Posts tagged mcse training

Free Microsoft 70-291 Q & A / Study Guide Part II

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


 

 

 

QUESTION 1:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
print server named Certkingdom -PR01 that has a built-in network interface.
A Certkingdom.com user named Andy Reid is a member of the Research and
Development department. Andy Reid complains that he cannot print to a print
device attached to Certkingdom -PR01.
You have received instruction to ensure that Andy Reid can print to the print
device. First you verify that the IP address for Certkingdom -PR01 is correct and that
the latest drivers for the print device are installed. You now want to verify that the
print jobs are being sent to the correct MAC address for Certkingdom -PR01.
What should do?

A. On Certkingdom -PR01, run the net session command.
B. On Certkingdom -PR01, run the netstat command.
C. On Certkingdom -PR01, run the netsh command.
D. On Certkingdom -PR01, run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of
users on a server, to see if users have files open, and to see how long each user’s session
has been idle. Net session manages server computer connections – used without
parameters, net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to display TCP/IP and port information.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 2:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets. All servers on the Certkingdom.com network run
Windows Server 2003 and all client computers run Windows XP Professional. All
servers are located in a central data center that uses a single IP subnet and all client
computers are located in one subnet.
The data center contains two routers named Certkingdom -SR01 and
Certkingdom -SR02, two domain controllers named Certkingdom -DC01 and
Certkingdom -DC02, and two file servers named Certkingdom -SR03 and
Certkingdom -SR04. The IP addresses of these servers are indicated in the table
below.

Host name IP address
Certkingdom-DC01 10.10.10.1
Certkingdom -DC02 10.10.10.2
Certkingdom -SR01 10.10.1.1
Certkingdom -SR02 10.10.1.2
Certkingdom -SR03 10.10.11.1
Certkingdom -SR04 10.10.11.2

You have received instruction from the CIO to install a new database server in the
data center. You install Windows Server 2003 on a new server computer named
Certkingdom -DB01 and hand it over to a database administrator named Dean
Austin. Dean Austin installs Microsoft SQL Server 2005 and makes some changes to
the TCP/IP settings on Certkingdom -DB01 as shown in the following table.

Parameter Value
IP address 10.10.1.3
Subnet mask 255.255.255.0
Default gateway 10.10.1.2

Later, Dean Austin complains that Certkingdom -DB01 cannot communicate with the
other servers in the data center. All other servers in the data center can
communicate with the other servers as well as the client computers. You log on to
Certkingdom -DB01 and attempt to ping Certkingdom -DC01 but you receive the
following error message: “Destination host unreachable”.
What should you do to ensure that Certkingdom -DB01 can communicate with the
other computers in the Certkingdom.com network?

A. Configure Certkingdom -DB01 with a default gateway of 10.10.1.1.
B. Configure Certkingdom -DB01 with a subnet mask of 255.255.0.0.
C. Configure Certkingdom -DB01 with an IP address of 10.10.10.3.
D. Configure Certkingdom -DB01 with an IP address of 10.10.11.3.

Answer: B

Explaination: Large networks are subdivided to create smaller subnetworks to reduce
overall network traffic by keeping local traffic on the local subnet and sending all
nonlocal traffic to the router. In order to create a subnetwork, we need to have a system
for addressing that allows us to use the network ID and host ID within the class-based
system. This is accomplished through the use of a subnet mask. To determine the
appropriate custom subnet mask (typically referred to simply as subnet mask) for a
network, you must first:
1. Determine the number of host bits to be used for subnetting.
2. Determine the new subnetted network IDs.
3. Determine the IP addresses for each new subnet.
4. Determine the appropriate subnet mask.
Incorrect Answers:
A: You need to assign the correct subnet mask to ensure connectivity.
C, D: The problem in this scenario is not a faulty IP address. It is the appropriate subnet
mask that has to be determined to enable connectivity.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 3:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of two subnets named Subnet A and Subnet B. Subnet A and
Subnet B are connected by a router. All computers on the Certkingdom.com network
are configured with static IP addresses. All network servers run Windows Server
2003 and all client computers run Windows XP Professional.
Certkingdom.com hires a new Sales manager named Amy Wilson. You install a new
client computer named Certkingdom -WS291 for Amy Wilson. You then add
Certkingdom -WS291 to Subnet A. The relevant portion of the network is configured
as shown in the exhibit.

However, Amy Wilson complains that Certkingdom -WS291 cannot communicate
with other hosts on the network.
What should you do to ensure that Certkingdom -WS291 can communicate with all
local and remote computers on the Certkingdom.com network?

A. Configure Certkingdom -WS291 with a default gateway of 192.168.28.84.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.2.1.
C. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.128.
D. Configure Certkingdom -WS291 with a subnet mask of 255.255.255.192.

Answer: C

Explaination: It is evident from the exhibit that the file server and
Certkingdom -WS291 have a different subnet mask. This is the reason why they
cannot communicate with each other. You must therefore change the subnet mask
of Certkingdom -WS291 to 255.255.255.128.
Incorrect Answers:
A, B: The problem is not the gateway IP address that is faulty, but rather the subnet
mask.
D: This option suggests the correct object that has to be changed, but it gives the wrong
subnet mask.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 57


QUESTION 4:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and branch offices in Dallas and
Miami. All servers on the Certkingdom.com network run Windows Server 2003 and all
client computers run Windows XP Professional. You work in the Miami branch
office.
The network at the Miami branch office consists of 25 different subnets, each with a
maximum of six computers. The network administrator at headquarters has
allocated the 192.168.3.0/24 network address to the Miami branch office.
You install a new server named Certkingdom -SR21 in the Miami branch office. You
need to configure the Internet Protocol (TCP/IP) properties for Certkingdom -SR21.
You configure Certkingdom -SR21 with an IP address of 192.168.3.44. What subnet
mask should you use?

A. A subnet mask of 255.255.255.0.
B. A subnet mask of 255.255.255.128.
C. A subnet mask of 255.255.255.192.
D. A subnet mask of 255.255.255.240.
E. A subnet mask of 255.255.255.248.

Answer: E

Explaination: The network address is: 192.168.2.0/24, which means
11111111.11111111.11111111.0 in binary.
Therefore, you can use the last octet to configure the 30 subnets and 6 hosts in each
subnet
You need only six host PCs. When you convert to binary, it is: 00000111. As a result,
you use 3 bits.
This leaves 5 bits for the subnets 11111000 converted to decimal:
128+64+32+16+8=248, therefore the subnet mask will be: 255.255.255.248.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p.57


QUESTION 5:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com
Certkingdom.com has its headquarters in Chicago and a branch office in Dallas. All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. You work in the Dallas branch office.
The network at the Dallas branch office consists of a single subnet that contains 150
client computers and 12 servers. The network administrator at headquarters has
allocated the 10.10.0.0/16 network address to the Dallas branch office.
You have received instruction from your manager to place all servers at the Dallas
branch office into a separate subnet that uses the 192.168.10 public addressing
scheme. Your manager asks you to make allowance for a maximum of 30 servers in
the new subnet.
Which subnet mask should you use for the new subnet?

