New Updated Microsoft MTA 98-349 Real Exam Questions and Answers Download 101-110

Ensurepass

QUESTION 101

Fill in the blank with the appropriate word.

____________________ are additions to software that help a user prevent or fix problems, improve the performance of the computer, or enhance the computing experience.

 

Correct Answer: Updates

Explanation:

Updates are additions to software that help a user prevent or fix problems, improve the performance of the computer, or enhance the computing experience. Turning on Microsoft Update will open Windows Update, where the user can check for any new Microsoft updates.

 

 

QUESTION 102

Which of the following components can be installed independently without the MED-V management console by clearing the Install the MED-V management application checkbox during installation?

 

A.

MED-V image repository server

B.

MED-V management console

C.

MED-V management server

D.

MED-V client

 

Correct Answer: D

Explanation:

The MED-V client component can be installed independently without the MED-V management console by clearing the Install the MED-V management application checkbox during installation. Answer: B is incorrect. The MED-V management console permits the user to manage the MED-V Client Policy, Image Distribution, and Reporting.

Answer: A is incorrect. The MED-V image repository server is an IIS server that stores the VMs, and enables the VM versioning as well as the VM retrieval and distribution using the Trim Transfer technology.

Answer: C is incorrect. The MED-V management server is used to provide centralized management of VMs stored in the MED-V image repository and deployed VMs.

 

 

QUESTION 103

You work as a Network Administrator for www.company.com Inc. You need to display information about events, such as programs starting or stopping, or security errors, that are recorded in event logs. Which of the following actions will you perform to accomplish the task?

 

A.

Memory Diagnostics tools

B.

Computer Management

C.

Event Viewer

D.

Local Security Policy

 

Correct Answer: C

Explanation:

Event Viewer, a component of Windows operating systems, lets administrators and users examine the event logs on a local or remote computer. In an operating system, components can make use of this centralized log service to report events that have taken place, such as a failure to start a component or complete an action. The system defines three log sources: System, Application, and Security.

Answer: D is incorrect. A security policy is a group of security settings that affect the security of a computer. You can use a local security policy to edit account policies and local policies. With the local security policy, you can control:

1. Users who access your computer.

2. What resources users are authorized to use on your computer.

3. Whether or not a user’s or group’s actions are recorded in the event log. Answer: A is incorrect. Memory Diagnostic tools test the Random Access Memory (RAM) on the user’s computer for errors. The diagnostic includes an inclusive set of memory tests. If problems occur while running a system, you can use the diagnostic tools to determine whether the problems are caused by failing hardware, such as RAM or the memory system of the motherboard. Windows Memory Diagnostic tools are designed to be easy and fast. Answer: B is incorrect. Computer Management administers local or remote computers by using a single, consolidated desktop tool.

Using Computer Management, you can perform many tasks, such as monitoring system events, configuring hard disks, and managing system performance. Computer Management, or Microsoft Management Console (MMC), is a component that provides system administrators and advanced users an interface for configuring and monitoring the system. Snap-ins and the management console can host Component Object Model components called snap-ins. Administration tools are implemented as MMC snap-ins.

 

 

QUESTION 104

You are the administrator for tvloft.com. As part of a technology refresh, you are planning an upgrade of all company computers from Windows XP to Windows 7. Before deploying this company wide, you test this upgrade in the lab. However, when you put the Windows 7 setup media into the test computer, you do not have the option to upgrade. All computers meet the minimum requirements. Why is this option not available?

 

A.

System components do not meet minimum standard.

B.

Windows XP to Windows 7 is not supported.

C.

You need to reboot the computer and choose boot from CD.

D.

DVD ROM is bad.

 

Correct Answer: B

Explanation:

The option to upgrade is not available in Windows 7 Setup when installing Windows 7 to a computer that is running Windows XP.

Answer: A is incorrect. All computers were said to meet the minimum requirements.

Answer: C is incorrect. Booting from CD will not change the upgrade options. Answer: D is incorrect. You have no reason to believe that the DVD ROM is bad. It was able to start up the Windows Setup.

 

 

QUESTION 105

You work as a Network Administrator for www.company.com Inc. You have implemented the registry-based group policy on your network. The TIFF language family differs from the System default language. You want to set the language code page for indexing TIFF document content. Which of the following policies will you implement to accomplish the task?

 

A.

Remove See More Results/ Search Everywhere link

B.

Turn off the display of snippets in Content view

C.

Set OCR languages from a code page

D.

Remove the Search the Internet “Search again” button

 

Correct Answer: C

Explanation:

The Set OCR languages from a code page policy sets the language code page for indexing TIFF document content if the TIFF language family differs from the System default language. Answer: A is incorrect. The Remove See More Results/ Search Everywhere link policy hides the See More Results/Search Everywhere link on the Start Menu.

