interface in favor of Metro UI,  which exists on Windows Phone today. If you love the MEtro style tiles and interface, you can get the Metro UI on windows 7 using Zetro UI.

Zetro UI is very simple to install and configure. Extract the zip after downloading the theme from the link below. When done, follow the below two simple steps:

Opening the Extras folder, running the Theme Patcher, and clicking on all three “patch” buttons contained within.
Opening the Theme folder and copying both of the files inside it to C:\Windows\Resources\Themes.

When finished, Open the Control Panel and “Change the Theme” under Appearance and Personalization. The Zetro theme should be available in “Installed themes”.

metro-ui-windows7
The look and feel of the theme makes you windows 7 look simple with white all over the place, which might look a bit odd for the first few minutes. You can tweak it using the extra tweaks available in the readme file that comes along with the zip.

Extending the tweak further, feel free to blend it with something like the Metro-inspired Omnimo 4 theme for Rainmeter.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Trend Micro issues virtualisation security warning

Companies could be at risk if hackers turn their attentions away from the desktop

Attacks targeted at datacentres and virtualised environments could represent the next vanguard of threats if cyber criminals begin to shift their attention away from the increasingly well secured desktop, according to security experts.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


Trend Micro chief technology officer Raimund Genes told V3.co.uk that, despite the many benefits of cloud computing, the back-end virtual infrastructures of many clouds are potentially at risk.

“If the desktop becomes more difficult to attack they will focus on the datacentre,” he said. “VMware has done a good job with security, but is it 100 per cent flawless? The same is true with other providers. It’s something we need to be aware of.”

Genes also criticised Microsoft’s Essentials security tool for relying on an outdated anti-virus signature update system which is poor at protecting against zero-day threats and lacks the agility of a cloud-based protection network.

“Every malware is now zero-day,” he said. “Microsoft’s detection is lousy. It doesn’t use the cloud and it doesn’t offer exposure layer protection.”

Genes criticised the “security monoculture” that the free Essentials security tool could create, claiming that it will make it easier for hackers to circumvent.

His argument echoes that of Panda Security, which also railed against Microsoft’s free anti-virus product last month, calling for a European anti-trust investigation over the policy of pushing out the software via the Microsoft and Windows Update services.

Windows @ 25: 25 things you didn’t know about the Microsoft OS

It’s 25 years since Microsoft launched the first version of Windows, and what started out in November 1985 as a graphical front end for DOS has grown into the most widely used operating system. To mark Windows’ 25th, we’ve put together 25 facts about the OS to highlight some of the more memorable moments in its history.

1. The origins of Windows can be traced to September 1981 when Microsoft began working on a project entitled Interface Manager.

2. The release of Windows 1.0 in 1985 was actually two years later than planned. We’d be on Windows 8 now if they’d stuck to their schedules.

3. Microsoft supported Windows 1.0 until the final day of 2001, some 16 years later.

4. Windows 3.1, despite being first launched in 1992, found a niche role as an embedded operating system, and was still in use in 2008 by Virgin Atlantic and Qantas in some onboard entertainment systems on long-distance flights.


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com


5. Fortune named Microsoft as the ‘Most Innovative Company Operating in the US’ in 1993 as sales of Windows started to rocket.

6. Many editions of Windows required endless floppy disks to install the system. For example, Windows 95 came on 13 disks.

7. Microsoft used Start Me Up by The Rolling Stones on adverts for the launch of Windows 95. The Stones were reportedly paid between $8m and $14m, but this is said to be a gross exaggeration.

8. Music was also part of the obligatory free stuff that Microsoft bundled in with Windows 95 – to be exact, a video of Buddy Holly by rock band Weezer to show off the system’s multimedia capabilities.

9. Microsoft also cashed in on the success of Friends in the 1990s by commissioning a promotional video, labeled a ‘cyber sitcom’, featuring Jennifer Aniston and Matthew Perry showing off the top 25 features of Windows 95. The firm claimed it was a “fast and funny” guide to the new operating system. It was anything but.

10. In the US, the Empire State Building was lit up to match the colours of the Windows logo for the 95 launch.

11. In the UK, Microsoft paid for 1.5 million issues of The Times to be given away with a bundled supplement about Windows 95 on the day it launched. This was twice the daily circulation of the paper at the time.