A. 255.255.255.224
B. 255.255.255.240
C. 255.255.255.248
D. 255.255.255.252
E. 255.255.255.254

Answer: A

Explaination: A 255.255.255.224 subnet mask gives five host address bits, so the
maximum number of host addresses is 2 ^ 5 – 2 = 30 host addresses. Thus
255.255.255.224 is the only subnet mask that will allow for sufficient IP addresses in
case of further growth, whilst still conserving as many current addresses as possible.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, p. 62


QUESTION 6:

DRAG DROP
You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional.
You have installed a new server named Certkingdom -SR06 on the network. The
relevant portion of the network is shown on the exhibit.

You want to configure Certkingdom -SR06 with a valid static IP configuration.
Certkingdom -SR06 must be able to communicate with all hosts on the network and
on the internet. You also need to configure Certkingdom -SR06 to use the DNS server
on the local subnet for name resolution. In addition, you must configure redundancy
for name resolution.
How should you configure Certkingdom -SR06?
To answer drag the appropriate IP addresses and Subnet masks to the appropriate
places.

Answer:

Explaination:
The Class C address 192.168.0.100 has to be the IP address to enable
Certkingdom -SR06 to communicate with all hosts on the network and on the internet
as 192.168.0.1, 192.168.0.2 and 192.168.0.110 are already in use. 192.168.5.2 and
192.168.5.100 are on the wrong subnet, and besides, 192.168.5.12 is already in use.
The subnet mask for this Class C address is 255.255.255.0. The default gateway
should be 192.168.0.1. To configure redundancy for name resolution, configure the
preferred DNS server/primary address as 192.168.0.2, and the alternate DNS
server/secondary address as 192.168.5.2.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 80-116


QUESTION 7:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. You work in the Miami branch
office.
The Miami branch office has a file server named Certkingdom -SR25 that hosts
critical documents. Certkingdom -SR25 is configured with a DHCP client reservation.
Certkingdom.com users from all three offices download documents from
Certkingdom -SR25.
One day Certkingdom.com users complain that they cannot access the documents on
Certkingdom -SR25. You discover that the DHCP server has failed. The DHCP server
is located at headquarters.
You have received instruction from the CIO to ensure that Certkingdom -SR25 is
available even if it is unable to obtain or renew a lease from the DHCP server.
How could you accomplish this task?

A. On the DHCP server, increase the DHCP lease period.
B. Configure alternate IP settings for Certkingdom -SR25 on the Alternate Configuration
tab of the Internet Protocol (TCP/IP) properties.
C. Configure the DHCP scope in the 169.254.0.1. – 169.254.255.254 range.
D. On the DHCP server, configure the DHCP 001 Resource Location Servers reservation
option for Certkingdom -SR25.

Answer: B

Explaination: Windows Server 2003 includes the Alternate Configuration feature.
The Windows Server 2003 servers can be configured to use an alternate static IP
configuration if a DHCP server is unavailable. When a DHCP client determines that
the DHCP server is unavailable, it will automatically change over and also configure
the TCP/IP stack with the static address information specified on the Alternate
Configuration tab of the Internet Protocol (TCP/IP) properties.
Incorrect Answers:
A: Increasing the lease period would result in DHCP clients requesting leases less
frequently, but won’t guarantee that Certkingdom -SR25 will be available when the DHCP
server is down.
C: Modifying the DHCP scope to the 169.254.0.1. – 169.254.255.254 range will still be
reliant on the DHCP server.
D: Configuring the DHCP 001 Resource Location Servers reservation option for
Certkingdom -SR25 on the DHCP server will not ensure that Certkingdom -SR25 will
receive an IP address or have the IP address renewed.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapter 2, pp. 114, 117


QUESTION 8:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR34. Certkingdom -SR34 is configured as a DHCP server
and has been authorized in Active Directory. The Telnet service has been installed
and started on Certkingdom -SR34.
One day Certkingdom.com users complain that they cannot access network resources.
Your investigations reveal that the DHCP Server service on Certkingdom -SR34 has
stopped. You install the administrative tools on a client computer named
Certkingdom -WS291 and log on to the computer. When you open the DHCP console
on Certkingdom -WS291 and attempt to connect to Certkingdom -SR34, you receive an
error message that states: “Cannot find the DHCP Server.” You then attempt to
ping Certkingdom -SR34 but fail.
How can you connect to the DHCP Server service on Certkingdom -SR34 by using the
DHCP console on Certkingdom -WS291?

A. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcp
command.
B. Establish a Telnet session to Certkingdom -SR34 and then run the net start dhcpserver
command.
C. Establish a Telnet session to Certkingdom -SR34 and then run the ipconfig /renew
command.
D. On Certkingdom -WS291, run the netsh dhcp server\\ Certkingdom -SR34 show server
command.

Answer: B

Explaination: You can start the DHCP Server service by executing the Net Start
Dhcpserver command at the command prompt.
Telnet is a protocol that enables an Internet user to log on to and enter commands on a
remote computer linked to the Internet, as if the user were using a text-based terminal
directly attached to that computer. Telnet is part of the TCP/IP suite of protocols. The
term telnet also refers to the software (client or server component) that implements this
protocol.
Given the fact that you can ping Certkingdom -SR34 you should then establish a Telnet
session to Certkingdom -SR34 and then run the appropriate command.
Reference:
J. C. Mackin & Ian McLean, MCSA/MCSE self-paced training kit (exam 70-291):
implementing, managing, and maintaining a Microsoft Windows Server 2003 network
infrastructure, Microsoft Press, Redmond, 2004, p. 7-23


QUESTION 9:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
server named Certkingdom -SR51 that is configured as a print server for a print
device that has a built-in network interface. The print device is used by the Sales
department to print Sales reports.
A Certkingdom.com user named Clive Allen is a member of the Sales department. Clive
Allen complains that he cannot print to the print device attached to
Certkingdom -SR51.
You verify that the IP address for Certkingdom -SR51 is correct and that the correct
drivers for the print device are installed. You now want to verify that the print jobs
are being sent to the correct MAC address for Certkingdom -SR51.
You log on to Certkingdom -SR51. What should you do next?

