70-680 Exam Questions&Answers-Part 3
by
yvonneliu
Exam: Microsoft
70-620
Title:TS: Windows 7, Configuring
37. You have a computer that runs Windows 7.
You create a HomeGroup.
You need to secure the HomeGroup to meet the following requirements:
Allow access to the HomeGroup when you are connected to private networks
Block access to the HomeGroup when you are connected to public networks
What should you do?
A. From Network and Sharing Center, modify the advanced sharing settings.
B. From the HomeGroup settings in Control Panel, modify the advanced sharing settings.
C. Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks.
D. Configure the File and Printer Sharing exception in Windows Firewall to include Home or work (private) networks and block Public networks.
Answer: C
38. You have two computers named Computer1 and Computer2 that run Windows 7.
You need to ensure that you can remotely execute commands on Computer2 from Computer1.
What should you do?
A. Run Winrm quickconfig on Computer1.
B. Run Winrm quickconfig on Computer2.
C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1.
D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.
Answer: B
39. You have a workgroup that contains five computers. The computers run Windows 7.
A computer named Computer1 has video and audio files.
You need to share Computer1 s video and audio files on the network.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a HomeGroup.
[youtube]http://www.youtube.com/watch?v=zynndYNic2I[/youtube]
B. Move the files to a Media Library.
C. Enable all BranchCache rules in Windows Firewall.
D. Connect a removable drive and enable BitLocker To Go.
Answer: AB
40. You have a computer that runs Windows 7.
A printer is installed on the computer
70-620 Exam
.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the
print jobs of other users.
What should you do?
A. From the printer s properties, assign the Print permission to the Sales group.
B. From the printer s properties, assign the Manage Documents permission to the Sales group.
C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
Answer: A
41. A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1.
The computer contains a folder named Folder1.
You need to configure the permissions on Folder1 to meet the following requirements:
User1 must be allowed to delete all files in Folder1
Members of Group1 must be able to create files in Folder1
All other members of Group1 must be prevented from deleting files they did not create in Folder1
All users must be prevented from modifying the permissions on Folder1
What should you do?
A. Assign Group1 the Write permission. Assign User1 the Modify permission.
B. Assign Group1 the Modify permission. Assign User1 the Write permission.
C. Deny Group1 the Write permission. Assign User1 the Modify permission.
D. Deny Group1 the Modify permission. Assign User1 the Write permission.
Answer: A
42. You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
43. You have a standalone computer that runs Windows 7.
You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer.
What should you do?
A. From Control Panel, modify the default settings for media and devices.
B. From Control Panel, modify the default settings for device installation.
C. From the local computer policy, modify the application control policies.
D. From the local computer policy, modify the Microsoft Management Console (MMC) settings.
Answer: D
44. You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
45. Your company has an internal Web site that requires HTTPS. The Web site s certificate is self-signed.
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
You use HTTPS to browse to the Web site and receive the following warning message.There is a problem with this website s security certificate.
You need to prevent the warning message from appearing when you access the Web site.
What should you do?
A. From Internet Explorer, enable InPrivate Browsing.
B. From Internet Explorer, add the Web site to the Trusted sites zone.
C. From Certificate Manager, import the Web sites certificate into your Personal store.
D. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store.
Answer: D
46. Your network has a main office and a branch office.
The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache.
At the branch office, a computer named Computer1 is experiencing performance issues.
You need to temporarily prevent all computers from retrieving cached content from Computer1.
What should you do on Computer1
MCITP Exam
?
A. At the command prompt, run Netsh branchcache flush.
B. At the command prompt, run Netsh branchcache dump.
C. Modify the Configure BranchCache for network files Group Policy setting.
D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.
Answer: A
The
MCTS Certification
has been designed for professionals who analyze the business requirements. The autor devote herself to research the problems and knowledge of MCSE Certification.If you have any questions about MCSE,you can comments on the article the autor publiced.