12. All this advertising clearly worked, as more than a million copies of Windows 95 were sold in the first four days after its release. How Microsoft executives must wish for a return to those days, instead of watching Apple enjoying queues of fans waiting for new products.

13. Nevertheless, Windows has a 91 per cent market share for client operating systems that use the internet, so those executives needn’t be too glum.

14. Bill Gates appeared in two adverts with American comedian Jerry Seinfeld in 2008 in which, as well as displaying what we’ll kindly refer to as questionable comic timing, he and Seinfeld made some sort of left-field comment on the way Windows had helped connect billions of people on the planet, or something like that.

15. Musician Brian Eno, of Roxy Music, composed Windows 95’s startup music. He produced 84 pieces before settling on the now famous sound.

16. There are estimated to be some 25 million Windows crashes everyday.

17. The successor to Windows XP, which eventually became Vista, was codenamed Longhorn during development stages, which is also a type of cow. You can draw your own comparisons.

18. Bill Gates is actually called William Henry Gates III and has a knighthood bestowed on him by the Queen, although more for his charity work than for Windows.

19. During the pre-release phase of Windows 98, Gates was hit by the Blue Screen of Death when showing off the new Plug and Play feature, something he managed to laugh off rather well.

20. Windows supports 34 languages including Hebrew, Latvian and Arabic.

21. Windows 8 is most likely to be released sometime around 2012, based on previous operating cycle timelines.

22. Windows XP is said to have 50 million lines of code, the figure rising with each new release.

23. It’s impossible to name a folder as ‘Con’ on Windows. Try it. On the desktop, in the hard drive, wherever you try, it will just revert back to the name ‘New Folder’.

24. Microsoft used US cities for codenames of some of the new Windows developments, such as Chicago for Windows 95 and Memphis for Windows 98.

25. And finally, while Windows has been a staple of the desktop computing environment for the past 25 years, another Microsoft attempt at providing a user interface for personal computers proved less successful, and was even placed in Time magazine’s 50 Worst Inventions.

It’s name? Microsoft Bob, a “front room” layout of the desktop environment that was essentially Clippy on steroids. It didn’t last long.

Making Windows 7 Home Premium the Ultimate OS, Part 4: Disk Encryption

As you step through the various Windows 7 product editions, an interesting picture emerges. Windows 7 Home Premium is, quite clearly, the sweet spot from a functionality perspective and the reason I consider this version to be the starting point for any Windows 7 user, and the focal point of this article. When you move up from Home Premium to Professional, you get a smaller bump in functionality, and if you look over the past two parts of this series, you’ll see some of the key Windows 7 features that are unique to Professional edition and the free or cheap tools I recommend to Home Premium users to replace them. But when you jump up from Professional to Ultimate, there’s an even smaller leap. In fact, there are really only two key features that are unique to Windows 7 Ultimate. And they’re both based around the notion of encryption-based data protection.

These features are so key, in fact, that I consider it almost criminal that Microsoft doesn’t make them available to all Windows users. I’d like to see that change in the future. But for now, you’ll need to seek out other ways to duplicate the functionality in the features Microsoft provides via its BitLocker and BitLocker To Go functionality.

BitLocker came first, in Windows Vista, and provides full-disk encryption for fixed hard drives. BitLocker To Go, meanwhile, debuts in Windows 7 and adds this same encryption functionality to removable storage media like USB memory keys. You can find out more about BitLocker To Go in my Windows 7 Feature Focus article.

I’ve found an excellent replacement for BitLocker, but have yet to find anything that is as seamless and well designed as BitLocker To Go. Fortunately, there’s a nice (if temporary) workaround you can take advantage of if you’d like to use BitLocker To Go. Here’s what I found.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Full disk encryption replacement: Zone Alarm DataLock

Cost: $20 (Normally $30)
Download: https:://www.zonealarm.com/security/en-us/zonealarm-data-lock.htm
Description: Hard drive encryption makes everything on your computer’s hard drive unreadable to unauthorized eyes. It jumbles the data in such a way that it cannot be deciphered unless a special password is entered. If your laptop PC is stolen or lost, hard drive encryption prevents your personal data from getting into the wrong hands, even if you never recover your hardware. All your data is fully protected – even temporary and deleted files. Your encrypted hard drive is inaccessible unless a special login and password are entered. No password, no access – thieves are locked out. This login cannot be bypassed by removing the hard drive or by booting off a CD.

Notes: ZoneAlarm DataLock is essentially a consumer version of a Check Point product that’s been around for a while. I’ve been using it on my own Windows 7 Home Premium-based laptop (a ThinkPad SL410) and it appears to work quite well. As with any disk encryption solution, the actually encryption process is time consuming. But once it’s done, you won’t notice that it’s there–it doesn’t impact performance at all, from what I can tell–other than when you boot the computer, since there is a separate security logon at boot time.

There are a couple of interesting differences between DataLock and BitLocker (aside from the boot time logon). First, DataLock also works with Windows XP and Vista as well as Windows 7. Second, if you forget your boot-time logon, you can actually call ZoneAlarm to get it; Microsoft doesn’t offer any kind of BitLocker recovery functionality.

There are a few questions here. ZoneAlarm notes that “not all systems will be compatible” but doesn’t explain what that means. (I had no issues installing it, but I only did so on one system.) The product costs $20, and while ZoneAlarm says you don’t need to pay a yearly license fee, once you go beyond the first year of usage, you will need to pay a small renewal fee after the first year for ongoing technical support, which presumably includes logon recovery. Also, I noticed that Windows Home Server-based PC backup stopped working after installing DataLock. I will test whether reinstalling the WHS Connector software fixes this after I return from the trip I’m currently on.

Making Windows 7 Home Premium the Ultimate OS
There’s not a lot of UI to show here: It just sits in the background, protecting your data.
Other alternatives to BitLocker and BitLocker To Go

Here are some other reader recommendations for BitLocker and BitLocker To Go replacements that you may want to check out.
TrueCrypt

Cost: FREE
Download: https:://www.truecrypt.org/
Description: TrueCrypt is free open-source disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux.

Main features:

* Creates a virtual encrypted disk within a file and mounts it as a real disk.
* Encrypts an entire partition or storage device such as USB flash drive or hard drive.
* Encrypts a partition or drive where Windows is installed (pre-boot authentication).
* Encryption is automatic, real-time (on-the-fly) and transparent.
* Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
* Provides plausible deniability, in case an adversary forces you to reveal the password.
* Encryption algorithms: AES-256, Serpent, and Twofish. Mode of operation: XTS.

Notes: TrueCrypt is hard. But if you don’t mind navigating through a technical interface, it can basically do everything that BitLocker and BitLocker To Go can do. So you may find it worth the effort.
7Zip

Cost: FREE
Download: https:://www.7-zip.org/
Description: 7-Zip is an open source file archiver with a high compression ratio. It supports strong AES-256 encryption in 7z and ZIP formats, so it’s possible, in a very manual way, to protect important documents and other data files on a USB hard drive or memory stick.

Windows 7 Annoyances

After the poor reception of Windows Vista by customers, Microsoft knew it had to retrench for that system’s successor, Windows 7. And retrench it did: Windows 7 has entered the market to universally positive reviews from the tech press and customers alike. Part of the reason is that Windows 7 is a more modest upgrade than was Windows Vista. And part of it is that Microsoft tried to create a more cohesive and simpler system than it had with Windows 7’s predecessor.

So Windows 7 is a huge success, no doubt about it. But if you’re coming to Windows 7 from a previous Windows version, you’re going to notice a number of changes–some big, some small–and that’s true if you were previously using Windows Vista, XP, or an even older version. And while Windows 7’s changes are mostly improvements, unfamiliarity can lead to a loss of productivity. So if you’re looking for a way to fix some of Windows 7’s most obvious annoyances, or simply change some crucial feature back to the way it used to work, fear not: I’ve got your back.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Taskbar

Looking at the Windows 7 user interface, the most obvious change is the new taskbar, which represents a major functional departure from the previous several Windows versions. Now, instead of just providing buttons that represent running applications and other open windows, the taskbar also comingles shortcuts for frequently-needed applications and other objects. If you’re familiar with Mac OS X, you may feel that the new taskbar is a rip-off of that system’s Dock. In many ways, however, it simply combines the functionality from the XP/Vista taskbar taskbar with the Quick Launch toolbar. Regardless of its origins, one thing is clear: The Windows 7 taskbar is different enough that it will cause some headaches for users who are accustomed to previous Windows versions.