A. Run the net session command.
B. Run the netstat command.
C. Run the netsh command.
D. Run the netcap command.

Answer: D

Explaination: Netstcap.exe is a command line tool that could be used to capture the
network traffic. A filter can be created to be used during the capture to determine the
MAC address the print jobs are being sent to. The Network Monitor Capture Utility (
Netcap.exe) can be used to capture network traffic in Network Monitor. Netcap provides
capture abilities only from a command prompt; to open the resulting capture (.cap) files,
you must use the full Network Monitor interface. Netcap is installed when you install the
Support tools that are on the Windows XP CD-ROM. Netcap provides capture abilities
that are similar to the version of Network Monitor that is included with the Windows
Server products; however, you must use Netcap at a command prompt. Netcap installs
the Network Monitor driver and binds it to all adapters when you first run the Netcap
command.
Incorrect Options:
A: The net session command can be used to view the computer names and user names of users
on a server, to see if users have files open, and to see how long each user’s session has
been idle. Net session manages server computer connections – used without parameters,
net session displays information about all sessions with the local computer.
B: The netstat command is not a utility to use when troubleshooting NetBIOS names, but
is used to show what ports your computer is listening on.: -R is used to reload your
LMHOSTS file located in %systemroot%\system32\drivers\etc., -r will show you which
name resolutions have been answered via broadcasts, and which have been answered via
a NetBIOS name server, -RR switch of the command utility refreshes your NetBIOS
name with a configured WINS server.
C: The Network Shell utility (Netsh.exe) can perform a wide range of system
configuration tasks. You can use commands in the Netsh Interface IP context to
configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and
WINS servers) and to display configuration and statistical information.
Reference:
Microsoft Knowledge Base: 306794: How to Install the Support Tools from the Windows
XP CD-ROM Network Monitor is provided with Windows Server products and
Microsoft Systems Management Server (SMS). Microsoft Corporation, 2004
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd & Laura Hunter,
MCSA/MCSE: Exam 70-291: Implementing, Managing, and Maintaining a Windows
Server 2003 Network Infrastructure Guide & DVD Training System, pp. 686, 854-856,
926


QUESTION 10:

Network Topology Exhibit:

LAN Settings Exhibit:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
Microsoft Internet Security and Acceleration (ISA) Server computer named
Certkingdom -SR01, a DNS server named Certkingdom -SR02, a DHCP server named
Certkingdom -SR03, a file server named Certkingdom -SR21, and a Web server named
Certkingdom-SR25. Certkingdom -SR25 also serves as a central antivirus server.
Certkingdom -SR21 is located on the 10.10.11.0 subnet and Certkingdom -SR25 is
located in the perimeter network. Certkingdom -SR21 contains antivirus software
that checks for new virus definitions on Certkingdom -SR25 every hour. You can also
access Certkingdom -SR25 through a virus update Web page to perform manual
virus definition updates.
Certkingdom -SR03 suffers a catastrophic failure and is removed from the network.
Due to budgetary constraints, a replacement for Certkingdom -SR03 will only be
acquired in the next financial year. You need to redesign network addressing
scheme, and change the IP addresses for Certkingdom -SR01 to the addresses shown
in the Network Topology exhibit.
Certkingdom -SR02 contains the new host (A) resource records for
Certkingdom -SR01.
You receive reports about a new virus threat and want to protect the network
immediately by manually downloading the new virus definitions to
Certkingdom -SR21. you log on to Certkingdom -SR21 but discover that you cannot
access the virus update Web page on Certkingdom -SR25. The static TCP/IP
configuration on Certkingdom -SR21 uses Certkingdom -SR02 as the preferred DNS
server.
You confirm that Certkingdom -SR01 is configured properly. On Certkingdom -SR21,
you view the Internet Explorer LAN settings that are shown in the LAN Settings
exhibit.
What should you do to allow Certkingdom -SR21 to connect to Certkingdom -SR25?

A. At a command prompt on Certkingdom -SR21, run the ipconfig /flushdns command.
B. In the LAN settings of Internet Explorer on Certkingdom -SR21, select the
Automatically detect settings check box.
C. At a command prompt on Certkingdom -SR01, run the ipconfig / flushdns command.
D. At a command prompt on Certkingdom -SR01, run the ipconfig /registerdns command.

Answer: A

Explaination: Running the ipconfig /flushdns command will flush and reset the DNS
resolver cache which is necessary to allow connection. Run this command on
Certkingdom -SR21 to connect to Certkingdom -SR25.
Incorrect Answers:
B: Selecting the “Automatically detect settings” checkbox is not going to allow
Certkingdom -SR21 to connect to WWW.
C: The ipconfig /flushdns command flushes and resets the DNS resolver cache. This is
not what is necessary.
D: The ipconfig /registerdns command refreshes all DHCP leases and registers any related
DNS names. This option is available only on Windows 2000 and newer computers that
run the DHCP Client service. This is not going to allow Certkingdom -SR21 to connect to
WWW when it is run on Certkingdom -SR01.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 311


QUESTION 11:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. The Certkingdom.com network contains a
DHCP server named Certkingdom -SR15 that is configured with a single scope.
Certkingdom.com hires a new Sales manager named Andy Reid. You install a new client
computer named Certkingdom -WS291 for Andy Reid. You connect
Certkingdom -WS291 to the network by plugging the network cable into the network
adapter on Certkingdom -WS291 and attempt to connect to Certkingdom -SR25.
However, you cannot access any of the servers on the network. When you open a
command prompt on Certkingdom -WS291 and run the ipconfig /renew command,
you receive the following response.

You log on to a client computer named Certkingdom -WS292 and run the ipconfig
/renew command successfully.
What should you do to ensure that Certkingdom -WS291 can receive its IP address
configuration from the Certkingdom -SR25?

A. Restart the DHCP service on Certkingdom -SR25.
B. Restart Certkingdom -WS291.
C. Restart Certkingdom -SR25.
D. Add additional IP addresses to the scope on Certkingdom -SR25.

Answer: B

Explaination: It is probable that the TCP/IP stack has a problem because the
computer is unable to send a DHCP discover broadcast packet. This can happen
when you insert a network cable after the PC has been started. You should restart
the client PC to successfully obtain a new IP address.
Incorrect Answers:
A, C, D: This is unnecessary because Certkingdom -WS292 did obtain an IP address from
the DHCP server, thus indicating that the DHCP server configuration is not the issue.
Reference:
Deborah Littlejohn Shinder and Dr. Thomas W. Shinder, MCSA/MCSE Exam 70-290:
Managing and Maintaining a Windows Server 2003 Environment Study Guide & DVD
Training System, p. 629


QUESTION 12:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows XP Professional. Certkingdom.com has its headquarters in
Chicago and branch offices in Dallas and Miami. The Certkingdom.com network
contains a DHCP server named Certkingdom -SR01. The relevant portion of the
network is shown in the following network diagram.

You work at headquarters. A Certkingdom.com employee named Andy Booth is one of
three employees that are relocated to headquarters from the Dallas office. Andy
Booth uses a portable client computer named Certkingdom -WS291. Andy Booth
complains that when he plugs Certkingdom -WS291 into the LAN connection in his
new cubicle, he cannot connect to network resources on the LAN or the Internet.
None of the other employees are experiencing the same problem.
When you run the ipconfig command from a command prompt on
Certkingdom -WS291, you see the output as shown in the exhibit.

What should you do to allow Certkingdom -WS291 to connect to network resources
on the LAN or the Internet?

A. Configure Certkingdom -WS291 with a subnet mask of 255.255.240.0.
B. Configure Certkingdom -WS291 with a default gateway of 192.168.3.12.
C. Configure Certkingdom -WS291 with a primary DNS suffix of Certkingdom.com
D. Configure Certkingdom -WS291 to automatically lease an IP address from
Certkingdom -SR01.