Answer: D is incorrect. The Remove the Search the Internet “Search again” button policy blocks access to Internet search from Windows Explorer.

Answer: B is incorrect. The Turn off the display of snippets in Content view policy disables showing snippets of file contents by default when a search is returned.

 

 

 

 

 

QUESTION 106

Fill in the blank with the appropriate term.

____________ is the installation and configuration of the Forefront Endpoint Protection client software in a computer.

 

Correct Answer: Forefront Endpoint Protection client deployment

Explanation:

Forefront Endpoint Protection client deployment is the installation and configuration of the Forefront Endpoint Protection client software in a computer. Before deploying the Forefront Endpoint Protection client software to computers in a production environment, a user should learn about the deployment process, create a deployment plan based on the organization’s security requirements, and test the plan in a lab environment.

 

 

QUESTION 107

Fill in the blanks with the appropriate terms.

Each document that is sent to a printer is called a_____________________. A line of print jobs waiting to print is called a_____________________.

 

Correct Answer: print job.

Explanation:

Each document that is sent to a printer is called a print job. A line of print jobs waiting to print is called a print queue. Most of the print jobs hit the queue and end up printed without any problem.

 

98-349-demo-17

 

 

QUESTION 108

You work as a Server Administrator for www.company.com Inc. The company has a Windows-based network environment. All client computers on the network run Windows 7 Ultimate and all servers run Windows Server 2008 R2. You want to remove some applications and registry entries of the server. For this, you edit the registry and restart the system. You find that the system stops responding even before the logon screen appears. You want to restore the system to its previous configuration. What will you do?

A.

Restart the system using the Enable Boot Logging option.

B.

Restart the system using the Directory Services Restore Mode option.

C.

Restart the system using the Repair Your Computer option.

D.

Restart the system using the Last Known Good Configuration option.

 

Correct Answer: D

Explanation:

In order to restore the system to its previous configuration, you should restart the system using the Last Known Good Configuration option.

The Last Known Good Configuration option is used to start Windows with the last registry and driver configuration that worked successfully.

Answer: A is incorrect. The Enable Boot Logging option is used to create the ntbtlog.txt file to list all the drivers that are installed during startup.

Answer: B is incorrect. The Directory Services Restore Mode option is used to start Windows domain controller running Active Directory so that the directory service can be restored. Answer: C is incorrect. The Repair Your Computer option is used to display a list of system recovery tools that can be used to repair startup problems, run diagnostics, and restore the system.

 

 

QUESTION 109

You work as a Database Administrator for Softech Inc. You want to create network connections, such as Local Area Networks (LANs) and Internet connections. Which of the following applets will you use to accomplish this task?

 

A.

Network Connections

B.

Internet Options

C.

Accessibility Options

D.

Folder Options

 

Correct Answer: A

Explanation:

The Network Connections option displays and permits a user to edit or create network connections, such as Local Area Networks (LANs) and Internet connections. It also provides troubleshooting functions in case the computer has to be reconnected to the network. Answer: B is incorrect. This cannot be used to accomplish the task. Following are the attributes of Internet Options:

1. General: This specifies the homepage and color schemes and permits the user to delete Internet usage history.

2. Security & Privacy: These specify whether the computer should permit websites to start certain processes and download cookies.

This panel also gives access to the inbuilt pop-up blocker and the phishing controls.

3. Content: It permits the parental controls and auto-complete to be configured and also specifies how to deal with certificates.

4. Connections, Programs, and Advanced: These give access to other aspects of Internet settings such as the default modem connection and email client, proxy settings, and other advanced configurations.

Answer: C is incorrect. Accessibility Options permit users to organize the accessibility of their computer. This option comprises a variety of settings mainly aimed at users with disabilities or hardware problems.

Answer: D is incorrect. This option allows for configuration of how folders and files are presented in Windows Explorer. It is basically used to configure folders in the computer system.

 

 

QUESTION 110

Rick works as a Desktop Administrator for www.company.com Inc. The company wants to network all computers so that the computers can share files and printers. All the computers are running Windows 7 Professional. There are some files that are not confidential and can be modified by anyone. He can set up sharing with only one printer at each cabin. How can Rick permit network files to be modified by all users of the organization?

 

A.

Enable public folder access on the computers.

B.

Save the files to a USB thumb drive and insist that the users copy the files to the drive.

C.

Disable public folder access on the computers.

D.

Create email accounts for the users so that they can modify files and send them to one another.

 

Correct Answer: A

Explanation:

Public folders allow all the users to have complete access to the contents. The network profile must be modified to allow this feature.

Answer: B, D, and C are incorrect. These are not correct ways to permit network files to be modified by all users of the organization.

 

Instant Access to Download Latest Complete Collection of Microsoft MTA 98-349 Real Exam

Try Microsoft MTA 98-349 Free Demo