Annoyance: By default, the Windows 7 taskbar displays only a single icon for every shortcut or button. So if you have several Internet Explorer windows (or tabs) open, you’ll only see one button. That can be confusing, but it also means there’s no descriptive text caption on the button to describe what the window(s) are displaying, as was the case with all previous Windows versions dating back to Windows 95.

Windows 7 Annoyances
How many windows of each application are actually open? It’s impossible to say.

Solution: Fortunately, you can overcome Microsoft’s less-than-ideal default taskbar behavior and arrive at a display that more closely resembles previous Windows versions. To do so, right-click a blank area of the taskbar and choose Properties. Then, in the Taskbar buttons pull-down, choose “Combine when taskbar is full.” This will cause the taskbar to make two display changes. First, each button (each of which represents an open application or window) will include a caption, and not just a nondescript icon. Second, when you open multiple windows of the same application (as with IE or Windows Explorer), each window will get its own button.

Windows 7 Annoyances
With a small change, the Windows 7 taskbar is much more usable.

Annoyance: Most people who use Windows 7 quickly come to accept the way it combines shortcuts (links to non-running applications and windows) with buttons (links to running apps and windows). But there is one bizarre limitation: You cannot add two links on the taskbar for the same application. This is particularly problematic for Windows Explorer links: If you’d like to place separate shortcuts for, say, the Documents and Pictures libraries, you can’t: Instead, Windows 7 places links to both of these locations into the Windows Explorer shortcut’s Jump List.

Solution: Fortunately, there is a way around this limitation. Here how it works: Create a shortcut to the Windows Explorer location you want on the desktop. Then, right-click the shortcut and choose Properties. In the Target field, add the word “explorer” (no quotes) before the folder path. (If the path has any spaces, the path must be inside quotes.) The shortcut’s icon will change to the default Windows Explorer icon, but you can of course change it again as needed. Now, pin this shortcut to the taskbar: Instead of pinning it to the existing Windows Explorer shortcut, it will create a new shortcut. Voila!

Annoyance: While many users will embrace the new taskbar, some wish to retain a separation between shortcuts and links to running applications and open windows. And many of these people miss the Quick Start toolbar, which Microsoft removed from Windows 7.

Solution: You can enable the Quick Launch toolbar in Windows 7. To do so, right-click a blank area of the taskbar and choose Toolbar and then New toolbar. In the Choose a folder window that appears, type the following text into the Folder field: “%userprofile%\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch” (no quotes) and click Select Folder. You’ll see the Quick Launch toolbar appear in truncated form at the right of the taskbar. To modify this, unlock the taskbar (right-click and uncheck “Lock the taskbar”). Then, drag it where you’d like it and then disable two options, “Show text” and “Show title,” by right-clicking the Quick Launch toolbar. This will make the toolbar look as it did in previous Windows versions.

Windows 7 Annoyances
Yes, Virginia, you really can enable the Quick Launch toolbar in Windows 7.

Annoyance: Windows Vista included an excellent utility called Software Explorer, part of Windows Defender, that made it very easy to prevent applications from starting up when Windows boots and, in many cases, littering the notification area with unneeded icons. Windows 7, sadly, removes this utility.

Solution: Unless you want to hunt down a third party utility, you’re going to have to go old school on Windows 7 and stretch some pre-Vista plumbing skills. There are a number of places to look at if you wish to streamline the Windows 7 boot process, but one is key: The System Configuration utility–type “msconfig” (no quotes) in Start Menu Search to find it–is a spiritual predecessor of sorts to Software Explorer and it provides a list of startup apps in its Startup tab that you can edit.
Start Menu

Annoyance: While the Windows 7 Start Menu is largely unchanged from Windows Vista, many users of the new OS will be coming from Windows XP or older Windows versions, and they may prefer the classic Start Menu from those versions. Unfortunately, Microsoft has removed this option from Windows 7.

Solution: Fortunately, an enterprising third party developer makes available a Classic Start Menu replacement for the Windows 7 Start Menu, so you can get back the Start Menu that graced Windows 95 through Windows Vista. It’s part of the Classic Shell project (see below).
Windows Explorer

Annoyance: If it seems like Microsoft has changed the layout and capabilities of Windows Explorer with each new Windows version, well, they have. And this trend continues in Windows 7, which, like Windows Vista, no longer includes a number of useful toolbar buttons that were available in Windows XP and older Windows versions.

Solution: Once again, Classic Shell comes to the rescue. This Explorer plug-in provides missing buttons like Cut, Copy, Paste, Delete, and Properties, and provides other old-school functionality, such as bringing back the pre-Windows 7 file copy dialog. It also displays free disk space and the file/folder size in the Explorer window status bar. Just like XP.

Windows 7 Annoyances
Classic Shell adds a mini-toolbar to Windows Explorer (in the upper right), providing easy access to commands Microsoft removed.
Compatibility

Anytime Microsoft releases a new Windows version, there are fears that device or application compatibility issues will render an otherwise decent upgrade into a disaster. And while this was certainly true with Windows Vista, Windows 7 does a much better job of maintaining backwards compatibility. Of course, no software is perfect.

Annoyance: An application won’t install or run under Windows 7.

Solution: Like previous versions of Windows, Windows 7 provides a nice suite of compatibility tools. These tools allow the system to fool installers and application programs into believing that they are running under older versions of Windows, and they’re typically found in the Compatibility tab of the Properties window for the application in question. But Windows 7 makes it much easier to work through these issues thanks to a new Troubleshooting infrastructure that provides plain English wizards, with step-by-step walkthroughs for compatibility problems and a host of other common issues. To more easily determine whether an application can be made to run correctly under Windows 7, open the Action Center (“action” in Start Menu Search) and click the Troubleshooting link. Then, click the link titled “Run programs made for previous versions of Windows” under Programs and follow the steps in the Program Compatibility wizard.

Tip: You can run this wizard more quickly by typing “compat” into Start Menu Search.

Annoyance: An application still won’t install or run under Windows 7.

Solution: Some legacy applications simply won’t ever install or run correctly under Windows 7. In this case, new Windows features called Windows Virtual PC and Windows XP Mode will help you solve the problem using virtualization technology. Windows Virtual PC is the next generation version of Microsoft’s Virtual PC product. It requires hardware virtualization support in the PC’s microprocessor and BIOS, and offers some important benefits over its predecessors, including USB support and the ability to run virtualized (“guest”) applications alongside native (“host”) applications. Windows Virtual PC is available for free to all Windows 7 users.

Windows XP Mode is a specially packaged and complete virtualized version of Windows XP with Service Pack 3 (SP3). It is provided, for free, to all users of Windows 7 Professional, Enterprise, and Ultimate editions. And because it runs under Windows Virtual PC, any applications you installed inside this environment can run alongside your normal Windows 7 applications. It’s the perfect solution for those few remaining applications that simply won’t run in Windows 7 natively.
Windows Update

Annoyance: Microsoft has done a nice job of improving the Windows Update application in Windows 7, but one glaring issue remains. If you leave the PC unattended overnight and the system automatically installs critical or important security updates that require a reboot, you might get back to the PC in the morning to discover that all your applications have shut down and, potentially, you’ve lost some data.

Solution: You can prevent Windows Update from automatically rebooting your PC, though it will require a bit of work. The reason is that the Registry Key that controls this functionality is missing from Windows 7.

To do so, open the Registry Editor (Start Menu Search, “regedit”) and navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Polices\Microsoft\Windows. Then, create a new key called WindowsUpdate and, inside of that key, another new key called AU. Inside of that key, create a new DWORD (32-bit) value named NoAutoRebootWithLoggedOnUsers. Modify its value data, setting it to 1. You will have to restart the computer for the change to take effect.
Final thoughts

Every version of Windows comes with new challenges and new ways of doing things. And while Windows 7 is does indeed represent a major functional improvement over its predecessor, it’s also different enough from Windows XP and Vista to cause a bit of grief. Fortunately, there are simple workarounds to most problems, and while any change can be traumatic, Windows 7 is, in many ways, the least annoying upgrade Microsoft has ever shipped.