Wednesday, 26 June 2013

70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional

QUESTION 1
You work as an administrator at ABC.com. The corporate network consists of a single Active
Directory domain named ABC.com. All client computers on the corporate network are configured
to run Windows 2000 Professional.
You are preparing to uABCrade the client computers to Windows XP Professional with zero impact
on productivity. You use a server named ABC-SR01 that has a shared folder named Data to save
the Setup files required for the uABCrade. You need to determine the appropriate manner in which
to start the Setup.
What is the first step to make sure the Setup files are installed in an unattended process on the
client computers?

A. You should create a test environment and run an unattended installation of the Setup Files.
B. You should execute the Winnt32.exe command and follow up with the xcopy command onABCSR01.
C. You should execute the Winnt32.exe command with the /dushare:\\ABC-SR01\data parameters.
D. You should use an OEM installation package on the first client computer.

Answer: C

Explanation: Your best option in this scenario would be to use the dushare switch and indicate the updates folder.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 2, Lesson 3
Microsoft Knowledge Base Article - Q312110, How to Deploy the Windows XP Dynamic Update Package


QUESTION 2
You are the desktop administrator for ABC.com. The ABC.com network consists of a single Active
Directory domain named ABC.com. All client computers on the network are configured to run
Windows XP Professional.
The ABC.com users who are assigned laptop computers often work from home. These laptop
computers are set up specifically to make a connection to the network and the Internet without any
problems. After a few weeks several laptop users complained that they cannot access the shared
folders on the laptop computers even when working at the office.
You check and discover that these users have permission to access the shared folders. You thus
decide to make the necessary modifications in the local GPO on all laptop computers.
Which actions should you take to make sure of continued Internet protection and provide access
to the shared folders? (Choose Two.)

A. You should configure the Windows Firewall on the laptop computers.
B. You should assign all laptop computers to a global security group.
C. You should change the local GPO by deselecting the Prohibit the use of ICF on your DNS
domain network option.
D. You should enable TCP/IP filtering.
E. You should enable the Allow users to connect remotely to this computer option.

Answer: A,C

Explanation: To ensure that users can access shared folders on the portable computers during
the day and to ensure that the portable computers are protected when they are connected to the
Internet in the evening, you need to enable Windows Firewall and then enable the Prohibit the use
of ICF on your DNS domain network setting in the local GPO.
The ICF should not be used on VPN connections as it interferes with file sharing and print
services. ICF can cause undesirable issues if clients in a network enable ICF on their LAN
interfaces. Instead, large network should use better alternatives such as dedicated firewalls.
Reference: Sharing (ICS) and Internet Connection Firewall (ICF)
http://www.techexams.net/technotes/xp/ics_icf.shtml


QUESTION 3
You are employed as an administrator at ABC.com. The ABC.com network consists of a single
Active Directory domain named ABC.com. A server named ABC-SR27 is used as a file server that
hosts a shared folder. All network users store their files and documents on the shared folder.
The ABC.com Finance department makes use of a custom application and save their files to the
shared folder on ABC-SR27.
You received a complaint from the Finance Department members that some of the custom
application files have become unusable resulting in productivity decrease when they have to
restore the application using the backup. You then find that the other network users configured the
shared folder to be available offline and all indications are that this is the cause of the problem.
You must make sure that the custom application files will remain unavailable when the users are
not logged on.
How can you achieve this without impacting on user access to other files in the folder? (Choose
TWO. Each answer forms part of the solution.)

A. You should change the network policy.
B. You should assign the Allow – Write permission to all users.
C. You should configure “My Documents” to be available offline in Windows Explorer on every client computer.
D. You should include the custom application files in the Files not cached domain group policy.
E. You should select the Synchronize all offline files before logging off check box on the Offline Files tab.

Answer: A,D

Explanation: The custom application files become corrupt due to the offline caching. In this
scenario we need to prevent this type of file being made available offline. We can do this by
configuring the ‘Files not cached’ setting in group policy.
Files not cached
Computer Configuration\Administrative Templates\Network\Offline Files
Reference:
Lisa Donald & James Chellis, MCSA/MCSE: Windows XP Professional Study Guide Second
Edition, Sybex Inc., Alameda, 2003, p. 344


QUESTION 4
You work as the network administrator at ABC.com. All client computers on the ABC.com network
are configured to run Windows XP Professional.
A ABC.com user named Kara Lang is assigned a laptop computer named ABC-WS15. She
complains that she gets random error messages regarding missing .dll files on ABC-WS15 when it
is not connected to the docking station.
After some troubleshooting you discover that the device driver uses the .dll file mentioned in the
error messages as an external storage device. The storage device is in turn linked to the docking
station of Kara Lang. There are no random error messages when she works in docked mode. To
ensure productivity you need to make sure that this incident does not recur.
How can this be accomplished? (Choose THREE. Each answer forms part of the solution.)