Answer: D

Explaination: The client computers on the subnet use DHCP to obtain their IP
configurations. Certkingdom -WS291 has a static IP address, and therefore cannot
obtain a valid IP configuration from the DHCP server.
Incorrect Answers:
A: By changing the subnet mask you will not ensure that Certkingdom -WS291 will
connect to other computers and the Internet.
B: Changing the default gateway will not enable Certkingdom -WS291 LAN connection.
Besides, 192.168.3.12 is the IP address of the DHCP server.
C: Adding a primary DNS suffix means that only domain names listed in that window
will be tried for resolution purposes. Both the connection-specific and primary DNS
suffix are ignored.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, p. 515


QUESTION 13:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows 2000 Professional. Certkingdom.com has headquarters in
London and branch offices in Paris, Berlin, Milan, Madrid, Stockholm, Warsaw,
Minsk, and Athens. Each branch office has a server that provides DHCP Server
services and between two to twenty client computers. A client computer in each
branch office is configured with a shared dial-up connection. You work at
headquarters.
The Berlin branch office has only two client computers named Certkingdom -WS291
and Certkingdom -WS292. A Certkingdom.com user named Kara Lang works in the
Berlin office. One morning Kara Lang complains that the shared dial-up connection
on Certkingdom -WS291 is no longer working.
Your investigation reveals that Certkingdom -WS292 can connect to shared folders
on Certkingdom -WS291 and that Certkingdom -WS291 can connect to the network at
headquarters. However, Certkingdom -WS292 cannot connect to resources on the
network at headquarters.
What should you do to ensure that both Certkingdom -WS291 and
Certkingdom -WS292 can connect to resources on the network at headquarters?

A. Reconfigure Internet Connection Sharing on Certkingdom -WS291.
B. Configure the shared dial-up connection on Certkingdom -WS291 so that automatic
dialog is enabled.
C. Configure Certkingdom -WS292 to receive an IP lease from a DHCP server.
D. Configure Certkingdom -WS292 to use Certkingdom -WS291 for DNS name resolution.

Answer: C.

Explaination: The problem is most likely caused by an incorrect or non-existent
default gateway setting on Certkingdom -WS292. If you configure
Certkingdom -WS292 to use DHCP to obtain IP addressing information,
Certkingdom -WS292 will receive the correct settings from the ICS service on
Certkingdom -WS291.
Incorrect Answers:
A: The question refers to a shared dial-up connection on Certkingdom -WS291 not
working. If the dial-up connection is shared, then Internet Connection Sharing is enabled
already.
B: The question states that Certkingdom -WS291 automatically connects to the network at
the main office whenever the user on Certkingdom -WS291 attempts to access resources
located on the main office network. This indicates that automatic dial-up is already
configured.
D: Certkingdom -WS291 is not a DNS server. The ICS service has a DNS proxy that
would pass DNS requests to whichever DNS server Certkingdom -WS291 is using.
Reference:
J. C. Mackin, Ian McLean, MCSA/MCSE Self-Paced Training Kit (exam 70-291):
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 network
Infrastructure, Part 1, Chapters 1 & 2, pp. 45, 124


QUESTION 14:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and all client
computers run Windows NT Workstation 4.0. The network contains 2,500 client
computers that are configured with static IP addresses.
Certkingdom.com issues a new network policy that requires all network computers to
have dynamically assigned IP configurations. You enable the DHCP Server service
on a member server named Certkingdom -SR25. Three network support technicians
have been instructed to configure the IP properties on all client computers to
receive a DHCP lease from Certkingdom -SR25.
It is estimated that the change over will take two weeks to complete. You need to
ensure that the DHCP server will not lease an IP address that is statically
configured on a computer that the network support technicians have not yet seen to.
What should you do?

A. On Certkingdom -SR25, configure Conflict detection attempts to 1.
B. On Certkingdom -SR25, configure Conflict detection attempts to 3.
C. On Certkingdom -SR25, configure client reservations for each client computer’s MAC
address.
D. On Certkingdom -SR25, activate and reconcile the scopes.

Answer: A

Explaination: When conflict detection attempts are set, the DHCP server uses the
Packet Internet Groper (ping) process to test available scope IP addresses before
including these addresses in DHCP lease offers to clients. A successful ping means
that the IP address is in use on the network. This results in the DHCP server not
offering to lease the address to a client.
If the ping request fails and times out, it indicates that the IP address is not in use on the
network. In this case, the DHCP server offers to lease the address to a client. Each
additional conflict detection attempt delays the DHCP server response by a second while
waiting for the ping request to time out. This in turn increases the load on the server. A
value of no greater than two (2) is recommended for ping attempts.
Incorrect Answers:
B: Due to the latency involved in ping attempts, the higher the conflict detection value is
set, the longer the lease process will be for every client that uses the DHCP server.
C: Configuring client reservations for each client computer MAC address will involve a
physical visit to each and every client computer if you do not ping it successfully.
D: The scope would already be activated in this scenario.
Reference:
Deborah Littlejohn Shinder, Dr. Thomas W. Shinder, Chad Todd and Laura Hunter,
Implementing, Managing, and Maintaining a Windows Server 2003 Network
Infrastructure Guide & DVD Training System, pp. 208-209


QUESTION 15:

You work as the network administrator at Certkingdom.com The Certkingdom.com
network consists of a single Active Directory domain named Certkingdom.com All
servers on the Certkingdom.com network run Windows Server 2003 and client
computers run Windows XP Professional, Windows 2000 Professional, or Windows
NT Workstation. All client computers are configured with default settings.
The Certkingdom.com network contains a server named Certkingdom -SR31 that
functions as a DHCP and DNS server, and a server named Certkingdom -SR38 that
contains antivirus server software. All DNS zones on Certkingdom -SR31 are enabled
for DNS dynamic updates. The computer account for each client computer is the
owner of its own DNS host record. No other server provides DNS services.
What must you do to ensure that Certkingdom -SR38 can contact client computers by
using fully qualified domain names (FQDNs) to propagate virus definition updates?

A. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records only
if requested by the DHCP clients option.
B. On Certkingdom -SR38, modify the Always dynamically update DNS A and PTR
records option.
C. On Certkingdom -SR31, modify the Discard A and PTR records when lease is deleted
option.
D. On Certkingdom -SR31, modify the Dynamically update DNS A and PTR records for
DHCP clients that do not request dynamic updates (for example, clients running
Windows NT 4.0) option.

