Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-622 Exam - Cheat-Test.com

Free 70-622 Sample Questions:

1. You are a desktop support technician for your company. Your company monitors user logon times on a daily basis. Yo u need to generate a report when users log on after 9 A.M. and have it sent to your e­mail account . What should you do?
A. Create a new task, add the At Log On trigger, run a custom­created VBS file to check the time, and send the e­mail message through the VBS script if the time is after 9 A.M.
B. Create a new task, add the At Startup trigger, run a custom­created VBS file to check the time, and send the e­mail message through the VBS script if the time is after 9 A.M.
C. Create a new task, add the At Startup trigger, run a custom­created VBS file to check the time, and send the e­mail message through the task scheduler if the time is after 9 A.M.
D. Create a new task, add the At Log On trigger, run a custom­created VBS file to check the logon time, and send the e­mail message through the task scheduler if the time is after 9 A.M.
Answer: A

2. You are a desktop support technician for your company. Your company computers run Windows Vista. You need to verify the updates that have been installed on your Windows Vista computer. Which two actions should you perform? (Each correct answer presents a complete solution. Choose two.)
A. Click on View update history in the Windows Update applet.
B. Analyze the Security event log.
C. Click Check for updates in Windows Update applet.
D. Analyze the Setup event log.
E.Open the ReportingEvents.log file under %systemroot%\SoftwareDistribution to check whether the update is applied.
Answer: A, E

3. You are a desktop support technician for your company. The corporate network has a domain controller that runs Microsoft Windows Server 2003 and computers that run Microsoft Windows
XP Professional and Windows Vista Business. You set up group policies on the domain controller. When you log on to the corporate network, only the computers that run Windows Vista Business are able to retrieve the updated policies. You need to process the group policy for all the computers on the corporate network. Which Internet Control Message Protocol (ICMP) setting should you enable?
A. Allow incoming echo request
B. Allow incoming mask request
C. Allow outgoing source quench
D. Allow outgoing parameter problem
Answer: A

4. You are a desktop support technician for your company. The computers in your company run Windows Vista. A users computer automatically downloads and installs a critical patch for the vulnerability in a system DLL file. The user reports that she receives an error message when she attempts to start Windows. You need to restore the users computer to a bootable state without installing the earlier update files. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. Access the recovery console and run fixmbr c:.
B. Start the computer in safe mode and restore the original system DLL file.
C. Perform a system restore from the Windows Vista installation DVD and restore to an earlier date.
D. Access the recovery console from the Windows Vista installation DVD and extract only the original system DLL file. Then, overwrite the faulty file.
Answer: C

5. You are a desktop support technician for your company. The companys network consists of 10
Windows Vista computers and a server installed with Windows Server Update Services (WSUS). You must centralize Windows updates from Microsoft on all the computers. You need to configure
all the computers to ret rieve updates from the WSUS server. What should you do?
A. Ensure that intranet statistic server and intranet Microsoft Update services are hosted on different servers.
B. Ensure that intranet statistic server and intranet Microsoft Update services are configured on the
Windows Vista computers.
C. Ensure that the Allow non­administrator to receive update notifications Group Policy is enabled on all the computers.
D. Ensure that all computers are in the same workgroup as the WSUS server.
Answer: B

6. You are a desktop support technician for your company. The computers in your company run Windows XP. You upgrade the computers to Windows Vista. You download new updates by using Windows Update Agent. You discover that the update files are corrupted. You need to force Windows Update Agent to download the entire update again. What should you do?
A. Run the wuauclt.exe /detectnow command.
B. Run the wuauclt.exe /resetauthorization /detectnow command.
C. Stop the Windows Update service and rename the C:\Program Files\WindowsUpdate folder. Then, restart the Windows Update service.
D. Stop the Windows Update service and rename the %systemroot%\SoftwareDistribution folder. Then, restart the Windows Update service.
Answer: D

7. You are a desktop support technician for your company. The computers in your company run Windows Vista. A user reports that Disk Defragmenter is running on his computer when he arrives at the office. You discover that Disk Defragmenter is set to run at the same time that a software application maintenance program is set to run. You need to ensure that Disk Defragmenter runs at 3 A.M. on the users computer. You must achieve this goal by using the minimum amount of administrative effort. What should you do?
A. In Task Scheduler, locate the Disk Defragment task and set it to 3 A.M.
B. In Local Group Policy, set the Disk Defragmenter program to run at 3 A.M.
C. Open Task Scheduler and create a new task to run the Disk Defragmenter program at 3 A.M.
D. Configure a Group Policy Object across the domain and set the Disk Defragmenter program to run at 3A.M.
Answer: A

8. You are a desktop support technician for your company. The computers in your company run Windows Vista. The computers run Performance Monitor daily. Performance logging data is saved to a file named perfmon.blg . You need to view the performance data in an SQL database. What should you do?
A. Use Sort.exe to output a .sql file.
B. Use Fc.exe to perform a binary comparison.
C. Use the type command to pipe the file to a .sql file.
D. Run Relog.exe to export the file to a new output file format.
Answer: D

9. You are a desktop support technician for your company. The computers in your company run Windows Vista. You need to prevent users from installing devices on their computers. Your solution must achieve this goal without modifying administrator permissions. Which two policy settings in group policy object editor should you enable? (Each correct answer presents part of the solution. Choose two.)
A. Prevent installation of removable devices
B. Allow administrators to override device installation policy
C. Prevent installation of devices that match these device IDs D.Allow installation of devices that match any of these device IDs
E. Prevent installation of devices not described by other policy settings
Answer: B, E