A. By disabling the support for the docking station in the BIOS.
B. By creating a new hardware profile named KingUndocked by copying the default hardware
profile of ABC-WS15.
C. By disabling the server service in the Services Options.
D. by disabling the storage device in the undocked hardware profile.
E. By informing the user too restart ABC-WS15 using the undocked hardware profile.
F. by disabling the devices used by the docked hardware profile.

Answer: B,D,E

Explanation: Hardware profiles are used to load different sets of device drivers according to
which profile is selected. In this scenario, we have a docking station with an external storage
device attached. Therefore, we want to load the driver for the external storage device when the
computer is docked, but not when the computer is undocked. To do this, we can create another
hardware profile to be used when the computer is undocked. We can configure the undocked
profile to not load the driver by disabling the external storage device in Device Manager.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3 & Chapter 15, Lesson 6


QUESTION 5
ABC.com has employed you as an administrator for their organization. All computers on the
network are configured to run Windows XP professional.
A ABC.com user named Rory Allen is assigned a computer named ABC-SR12. ABC-SR12 is
configured to host a custom application to create huge databases.
A vast amount of disk space is occupied when databases are created with this application. At
present the ABC-SR12 configuration is as in Exhibit:



You receive a complaint from Rory Allen regarding an error message when he attempts to run the
application to create a database.
Which actions should you take to create a mount point on the ABC-SR12 C-Drive to make sure
that the application allows the creation of database without any error message?

A. You should point the mount point on the C-Drive to the D-Drive root directory.
B. You should convert both Disk A and Disk B to dynamic volumes.
C. You should convert both Disk A and Disk B to basic volumes.
D. You should configure an alternative file distribution system.

Answer: A

Explanation: Your best option in this scenario would be to create mount points. Volume mount
points permits a volume to be mounted on an existing folder rather than at the root of a new drive
letter. You are able to create a volume mount point for an empty NTFS directory in order to permit
an administrator to create new volumes without needing extra drive letters.
We create a mount point on the volume that needs more space, C-Drive, and points it to the
volume which has the required free disk space.
Reference:
Rick Wallace, MCSE (Exam 70-270) Microsoft XP Professional Training Kit, Microsoft Press,
Redmond, 2002, Chapter 10, Lesson 3



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday, 16 June 2013

Microsoft Office 365 lands in US iPhone App Store

Office Mobile is only available for iPhone, iPad users can use Office Web Apps for now, Microsoft said

Microsoft released a version of its office suite for iPhones in the U.S. that is only available for Office 365 subscribers.

Microsoft released the Microsoft Office Mobile suite for iPhones Friday. The software is compatible with iPhone 4, 4S and 5, and the iPod Touch (5th generation) and requires iOS 6.1 or later, according to the iTunes release notes.

Mobile Office allows users to access, view and edit Microsoft Word, Microsoft Excel and Microsoft PowerPoint documents, according to the release notes. Because charts, animations and SmartArt graphics and shapes are supported, documents look like their originals, Microsoft said, adding that formatting and content remain intact when edits are made.

iPhone users can access Office documents that are stored on SkyDrive, SkyDrive Pro and Sharepoint.

"Office Mobile is cloud-connected. The documents you've recently viewed on your computer are readily available on your phone in the recent documents panel," Microsoft said. It is also possible to view and edit documents attached to email settings.

Documents can also be edited offline. Changes will be saved online when the device reconnects with the network, Microsoft said.

When opening a Word document from SkyDrive or SkyDrive Pro on an iPhone, "it automatically resumes at the place where you left off reading, even if you last viewed the document on your PC or tablet."

While the app is free, an Office 365 subscription is required to use it, Microsoft said. The subscription version, called Office 365 Home Premium, costs US$99.99 per household annually. The app will also work with a 365 trial account, Microsoft said, adding that using the Office Mobile app for Windows Phone does not require a subscription.