Article Source:
ArticleRich.com
| San Diego Chargers |
28 |
24 |
Indianapolis Colts |
Even without LaDainian Tomlinson and Philip Rivers, the Chargers made sure the Indianapolis Colts won’t repeat as Super Bowl champions.
Now San Diego must make sure it doesn’t repeat its last performance at New England.
That will be especially difficult without an injured L.T., who departed in the first half with a bruised left knee, and starting quarterback Rivers, who went out in the third quarter with a damaged right knee in the Chargers’ stunning 28-24 victory Sunday.
With Billy Volek at quarterback and Michael Turner as the main runner, San Diego went 78 yards on eight plays, with Volek sneaking in from the 1 with 4:50 remaining for the lead. The Chargers’ big-play defense then held on downs at its 7, and stopped Indy again in the final moments to preserve their eighth straight win.
To make it nine in a row and advance to their second Super Bowl — the other was a loss to San Francisco after the 1994 season — the Chargers will need all the resourcefulness they showed at Indianapolis. Being undermanned against undefeated New England hardly is an enticing prospect.
Still, with All-Pro cornerback Antonio Cromartie getting an interception and fumble recovery, and linebackers Shawne Merriman and Shaun Phillips plaguing Peyton Manning, the Chargers showed they have the ability to throw off any offense. Maybe even the most prolific attack in NFL history.
The Chargers didn’t come close against the Patriots in Week 2, falling 38-14. That was the beginning of a slide to 5-5 for San Diego, but the Chargers (13-5) are rolling now.
It was a gutty showing by Rivers, who threw for three scores — he banged his right knee on a 56-yard screen pass TD by Darren Sproles to end the third quarter. And Turner, who could be a starter elsewhere but usually sits behind league rushing leader Tomlinson, gave the offense the balance it desperately needed in the late stages of the upset, rushing for 71 yards.
The Chargers’ opportunistic defense, which led the league in takeaways (48) and turnover margin (plus-24), grabbed two interceptions — both on tipped balls — and a fumble. While San Diego couldn’t stop Manning’s offense from steadily marching downfield most of the game, it could make the key plays that get you closer to the Super Bowl.
Still, if Tomlinson is limited or sidelined, how much chance do the Chargers have against the perfect Patriots? Not to mention perhaps missing Rivers or tight end Antonio Gates, who courageously played much of the day on a dislocated toe.
For the Colts (13-4), it was a bitterly quick elimination from the postseason.
A year ago, they won three playoff games, then beat Chicago in the Super Bowl. They couldn’t recapture their touch on offense or defense this time, and a defense that allowed the fewest points during the season wore down against the equally physical Chargers.
Manning did throw for 402 yards, completing 33 of his 48 throws, but both interceptions killed deep scoring threats.
Rivers was 14-of-19 for 264 yards, and Volek went 3-of-4 for 48 yards in his clutch relief role. Vincent Jackson became Rivers’ top target and had seven catches for 93 yards and a score.
Tuesday, March 29, 2005A team of Australian surgeons yesterday reattached both hands and one foot to 10-year-old Perth boy, Terry Vo, after a brick wall which collapsed during a game of basketball fell on him, severing the limbs. The wall gave way while Terry performed a slam-dunk, during a game at a friend’s birthday party.
The boy was today awake and smiling, still in some pain but in good spirits and expected to make a full recovery, according to plastic surgeon, Mr Robert Love.
“What we have is parts that are very much alive so the reattached limbs are certainly pink, well perfused and are indeed moving,” Mr Love told reporters today.
“The fact that he is moving his fingers, and of course when he wakes up he will move both fingers and toes, is not a surprise,” Mr Love had said yesterday.
“The question is more the sensory return that he will get in the hand itself and the fine movements he will have in the fingers and the toes, and that will come with time, hopefully. We will assess that over the next 18 months to two years.
“I’m sure that he’ll enjoy a game of basketball in the future.”
The weight and force of the collapse, and the sharp brick edges, resulted in the three limbs being cut through about 7cm above the wrists and ankle.
Terry’s father Tan said of his only child, the injuries were terrible, “I was scared to look at him, a horrible thing.”
The hands and foot were placed in an ice-filled Esky and rushed to hospital with the boy, where three teams of medical experts were assembled, and he was given a blood transfusion after experiencing massive blood loss. Eight hours of complex micro-surgery on Saturday night were followed by a further two hours of skin grafts yesterday.
“What he will lose because it was such a large zone of traumatised skin and muscle and so on, he will lose some of the skin so he’ll certainly require lots of further surgery regardless of whether the skin survives,” said Mr Love said today.
The boy was kept unconscious under anaesthetic between the two procedures. In an interview yesterday, Mr Love explained why:
“He could have actually been woken up the next day. Because we were intending to take him back to theatre for a second look, to look at the traumatised skin flaps, to close more of his wounds and to do split skin grafting, it was felt the best thing to do would be to keep him stable and to keep him anaesthetised.”
Professor Wayne Morrison, director of the respected Bernard O’Brien Institute of Microsurgery and head of plastic and hand surgery at Melbourne’s St Vincent’s Hospital, said he believed the operation to be a world first.
- Here’s An Opinion On:
-
Slots
By Peter Nisbet
If you are looking online for a P2P file sharing program you can find one on any number of free download music sites. Many would claim P2P music downloads to be illegal, and most of the time they would be right, but peer to peer file sharing is not intrinsically illegal, and it would be wrong to claim it to be so.
Certainly, the large music conglomerates will claim them to be so and some would tend to support them in that accusation, particularly the producers and artists, but it is not, in fact, illegal for two people to share their files. If it is not illegal for two to share computer files, then it should not be illegal for three to share, and so on and on and on.. .
It is understandable that artists and music studios get annoyed when their products are being shared online, but there are two points to be discussed here: the legal situation and the moral situation. Let’s look at each of these in order given:
The Legal Aspects of a P2P File Sharing Program
[youtube]http://www.youtube.com/watch?v=_W7RzDYLmjc[/youtube]
A P2P file sharing program is not illegal. What all of this hullabaloo is about is copyright, and the fact that peer to peer downloads of material that is still protected by copyright is illegal. That is not in dispute! Nobody could agree that it is correct for one person to steal another’s work, and present it as their own. That is either plagiarism or breach of copyright, and nobody could realistically argue that it is not.
It is therefore illegal to copy another artist’s work by using P2P file sharing software to connect one hard disk to another and copy the files on the one to the other – even if the music files on the first had been paid for. However, not all free download music sites do that, because many young musicians and singers will offer their work free online in order to get themselves better known.
One favorite of the free download music sites available is Jamendo, where you will find legitimate legal music downloads from independent artists that want their work to be published and better known. You can download tracks or even entire albums legally using your own P2P file sharing program, and another is Legal Torrents, where you can find a large number of legal media files to download with your P2P file sharing program.
This is a typical legal P2P site that offers legal online downloads of music, movies, games and audio-books plus a lot more. This is just one example of the type of free download music sites you are liable to come across when you are looking for a P2P file sharing program online.
It is therefore illogical to infer that all free download music sites are illegal, and that a P2P file sharing program must be breaking the law. There are many legal uses to which peer to peer software can be put.
The Moral Aspects of a P2P File Sharing Program
When it comes to the morality of using peer to peer software, here too there are no issues if it is being used legally. However, there are both legal and moral issues if the software is used to download copyright protected work and not all of these side with music and movie companies, particularly with respect to downloading music.
Where is it immoral for somebody wanting to check out the quality of new artists before buying their work? Many people use P2P file sharing program to check out a track or two before purchasing an album. Some also use free download music sites to test an artist’s work before buying tickets for a live gig. There is nothing wrong with that even though it might be illegal.
Where it is both illegal and morally wrong is for people to get a free download of a movie or music tracks in order to avoid paying for it. The way for the music industry to prevent that is to offer free tracks from albums that can be used as testers by potential customers. By doing that, anybody who then uses P2P file sharing software to download copyright protected material will then be fair game.
It is not the software that is illegal but the people that use it illegally, and the music companies should use some initiative in getting the moral high ground by offering their own free download music sites and making it less necessary for people to test albums and artists by breaking the law.
About the Author: More information on free music download sites and their movie equivalents is available from
Online Free Movies
where you will find legal P2P software and more comments of the legality or otherwise of downloading music, movies and games.
Source:
isnare.com
Permanent Link:
isnare.com/?aid=596565&ca=Entertainment
Thursday, November 12, 2009
Researchers have found a crucial genetic difference between humans and chimps that could help explain our language and speech abilities. The difference lies in a gene called FOXP2 which encodes for a protein of the same name. This acts as a transcription factor, controlling the activity of other genes.
The human and chimp versions of the protein differ in only two of their 740 amino acid components, but when researchers at the University of California, Los Angeles, replaced the human gene with the chimp version in neurons grown in the laboratory, they found it affected the expression of at least 116 other genes.
The results are detailed in a paper published on Thursday in the scientific journal Nature.
Author of the study Dr. Daniel Geschwind, of the David Geffen School of Medicine at UCLA, said the gene had a “major role” in differences between chimps and humans. “We showed that the human and chimp versions of FOXP2 not only look different but function differently too.”
|
We believe FOXP2 is not only important for the higher order cognitive aspect of language but also for the motor aspect of speech and language |
|
|
Some of the affected genes control the formation of connections in the brain, whilst others relate to facial movements. Several have already been found to be involved in language disorders. Mutations in FOXP2 itself were also known to affect speech and language; the gene was first identified in members of a family suffering from language problems who were found to share a genetic mutation.
Frances Vargha-Khadem at University College London has studied patients with FOXP2 mutations, and agrees with the new research. As well as language problems, some of her subjects have changes in the shape of their jaws, mouths and tongues. She thinks that chimps may also have these differences.
“We believe FOXP2 is not only important for the higher order cognitive aspect of language but also for the motor aspect of speech and language,” said Genevieve Konopka, one of the authors of the paper at UCLA.
Previous research indicates that the changes in FOXP2 occurred around 200,000 years ago with the rise of modern humans. Geschwind also suggests that several of the related genes may have evolved together. Preliminary studies have shown signs that they too emerged relatively recently.
Scientists are now keen to further study FOXP2 and the genes that it affects. Geschwind believes this could eventually lead to breakthroughs in treatment for disorders such as autism and schizophrenia, which affect language skills.
The study was funded by the National Institute of Mental Health, the A.P. Giannini Foundation and the National Alliance for Research on Schizophrenia and Depression.
Wednesday, February 8, 2006
The H5N1 Avian Flu virus, also known as Bird Flu, has been found in Nigeria by Italian scientists. Tests done on samples in a laboratory confirm that the strain is the one that can kill people, although no human cases have been reported said the Paris-based United Nations body. This is the first time is has appeared on the continent.
Reports say tests of the virus closely resemble the virus in Asia. The virus has been discovered in poultry flocks in a large Nigerian farm. “It is the first report of the disease in Africa,” the Paris-based World Organization for Animal Health (OIE) said on Wednesday.
“It’s going to be very difficult to mount an eradication campaign,” said Dr. Alex Thiermann, president of the OIE’s international animal health code, from Paris, France. “With what we have today, it is a highly pathogenic H5N1 – the same, or very closely related to the previous ones,” said Thiermann. He also added, “a full genetic analysis of sample viruses is expected to be completed by late Thursday.”
Maria Zampaglione of the Paris-based OIE said “An outbreak has been detected. A local poultry farm keeping 46,000 birds was affected, of which 42,000 were infected and 40,000 of those, died.” The farm is located in Jaji, which is a village in the northern state of Kaduna.
“The farm is located near the Niger Delta, one of the largest over-wintering areas for wild birds in Africa.” said Thiermann.
Quarantine measures on the control and movement of poultry have been taken, and the farm has been disinfected said Nigerian authorities.
“However, it is too early to say how serious the outbreak is and how big its spread could be,” said Ilaria Capua of the Italian bird flu centre in Padua. “We have to be cautious in evaluating the possible implications of these findings.”
In Rome, Samuel Jutzi, a director of the UN’s Food and Agriculture Organization said, “if the situation in Nigeria gets out of control, it will have a devastating impact on the poultry population in the region. It will seriously damage the livelihoods of millions of people and it will increase the exposure of humans to the virus.”
“When you have 46,000 chickens in a house, usually you have some degree of biocontainment…So these (chickens) are not likely to be the ones to first encounter migratory waterfowl,” Thiermann said.
Wildlife circles have been debating on whether or not wild birds are spreading the virus around the globe. Experts believe they are playing a role but most believe poultry movement, poultry products and poultry manure is the main cause of the spreading of the virus.
“But probably not in this case,” said Thiermann. “While it’s too early to blame the wildlife, it’s very likely to be in an area that’s remote enough that it’s not likely to be associated with international trade.”
OIE spokeswoman Zampiglione also said, “Experts had been fearing an African outbreak for months. The conditions there are more likely to lead to contagion from birds to man.”
By Eric Badgely
Home inspectors cite wood to earth contact as a condition that will, eventually, lead to decay of the wood. Sometimes, the wood that is in contact with the soil is pressure treated lumber that is designed for that purpose. This article gives advice on what could be considered appropriate uses for pressure treated lumber.
Wood to earth contact is one of the most frequently cited concerns in a home inspection report. Often, clients ask about wood to earth contact and how it applies to pressure treated lumber. In the world of construction, pressure treated lumber is advertised as having a long life (some say 40 plus years) even with direct earth contact. The manufacturers soak the lumber in chemicals that penetrate into the wood from the outside surface. The most vulnerable area to future rot is where the builder cuts the wood — such as to length and then that end is dropped in a hole for use as a fence post. In theory, if an end is cut and buried, a topical wood treatment should be applied at the cut. In practice, this lumber does last a very long time. There have been instances of fence posts, that were installed 20 years before, being dug up and they looked as good as they did the day they were buried. On the other hand, depending on soil conditions, sometimes the wood will not meet the advertised expectations for longevity.
[youtube]http://www.youtube.com/watch?v=4KEW_iFupy4[/youtube]
Pressure treated lumber, and what a home inspector should say about it when it touches soil, is an issue a home inspector wrestles with. Fact: The wood is manufactured for ground contact, so having it touch the earth is not necessarily a defect. However, pressure treated wood in contact with the soil will last much longer if all soil contact is eliminated. Putting pressure treated lumber on a concrete pier will make it last longer.
A logical means of evaluating the situation, that makes sense for the home inspector, follows: If pressure treated lumber is being used in a crucial role, and it is in contact with soil, then the inspector recommends removal of the soil. For example, if a structural post under the house is buried the risk for extensive damage, the result of rot, cannot be ignored. Another example: Outside columns that support high decks should be kept well away from soil. High decks can come down if the columns rot.
Now, if an inspector finds a couple pressure treated 4×4’s, for support of a handrail, sunk into the earth at the steps from a low deck, that is a relatively minor concern. Usually the inspector will probe the lumber at the ground level and, if it is sound, not think or say much about it. No grading is applicable, since the posts are sunk into the ground, in part to make the rail steady. Pressure treated lumber is commonly used in simple outdoor applications and, down the road, any repair should be simple to do and the area easy to access. Should there be a problem at some point, a workman who is affordable can perform the repair and no structural damage is likely to have occurred. That makes this an appropriate use of pressure treated lumber.
About the Author: This article was produced by Eric Badgley; specializing in
Bellingham Condos
and
Bellingham WA Real Estate
. http://www.bellingham-realestate.net
Source:
isnare.com
Permanent Link:
isnare.com/?aid=352632&ca=Real+Estate