Answer: D

Explaination: Dynamically Update DNS A And PTR Records For DHCP Clients That
Do Not Request
Updates – This checkbox lets you handle these older clients graciously by making the
updates using a separate mechanism. When checking this check box you will ensure that
Certkingdom -SR38can resolve FQDNs for all client computers on the network under the
given circumstances and the role that Certkingdom -SR31 plays.
Incorrect Answers:
A: Dynamically Update DNS A And PTR Records Only If Requested By The DHCP
Clients – This radio button (which is on by default) tells the DHCP server to register the
update only if the DHCP client asks for DNS registration. When this button is active,
DHCP clients that aren’t hip to DDNS won’t have their DNS records updated. However,
Windows 2000, XP, and Server 2003 DHCP clients are smart enough to ask for the
updates.
B: Always Dynamically Update DNS A And PTR Records – This radio button forces the
DHCP server to register any client to which it issues a lease. This setting may add DNS
registrations for DHCP-enabled devices that don’t really need them, like printer servers;
however, it allows other clients (like Mac OS, Windows NT, and Linux machines) to
have their DNS information automatically updated. This is not what is required.
C: Discard A And PTR Records When Lease Is Deleted – When a DHCP lease expires,
what should happen to the DNS registration? Obviously, it would be nice if the DNS
record associated with a lease vanished when the lease expired; when this checkbox is
checked (as it is by default), that’s exactly what happens. If you uncheck this box, your
DNS will contain entries for expired leases that are no longer valid; when a particular IP
address is reissued on a new lease, the DNS will be updated, but in between leases you’ll
have incorrect data in your DNS-always something to avoid.
Reference:
James Chellis, Paul Robichaux and Matthew Sheltz, MCSA/MCSE: Windows Server
2003 Network Infrastructure Implementation, Management, and Maintenance Study
Guide, p. 246

 

 

 

MCTS Training, MCITP Trainnig

 

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Privacy a concern as Google+ links with Google’s other sites

Users must be alert about having their real identity from Google+ replace pseudonyms in other Google services

Google’s work to integrate its Google+ social networking site broadly with its other services could raise red flags for users who want to closely guard their privacy.

 


Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

Google wants Google+ to be more than a stand-alone social network. It envisions Google+ integrating with most, maybe all, of its Web applications and sites to provide social sharing capabilities and possibly a uniform online identity.

[ Also on InfoWorld: Google+ poised for push into the enterprise. | And check out the slideshow: 10 ways to enhance Google+ | [ Stay ahead of the key tech business news with InfoWorld’s Today’s Headlines: First Look newsletter. ]

But there is a crucial difference between Google+ and other company services like Gmail, whose users have long been able to use pseudonyms to protect their privacy, if they wish. Google+ currently requires all members to use their real names — a policy on which it has said it will bend, but not how or when.

There may be a risk that people who use their real name in Google+ but use pseudonyms in other Google services may inadvertently expose their real identity by linking Google+ with those services.

Already there are glimpses of how Google+ integrations are altering identity elsewhere on Google. For example, Google has set up a tight integration between Google+ and its Picasa Web photo management service.

For starters, users have to agree to integrate their existing Picasa Web account with Google+ in order to join Google+. If they do so, the displayed user name on Picasa Web accounts becomes the real name used in Google+, replacing the one being used before if different. (The access settings for photos and albums remain the same as prior to the integration, according to Google.)

Without the Google+ integration, Picasa Web users retain the option of using a pseudonym. However, they then can’t have a Google+ account.

Asked for comment, a Google spokesman said via e-mail: “We designed Google+ with privacy in mind, including a number of features that offer users control over what and how they share. We’re always working to provide users with transparency and choice. We’ll continue to do so as we release new features and updates for our products.”

Currently, most Google consumer online services and applications are grouped under a master umbrella account, called a Google Account. It offers individual accounts for Gmail, Docs, YouTube, Calendar, Blogger, Voice, Groups, Reader, and many others.

At this point, Google Account holders can tailor the user name displayed in some of those individual services. For example, one user can have a name shown on his Gmail messages, a different one for his YouTube account and another for a blog published on Blogger. Those names can be pseudonyms.

It’s not clear if options for having different names within a single umbrella Google Account will be maintained as Google pushes forward with the integration of Google+ and other Google services.

Of course, a way to be on Google+ but avoid dealing with its current and future integrations in Google services is to set up a separate Google Account just for it.

ARC 2011: Client Security Software

A year after narrowly missing out on the top honors in the Client Security Software category last year (losing by just over a point to Kaspersky Lab), Sophos climbed over the top in this year’s ARC.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

The security company posted top scores in product innovation (94.8) and support (85.5), but Sophos lost the partnership subcategory to none other than Kaspersky.

Sophos has built a strong reputation for sharp endpoint security software and an expanding line of products, thanks to its recent acquisition of unified threat management (UTM) player Astaro Networks. Now, the security vendor is stepping up its partnership plans with the addition of a new channel chief and plans to expand its partner ranks.

Annual Report Card 2011 Home

In May, Sophos hired Steve Hale as its new vice president of global channels; Hale previously served as vice president of global channel sales at Novell (NSDQ:NOVL)’s Security Systems and Operating Platform Group and also worked at Microsoft (NSDQ:MSFT) and F5 Networks.

“Fundamentally, we have a sound channel program, but we are absolutely working on some things to make it even better,” Hale said. Some of those changes include targeting more security-focused solution providers instead of traditional software resellers. As Sophos builds out its product line into areas like network security and UTM, Hale said the vendor will need to bring in experienced partners.

“If we want to build the next evolution of the partner program, then we need to find ways to invest more in these kinds of partners,” he said. “Security is no longer just a point product.”

Sophos is also taking a more aggressive approach to the small and midsize business market; the vendor recently signed a deal with D&H Distributing that Hale said will help Sophos expand its channel reach. “D&H is an immense set of pipes that branch out to hundreds and hundreds of security VARs,” he said. “With the addition of Astaro, our product line is filling out and that’s made us a lot more relevant in security conversations.”

How Run Android apps on Windows

We’ve run Android apps on Virtualbox, Netbooks and told you about Bluestacks bringing Android apps to Windows PC. Bluestacks is now a reality, available to general  public.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

The alpha version allows most Android games & apps to be installed on a PC, but prohibits some games, such as Angry Birds and Fruit Ninja, that all would be available in paid version.

Not every app will work perfectly, but most of the apps should. Users can to push programs from their phone or tablet to the PC from a program that will be available from the Android market.

“Their first computing device is a phone,” Sharma said in a telephone interview. Indeed, BlueStacks had its idea for virtualization technology long before it had the idea to do Android on Windows. That specific implementation, Sharma said, came when one of his colleagues got back from a trip to Switzerland. On that trip, the colleague’s young daughter had played a lot of Android games. Back home, she wanted those same programs to run on the PC. With that, BlueStacks had its business model.

BlueStacks raised $7.6 million in Series A funding earlier this year from backers including Ignition Ventures, Radar Partners, Helion Ventures, Redpoint Ventures and Andreessen Horowitz. The company has slightly more than two dozen workers at its headquarters in Campbell, Calif., and at offices in India, Taiwan and Japan.

MCSE 70-297 Certification

It’s widely known that jobs regarding Information Technology (IT) are a popular choice both among college students and people looking to switch careers, because of the availability of jobs in this field and the technology hype of today’s age. However, many employers are looking for certain program certifications in the applicant’s resume become looking further for an interview. One such certification is the Microsoft Certified Professional (MCP), which includes six different types of specific certification like technology specialist, professional, IT professional, systems administrator, database administrator, and engineer. One who is interested in getting certified for any of them must go through IT training first and then take a vigorous qualification MCSE test.


Best online Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

One of the most popular tests among the six is the Microsoft Certified Systems Engineer (MCSE) test. Some call it the best known and most useful test, and various preparations are needed if you’re interested in taking it. It’s so vigorous that the company created a MCSE boot camp a few years ago, and now many more companies have followed suit and have their own intensive MCSE boot camps as well. You can find many of them as both online and in-person training, and the fee is around $4000-$6000 for two week courses. Many employers will cover the cost of this class if you stay with the company for a while after you improve yourself. If you want a less structured and less expensive method preparing for the MCSE test, computer training videos are another great way to do it. They usually cost less than $1000 for a set of CDs and books and you can watch them whenever you have the time. This way is perfect for anyone who already has a job and can not afford to take time off that job to train for another career.

However, these two ways waste time and money! You also have another option. You can have your MCSE Exam taken by proxy. These companies have a special service for professionals that are interested to save some time or money and just want to get the certification process over with quickly and without any problems.

Regardless which method of preparing for the MCSE Exam you choose, they have proven to be successful if the participants pay attention and study hard. It’s important to choose by the amount you can afford to spend, how much free time you have to do it, and which method you generally prefer. After doing the research, better pick what the best way is for you and get started!

Parallels release Windows 7 desktop upgrade

Parallels have shipped their ‘Desktop Upgrade’ tool, which is geared toward PC users who are moving from Windows XP or Vista to the latest and greatest, Windows 7. The tool, available for online order now, allows users to upgrade keeping all their applications and settings intact – painlessly.

Supporting in-place upgrades on the same PC, or helps move everything across to a new system, the software will also be available in retail outlets from 31 May internationally.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

CEO of Parallels, Serguei Beloussov, announced that the Desktop Upgrade software for Windows 7 provides “a simple and safe solution for Windows XP and Vista customers who want to successfully move to Windows 7 but may be overwhelmed by the process.”

The software entirely automates the upgrade process, so that the user need only actually answer a few simple questions before leaving the Desktop Upgrade to work its magic. Following the upgrade, the user will be pleasantly surprised to find that their old applications remain installed – and even those with compatibility issues will run under a virtual machine, so as far as the user is concerned, everything that was available previously is still present.

Additionally, Parallels provide interactive video tutorials in order to train users to work in Windows 7! The software – “Parallels Desktop Upgrade to Windows 7″ – is available at £39.95 (GBP) for the tool that upgrades on a single machine, and the price with the cable has yet to be announced.

For more information and a short product tour, visit the Parallel’s website !

Windows 7 Feature Focus: Problem Steps Recorder

Note: This article is adapted from Windows 7 Secrets Chapter 25, Troubleshooting and Recovering from Disaster. –Paul

The integrated Windows Troubleshooting tools works well in Windows 7, and they’re one of many reasons that this OS is superior to its predecessors. But sometimes you will run into an issue that isn’t covered by the built-in troubleshooters. When that happens, it’s time to escalate the issue, either with Microsoft Support or, if you’re a corporate customer, with your IT help desk. Either way, Windows 7 includes an excellent new tool that takes the guesswork out of explaining what happened when something went wrong. It’s called the Problem Steps Recorder, and it allows you to record the steps you took leading up to a problem so you can duplicate it and provide a record of what happened.

Secret: Problem Steps Recorder is hidden in Windows 7, so you have to know it exists before you can access it. To enable this tool, open the Start Menu and type problem steps in Start Menu Search. You’ll see an item called Record steps to reproduce a problem in the search results. Click that, and the minimalistic Problem Steps Recorder application appears.

Windows 7 Feature Focus: Problem Steps Recorder
Problem Steps Recorder is hidden in the Windows 7 UI and pretty subtle when it’s running too.

Here’s how it works. Click the Start Record button in Problem Steps Recorder. When you do, the application interface changes slightly, to indicate that it’s recording and provide a few additional options, including Pause Record, Stop Record, and Add Comment.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Windows 7 Feature Focus: Problem Steps Recorder
You’re on candid camera: Duplicate that bug.

Now, you step through the things you did that caused the issue you’re trying to report. Along the way, as you click on things, you’ll see an orange circle appear below the mouse pointer, indicating that Problem Steps Recorder has taken note of that step. If you get to a particularly important part, you can take a manual screen, and provide a note: Just click Add Comment and you’ll see something like the following figure.

Windows 7 Feature Focus: Problem Steps Recorder
Take a picture and leave a note if you want to explain something further.

When you’re done, click Stop Record. Problem Steps Recorder will prompt you to save a ZIP file on your desktop. Give it a name and click Save. At this point, you’re supposed to email this to the entity that’s going to provide the help. But let’s take a look inside that ZIP file to see what’s going on.

Inside the ZIP file, surprisingly, you’ll find a single MHTML document, which can be viewed with Internet Explorer. The file, an example of which can be seen in Figure 25-15, is actually pretty impressive. It includes a complete walkthrough of all the steps you took.

Windows 7 Feature Focus: Problem Steps Recorder
The Recorded Problem Steps file documents want went wrong.

But it’s even more impressive than that. Each time you clicked anything, the Problem Steps Recorder took a screenshot and highlighted what was clicked. As you can see here, this can be very specific.

Windows 7 Feature Focus: Problem Steps Recorder
Each mouse click triggers a screenshot.

Secret: Problem Steps Recorder is so helpful, in fact, that it’s not hard imagining using it as a training tool or for other kinds of documentation. Hm…

But wait, there’s more…

There’s much more going on with Windows 7’s troubleshooting and recovery features, but you’ll have to check out Windows 7 Secrets for the rest, including Windows Troubleshooting, Troubleshooting Packs, Startup Repair, Windows Recovery Environment, and System Restore. The book is available now from Amazon.com and other booksellers. Click here to find out more about Windows 7 Secrets.

Windows 7 Feature Focus: Backup and Restore

Note: This article is adapted from Windows 7 Secrets Chapter 24, Keeping Your Data Safe. –Paul

With Windows 7, Microsoft expands on the pervasive and reliable backup and restore solutions for both data files and the entire computer that it introduced in Windows Vista. Key among this functionality is Backup and Restore, which can be ued to copy your important files and folders to a safe location or create a system image that can be used later to restore a broken PC. You may never need to turn to a third-party backup and restore utility again.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Backup and Restore supports the following types of backups:

Data Backup If you think of your Documents library as the center of your data universe, and keep an elaborate series of folders and files there and in other libraries, then you?ll understand the necessity of backing up these crucial files on a regular basis. To this end, Windows 7 supports both automatic and manual data backup options, enabling you to choose which files to back up and when. You can then restore your backups at any time to recover previous versions of documents, or to replace a file you may have accidentally deleted.

System Image There?s nothing worse than discovering that you need to reinstall Windows for some reason. Not only do you have to take the time and make the effort to reinstall the operating system again, you also have to ensure that you have drivers for all your hardware, find and reinstall all the applications you use regularly, reload all your personal data, and reconfigure all of the system?s options so that it?s exactly the way you used to have it. Rather than go through this rigmarole, you can use a Windows 7 feature called System Image Backup to create what is called a system image or snapshot. This image?which is essentially a huge backup file?contains the entire contents of your PC as it existed the day you created the image. If you need to recover your entire PC, you can simply restore the system image and get right back to work.

In addition to these capabilities, Window 7 also offers a way to access previous versions of data files (called Previous Versions) and a way to return to a previous state in time, or restore point (called System Restore). These features are not part of Backup and Restore, but when you add it all up, what you have is the makings of a full-featured data recovery software suite. Amazingly, Microsoft provides all of that functionality in Windows 7, for free.

Secret: OK, there’s gotta be a catch, right? Actually, there is: Microsoft does not offer two kinds of backup that would be useful to have as part of Windows 7. The first is PC-to-PC data synchronization, or what we might called peer-to-peer (P2P) synchronization. With a such a solution you could, among other things, make sure that all of the files in your home PC’s Documents library were always duplicated, automatically, with the Documents library on your laptop; any time you made a change in either place, it would be replicated in the other. As it turns out, Microsoft does make such a tool, two in fact. They’re called Windows Live Sync and Live Mesh, respectively.

The second type of backup is online backup, where you backup files to the Internet cloud. Microsoft does have two online storage solutions, Windows Live SkyDrive, which is aimed at general online storage needs, and Office Live Workspace, which is really about document collaboration. However, neither offers any automated way, perhaps through Backup and Restore, to backup files or system images from your PC to the Internet. Maybe in Windows Live Wave 4. Or in Windows 8.

Available Backup Capabilities in Various Windows 7 Product Editions

The different product editions of Windows 7 include support for different features. These differences can be dramatic in some cases?digital media feature support is an obvious example?and subtle in others. In Windows Vista, lower-end versions lacked some of the systems?s best data and PC reliability features. Fortunately, this is no longer the case in Windows 7: Now, all Windows 7 product editions get Backup and Restore (with file and system image backup capabilities), Previous Versions, and System Restore. The only exception is network-based backups: Only Windows 7 Professional, Enterprise, and Ultimate support that capability.

As a reminder, the following table outlines the Backup and Restore technologies that are available in each mainstream Windows 7 product edition. You can find the complete list of Windows 7 features in my article, Windows 7 Product Editions: A Comparison.

Starter     Home Premium     Professional     Enterprise & Ultimate
Windows Backup     Yes     Yes     Yes     Yes
System image     Yes     Yes     Yes     Yes
Backup to network                 Yes     Yes

One Tool to Rule Them All: Using Backup and Restore

Although various data recovery tools are available scattered through the Windows 7 user interface, a single interface?Backup and Restore?provides a handy front end to most of them. Shown in the following figure, this application helps you backup and restore files on your PC, create and restore complete system image backups as well, and access the System Restore recovery utility.

Windows 7 Feature Focus: Backup and Restore
It?s a one-stop shop for all your data protection needs.

Tip: This interface was called Backup and Restore Center in Windows Vista.

Because Backup and Restore basically sits in front of most of the other data recovery functions included in Windows 7, we will use this as the obvious starting point for the data and system backup and restore features discussed here.

Tip: Backup and Restore can be found in the Start Menu under All Programs, Maintenance, but the easiest way to find this application, as always, is Start Menu Search: Type backup and press Enter.

Backing Up Documents, Pictures, and Other Data

If you want to create a data backup, you can use Windows Backup, which is available from Backup and Restore. To do so, launch Backup and Restore and click the Set up backup link. This launches Windows Backup’s Setup up backup wizard, as shown here:

Windows 7 Feature Focus: Backup and Restore
Windows Backup helps you manually create a backup of your important data files.

In the first step of the wizard, you must choose a location to store the backup. You can save a backup to an internal or external hard disk or other storage device, a recordable optical disk (typically a writeable CD or DVD), or a network share. (Network backup is not available in Windows 7 Starter, Home Basic, or Home Premium, however.) The amount of space you need, of course, depends on the amount of data you are backing up. The wizard autoselects the local storage offering the most free space, but you can change this selection, of course.

Tip: Microsoft does not allow you to back up to the disk or partition you are backing up. That is, if you are backing up data from the C: drive, you cannot save the backup to the C: drive.

In the second step, you have two choices: Let Windows choose (recommended) and Let me choose. If you choose the former, Windows Backup will automatically backup data files saved in libraries, on the desktop, and in any folders founder in your user folder. (Windows Backup will also create a system image if you choose this option, and then automatically make periodic backups on a schedule going forward.)

Windows 7 Feature Focus: Backup and Restore
Here, it really is best to let Windows choose.

If you choose Let me choose, Windows Backup will present an expandable view of your file system. From this interface, you can pick and choose exactly what to backup. You can also optionally cause a system image to be made with this type of backup.

Windows 7 Feature Focus: Backup and Restore
If you have specific backup needs, you can micro-manage Windows Backup as well.

In the next step, review what you’ve chosen. This step is important because you can change the schedule on which Windows Backup backs up your data going forward. Click the Change schedule link to change the default, which is to make a backup every Sunday night at 7:00 pm.

Windows 7 Feature Focus: Backup and Restore
This is your last chance to adjust settings before the first backup is created.

Click Save settings and run backup to start the backup and establish a backup schedule going forward. As the backup begins, Backup and Restore displays its progress.

Windows 7 Feature Focus: Backup and Restore
You can monitor the backup progress or get on with other work.

Tip: If you set up an automatic backup schedule now, Windows 7 will monitor your PC usage and prompt you to perform occasional full backups over time as well.

As the backup runs, the Action Center icon in the notification area of the taskbar changes, adding a small black clock. If you click this icon, you’ll see the message shown below: A backup is in progress. This message will occur in the future, when Windows Backup runs in the background.

Windows 7 Feature Focus: Backup and Restore
Backups trigger a change in the Action Center notification icon.

Tip: You can create multiple automatic data backup schedules if you want. For example, you may want to back up different drives or data file types at different times or with different regularity.

Managing Data Backups

Once you have created your first data backup, a few things change. First, Backup and Restore indicates that you?ve configured a backup location and notes when the last and next backups occur. You can also change the automatic backup settings and restore all of the files for the current user.

Windows 7 Feature Focus: Backup and Restore
Backup and Restore reflects the recent backup.

You can also manage the disk space used on your backup device. When you click the Manage space link in Backup and Restore, the Manage Windows Backup disk space window will occur, displaying information about the currently selected backup device. As you can see in the figure below, you can browse the file system of the backup location, view backups stored on that device, and change settings associated with system image backups.

Windows 7 Feature Focus: Backup and Restore
From this simple interface, you can manage details associated with your backup device and the backups stored on it.

If you do click View backups, you can’t actually navigate around inside of the backups you have made so far. Instead, you’re provided with the window shown below. From here, you can view the backups and delete them, but not get into them in any meaningful way.