The app is only available in the U.S. for now. "Office Mobile for iPhone will be available in 29 languages covering 135 markets.A The international rollout will occur over approximately 4-5 days," Microsoft said in a blog post.

The app is not available in an optimized version for the iPad. "Like all iPhone apps, Office Mobile can work on iPad, either small or '2X' scaled up, but you'll have a more satisfying experience using Office Web Apps," Microsoft said.

Office for iPad is reportedly scheduled for release in October 2014.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Thursday, 13 June 2013

Gauging Windows Phone's chances against the iPhone

Latest report says Windows Phone will be neck-and-neck with iPhone by 2017.

Some time back, IDC predicted that Windows Phone would overtake iPhone to be the dominant platform in the smartphone business. This was met with a round of snickering and outright laughter. IDC gave Microsoft and Nokia until 2015, so they have two years to go, but right now, it doesn't look like it will happen, does it?

And, according to this report from Canalys, it won't happen. Canalys predicts that by 2017, the iPhone will have a 14.1% market share, while Windows Phone is right behind it with a 12.7% share. As of last year, the iPhone had a 19.5% market share, and Windows Phone a 2.4% market share.

Nothing changes with the Android market, which at this point should be called the Samsung market. It had 67.7% market share last year and will be at 67.1% in 2017.

Jessica Kwee, analyst with Canalys, said in the report that "Apple's growth will be curtailed by the fact that momentum in the smartphone market is coming from the low end, and Apple is absent from this segment."

Conversely, Microsoft and its partners, particularly Huawei, will deliver lower-end phones at more competitive pricing. Over the long term, the low-cost Chinese manufacturers will be what pushes Windows Phone into double digits.

"Longer-term it is the Chinese vendors that are best placed to challenge Samsung's market dominance. Microsoft already has a relationship with Huawei and ZTE in the phone space, and Lenovo is a major partner in the PC space. These partners will be needed to help deliver the scale that Microsoft needs," Kwee wrote.

I can agree on the Apple side of the analysis. Apple has always been a premium product maker for an affluent audience, and there is no intention of changing that. The game changer will be if Windows Phone ever lands OEMs that will push into the high end. It had LG and Samsung, then lost both. Nokia is going a great job, better than I expected, but it is essentially going it alone.

Then again, that's how most of the smartphone market is operating if you think about it. The iOS market is Apple only. BlackBerry has talked of licensing its OS; so far, no takers. Nokia is pretty much the Windows Phone market with a little on the low-end via HTC, and Samsung is almost half of the total Android market.

There are other variables I don't think Canalys took into consideration. What will Samsung do when it ships its Tizen OS? That will surely change the landscape. What if Windows Phone gains momentum and some of these also-ran Android phone companies decide they have a better chance with WP than against Samsung?

That's why market predictions, like the weather in New England, are impossible to predict beyond one day.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday, 4 June 2013

Microsoft CIO Tony Scott has left the company

His departure leaked this weekend online

Microsoft CIO Tony Scott has left the company after five years.

Word of his departure leaked out over the weekend. His LinkedIn profile lists him as the company's former CIO and the company website no longer lists him among senior leaders.

Microsoft acknowledged the departure in a statement: "Tony Scott has decided to depart Microsoft to focus on personal projects. While at Microsoft, Tony has proven to be a strong IT leader passionate about taking Microsoft's technology to the next level and using our experiences and learnings to help customers and partners. We thank Tony for his contributions and wish him well."

Jim Dubois, the company's vice president of IT product and services management, has been named interim CIO, according to a source within the company.

The Seattle tech news site GeekWire broke the story Sunday. Word that Scott had left the company was given to employees last week, the site reported.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Saturday, 1 June 2013

Test of NAS boxes shows ioSafe as disaster proof

Five NAS appliances for all your small business storage needs

We tested five Network Attached Storage (NAS) appliances, ranging from 4T to 18TB in capacity and targeted for small offices and businesses with up to 20 to 25 users. All are more-or-less in the same price range: about $700 to $2,000 with drives.

Our participants were: D-Link’s Share Center Pro, Western Digital Sentinal DX4000, Thecus N4800Eco, Ctera C200 and ioSafe N2.

All of the units provide basic NAS functionality. They support RAID drive configurations and offer iSCSI support. They all provide local accounts and directory authentication for controlling user access. They support the popular file sharing protocols: CIFS (Windows), NFS (Unix/Linux), AFP (Mac), FTP, and offer at least basic remote web access. Read more


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com