10. You are a desktop support technician for your company. You need to disable the User Account Control (UAC) feature for local administrators by using the Group Policy Object Editor . Your solution must not disable UAC for standard users. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Set Disabled for the User Account Control: Run all administrators in Admin Approval Mode option.
B. Set Disabled for the User Account Control: Detect application installations and prompt for elevation option.
C. Set Disabled for the User Account Control: Switch to the secure desktop when prompting for elevation option.
D. Set Enabled for the User Account Control: Admin Approval Mode for the Built­in Administrator account option.
E. Set Elevate without prompting for the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode option.
Answer: A, E

11. You are a desktop support technician for your company. Your companys computers run Windows Vista. Users send security reports to the main office over the Internet by using Windows Mail. You need recommend a solution to ensure that the security reports are encrypted when they are transmitted over the Internet. What should you recommend?
A. Use S/MIME.
B. Use POP3 with Secure Sockets Layer (SSL).
C. Use Encrypted File System (EFS).
D. Use SMTP.
Answer: A

12. You are a desktop support technician for your company. Your client computers run Windows Vista. You need to recommend a solution to enable forwarding of events. The events must be encrypted when they are forwarded. Which three configurations should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. Open port 443 on the Windows firewall.
B. Ensure that all users have a user certificate.
C. Ensure that all computers have a computer certificate. D.Configure the client computers by using winrm.exe.
E. Set the Certificate Propagation service startup type to automatic.
Answer: A, C, D

13. You are a desktop support technician for your company. You set up event forwarding between a source computer and a collecting computer. The collecting computer has a standard user set to run the subscription. The collecting computer displays the subscription status as Trying. You verify that there is no error on the source computer and that the firewall is configured correctly. You need to view the subscription run time status. What should you do?
A. Use the Wecutil .exe command line utility.
B. Analyze the Security event log.
C. Analyze the dtcinstall.log file.
D. Use the Resultant Set of Policy console.
Answer: A

14. You are a desktop support technician for your company. Your network contains an Active Directory domain. All Windows Vista computers are joined to the domain. You need to ensure that the settings that are configured by using the Local Computer Policy are not applied to the Windows Vista computers. What should you do?
A. Delete gpmc.msc.
B. Delete gpedit.msc.
C. Disable registry policy processing.
D. Turn off Local Group Policy objects processing.
Answer: D

15. You are a desktop support technician for your company. Your company has a main office and a branch office. You connect a new computer that runs Windows Vista to the main office network. You need to ensure that the new computer can discover all the computers on the main office network. You also need to ensure that al l computers on the main office and branch office networks can discover the new computer. What should you do?
A. Set the Location type of the network to Public.
B. Set the Location type of the network to Private.
C. Configure Windows Firewall to permit traffic on port 3389.
D. Create and assign a new IPSec policy that activates the Default response rule.
Answer: B

16. You are a desktop support technician for your company. Your company has a main office and three branch offices. A user travels to all the offices with a portable computer that runs Windows Vista. You need to ensure that the user can access network printers at any office without reconfiguring her computer. What should you do?
A. Restart the Printer Spooler service.
B. Create a Deploy Printer connection in the User Configuration policy.
C. Create a Deploy Printer connection in the Computer Configuration policy.
D. Ensure that the Background Intelligent Transfer Service (BITS) service is started.
Answer: B

17. You are a desktop support technician for your company. All client computers at the company run Windows Vista. The company uses Windows Server 2003 virtual private network (VPN) servers. You need to recommend a solution to simplify the setup of VPN connections on client computers.
What should you recommend?
A. Create an .ins file and distribute it to all users.
B. Use the Connection Manager Administration Kit (CMAK) to build a service profile.
C. Configure Group Policy and the Network Connections options under Computer Configuration.
D. Configure Group Policy and the Network Connections options under User Configuration.
Answer: B

18. You are a desktop support technician for your company. The computers on the corporate network run Windows XP and Windows Vista in a single domain. The computers that run Windows XP do not appear on the Network Map diagram. You need to ensure that all the computers appear
on the Network Map diagram. What should you do?
A. Install the UPnP networking service on the computers that run Windows XP.
B. Download the Link­Layer Topology Discovery (LLTD) Responder component from the Microsoft Web site and install the component on the domain server.
C. Download the LLTD Responder component from the Microsoft Web site and install the component on the computers that run Windows XP.
D. Download the LLTD Responder component from the Microsoft Web site and install the component on the computers that run Windows Vista.
Answer: C

19. You are a desktop support technician for your company. The computers on the corporate network run Windows Vista. The computers are configured to obtain IP addresses automatically. A user reports that he cannot access resources on the corporate network. You discover that the IP address of the users computer is 169.254.17.9 with a 16­bit subnet mask. You restart the computer, but the user still cannot access resources on the corporate network. You need to ensure that the user can access resources on the corporate network. What should you do?
A. Run the ipconfig /flushdns command with elevated privileges.
B. Run the net start "Workstation" command with elevated privileges.
C. Run the net start "DHCP Client" command with elevated privileges.
D. Run the ipconfig /release command with elevated privileges and run the ipconfig /renew command.
Answer: C

20. You are a desktop support technician for your company. The computers in your company run Windows Vista. The computers have the All Comm and Secure Comm policies defined. You assign the All Comm policy to the computers. You need to ensure that the computers encrypt all outgoing traffic. What should you do?
A. Delete the All Comm policy.
B. Assign the Secure Comm policy.
C. Configure the All Comm policy to use a mirrored filter.
D. Set the source address of the existing filter to My IP address.
Answer: B

21.You are a desktop support technician for your company. You relocate an application server named AppServer1 to another subnet. When a user accesses the applications on AppServer1, the user receives the following error message: "Network path not found." You verify that AppServer1 and all applications are functional. You need to enable the user to access the applications on AppServer1. Which command should you run on the computer?
A. Nbtstat R
B. Nbtstat RR
C. IPconfig / flushdns
D. IPconfig / registerdns
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved