QUESTION 121
Fill in the blank with the appropriate word.
_____________________is a method to increase the security of a message or file by scrambling the contents so that the file or message can be read only by someone who has the right encryption key to unscramble it.
Correct Answer: Encryption
Explanation:
Encryption is a method to increase the security of a message or file by scrambling the contents so that the file or message can be read only by someone who has the right encryption key to unscramble it. A user can use encryption when he wants a strong level of protection for his information.
QUESTION 122
Choose and reorder the steps to modify a wireless network profile.
Correct Answer:
Explanation:
Take the following steps to modify a wireless network profile:
1. Click the Start button, and then click Control Panel.
2. In the Control Panel page, open Manage Wireless Networks.
3. Right-click the network profile you want to modify, and then click Properties.
4. Make the desired changes, and then click OK.
QUESTION 123
Fill in the blank with the appropriate term.
The______________ tool is used to reduce the number of unnecessary files on a hard disk to free up disk space and to help a computer run faster.
Correct Answer: Disk Cleanup
Explanation:
The Disk Cleanup tool is used to reduce the number of unnecessary files on a hard disk to free up disk space and to help a computer run faster. It removes temporary files, empties the Recycle Bin, and removes a variety of system files and other items that are no longer needed.
QUESTION 124
Fill in the blank with the appropriate term.
__________ is a tool that is used to play sound and video files stored on a local disk.
Correct Answer: Windows Media
Explanation:
Windows Media Player is a tool that is used to play sound and video files stored on a local disk. The user can split tracks from audio CDs in a broad range of quality levels, create custom CDs using a CD or DVD drive that has recording capabilities, and download songs to a portable audio player. The user can use the player as a jukebox to listen to his favorite songs, in custom sequences or in random order.
QUESTION 125
Which of the following will you need to run Windows 7 installations automatically with preconfigured settings?
A. |
A secure locked cable |
B. |
A bootable USB device that contains all drivers and necessary software to complete the installation |
C. |
An answer file to embed on the installation media or WDS distribution folder |
D. |
The latest Windows Defender application |
Correct Answer: C
Explanation:
You will need an answer file to embed on the installation media or WDS distribution folder to run Windows 7 installations automatically with preconfigured settings. Windows Deployment Services is the updated and redesigned version of Remote Installation Services (RIS). A user can use it to install Windows to computers over a network instead of installing each operating system directly from a CD or DVD. A user should have a working knowledge of common desktop deployment technologies and networking components, including Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and Active Directory Domain Services to use Windows Deployment Services.
QUESTION 126
Fill in the blank with the appropriate term.
_________________ is a computing environment for users and computers. It ensures that users get the exact environment by using IntelliMirror features.
Correct Answer: Desktop Configuration
Explanation:
Desktop Configuration is a computing environment for users and computers. It ensures that users get the exact environment by using IntelliMirror features, such as User Data Management, Software Installation and Maintenance, and User Settings Management. By using these features, users can add new users and computers, define settings for organized groups of users and computers, and apply changes to groups of users.
QUESTION 127
You work as a Database Administrator for www.company.com Inc. You have to configure the security settings of a new computer system in your organization. Which of the following options will you use to accomplish the task?
A. |
Smart cards |
B. |
Active Directory |
C. |
Software restriction policies |
D. |
Local Security Policy |
Correct Answer: D
Explanation:
When a computer is joined to a domain, it is subjected to obtain a security policy from the domain’s policy or from the policy of any organizational unit. If the computer system is obtaining the policy from more than one source, then any conflicts are resolved in this order of precedence, from highest to lowest:
1. Organizational unit policy
2. Domain policy
3. Site policy
4. Local computer policy
Answer: C is incorrect. Software restriction policies are used to identify software and to control its ability to run on the local computer, organizational unit, domain, or site. Software restriction policies are implemented to prevent an e-mail virus from running on your computer. Answer: B is incorrect. Active Directory is a directory service that stores information about objects on a network and makes this information available to users and network administrators. Answer: A is incorrect. Smart cards are used to securely store certificates, public and private keys, passwords, and other types of personal information.
QUESTION 128
Choose and reorder the correct steps to restore gadgets to the default settings.
Correct Answer:
Explanation:
Take the following steps to restore gadgets to the default settings:
1. Click Start and open Control Panel.
2. In the Control Panel option, click Appearance and Personalization.
3. Under Desktop Gadgets, click Restore Desktop Gadgets installed with Windows.
QUESTION 129
Choose and reorder the correct steps to run Task Scheduler using the Windows interface.
Correct Answer:
Take the following steps to run Task Scheduler using the Windows interface:
1. Click the Start button.
2. Click Control Panel.
3. Click System and Maintenance.
4. Click Administrative Tools.
5. Double-click Task Scheduler.
QUESTION 130
Fill in the blank with the appropriate term.
___________________ is used to synchronize data with other computers and devices from one common user interface.
Correct Answer: Sync Center
Explanation:
Sync Center is used to synchronize data with other computers and devices from one common user interface. There are several ways to interact with Sync Center, one of which is as a provider of synchronization information.
Instant Access to Download Testing Software & PDF File for Microsoft 98-349 Real Exam
Instant Access to Try Microsoft 98-349 Free Demo
70-410 Dumps VCE PDF
70-411 Dumps VCE PDF
70-412 Dumps VCE PDF
70-413 Dumps VCE PDF
70-414 Dumps VCE PDF
70-417 Dumps VCE PDF
70-461 Dumps VCE PDF
70-462 Dumps VCE PDF
70-463 Dumps VCE PDF
70-464 Dumps VCE PDF
70-465 Dumps VCE PDF
70-480 Dumps VCE PDF
70-483 Dumps VCE PDF
70-486 Dumps VCE PDF
70-487 Dumps VCE PDF