Windows 7 Feature Focus: Backup and Restore
Only the simplest of backup management choices are available.

Tip: Want to see what’s in a backup? You can do it, but not from this interface. Instead, go back to the previous window and click Browse. This will open Windows Explorer, pointing at the location of your backup. At this location, you will see a special folder with a Windows Backup icon and the name of your PC. If you try to double-click this folder, a Windows Backup window will appear. Instead, right-click the folder and choose Open. Then, click Continue in the permission folder that appears. You’ll be presented with a folder structure representing your various backups. Inside of each of these folders? A number of standard ZIP files (shown below). Worse comes to worse and you lose everything, at least these files will always be accessible.

Windows 7 Feature Focus: Backup and Restore
Windows Backup uses regular ZIP files under the covers to backup your data.
Restoring Files

Backup and Restore can also be used to restore files you have previously backed up. There are three general file restore methods.

Restore my files. Restore your own files and folders.

Restore all users’ files. Restore your own files and folders as well as those of other users.

Select another backup to restore files from. Perform more advanced restoration tasks, such as restoring files from a different PC.

These all work similarly. You can follow these steps to trigger a restore of your own data:

1. Open Backup and Restore and click the Restore my files button.

2. The Restore Files window appears.

Windows 7 Feature Focus: Backup and Restore
Restore Files lets you find the files you’d like to restore.

From here, you have three options:

Search. If you know exactly what you’re looking for, and only need one or a handful of files, you can use the Search button to Search your existing backup sets.

Browse for files. If you’d like to manually browse around the backup set to find a file or any number of individual files, click Browse for files. You’ll be presented with a modified File Open dialog, from which you can browse the various backups you’ve created, diving into the full backup or just the files in your user account.

Windows 7 Feature Focus: Backup and Restore
With either Browse for files or Browser for folders, you can dig in and route around inside the backup set.

Browse for folders. To recover entire folders full of files (and other folders).

Whichever method you choose, you can mark files and folder for restoration as you go and then continue looking for more.

3. When you’re ready to go, click the Next button in the Restore Files window. Windows Backup will prompt you to decide where you want to restore the files to; either to their original locations or to a different location.

Windows 7 Feature Focus: Backup and Restore
While you will often want to simply restore to the original location, sometimes it’s a good idea to see what’s in the backup before overwriting your files.

Choose one and then click Restore. Windows Backup will begin restoring your files. If there any of the backup files will overwrite an existing file, you’ll see the normal File Copy window shown below, which offers you a chance to overwrite, copy but keep both files, or don’t copy.

Windows 7 Feature Focus: Backup and Restore
Make sure you don’t wipe out anything important while restoring files.

When the restore is complete, Windows Backup will let you know that the files have been restored and give you an opportunity to view a list of restored files.
Backing Up the Entire PC: System Image

Backing up and restoring data files is important and should occur on a regular basis; but over the past few years, a new type of backup utility that backs up entire PC systems using system images has become quite popular. These types of backups protect against a hardware disaster: If your hard drive completely fails, for example, you can purchase a new drive and use the system image to restore the PC to its previous state.

System imaging utilities aren?t actually all that new; corporations have been using them for years. But now that consumer-oriented system-imaging utilities have gained in popularity, Microsoft has created its own version, which it includes with Windows 7.

Secret: The system image utility was called Windows Complete PC Backup in Windows Vista.

Secret: System imaging utilities typically compress the data on your hard drives so that the image file takes up a lot less space than the original installation. Various solutions use different compression schemes, but you may be interested to know that Windows 7 uses the tried-and-true Virtual Hard Disk (VHD) format that Microsoft also uses in Windows Virtual PC and its server-based Hyper-V virtualization solutions. That means system images created with Windows 7 will be supported for a long time to come.

Caution: System images contain complete PC environments. You can?t arbitrarily restore only parts of a system image, as you can with data backups. Instead, when you restore a system image, it restores the entire PC and overwrites any existing operating system you may already have on there. That means you should be careful before restoring a system image: Any data you have on the disk will be overwritten. Of course, you?re using automatic backups, too, right?

To create a system image, launch Backup and Restore and click the Create a system image link on the left. This launches the Create a system image wizard, shown below, which walks you through the steps needed to completely back up your PC system. You can save system images to hard disks or optical storage (such as recordable CDs or DVDs), as well as network locations (Windows 7 Professional, Enterprise, or Ultimate only). However, network-based system images cannot be securely protected, as hard drive- and optical disc-based backups can.

Windows 7 Feature Focus: Backup and Restore
System image is one of the best features in Windows 7.

Secret: You can only write a system image to a hard disk that is formatted with the NTFS file system. That?s because system images often exceed the 4GB file size limit imposed by the older and less reliable FAT32 file system.

Click Next. The wizard will give you a chance to confirm the backup settings and remind you which partitions are being imaged. It will also provide an estimate of the amount of space needed to create a system image. The required storage space varies according to the size and usage of the hard disk on your PC.

Windows 7 Feature Focus: Backup and Restore
System image is ready to go.

Click Start backup to begin the system image process.

Secret: Two file system locations must be included in the system image?what Microsoft refers to as the boot partition and the system partition. The boot partition is always C:\, whereas the system partition is the drive with the Windows 7 Windows directory. This is typically C:, but if you installed Windows 7 in a dual-boot setup with a previous Windows version, the system partition might be in a different location. If you have other drives or partitions, you can optionally choose to include them in the system image as well.

As the image is created, Windows Backup will provide an ongoing progress indicator.

Windows 7 Feature Focus: Backup and Restore
Though complete PC backups are huge, they are compressed and therefore much smaller than the actual disk to which you are backing.

This process could take some time, especially on a heavily used PC. When it’s done, Windows Backup will prompt you to create a system repair disc. You should do so: While Windows 7 does install recovery files directly into the boot partition, in some cases, these files will not boot the PC. If that happens, you can use the system repair disc to boot your PC, a requirement for restoring the entire PC with the system image (as we’ll see in the next section).

Windows 7 Feature Focus: Backup and Restore
If you don’t have one already, be sure to create a system repair disc.

Secret: You can use any writeable CD or DVD for a system repair disc.

Secret: If you have both 32-bit and 64-bit versions of Windows 7 on different PCs, you cannot use the same system repair disc for each. Instead, you must create separate system repair discs for 32-bit and 64-bit systems.

Restoring the Entire PC

If a catastrophic hardware or software failure has rendered your computer untenable, and you simply want to return to a known-good system backup, you can use one of the system images you’ve previously created to do so. Note, however, that you will typically need to boot your PC into the Windows Recovery Environment to make this happen, either using the boot files on your PC or the system repair disc that you previously created. Note, too, that restoring your PC in this fashion will wipe out all of the data and settings changes you’ve made since the last system image. So this should not be undertaken lightly.

Follow these steps to restore your entire PC using a system image:

1. Reboot the computer.

2. If you are using a system repair disc, boot the PC with that. Otherwise, after your PC has finished its BIOS sequence, hold down the F8 key. Choose Repair Your Computer from the Advanced Boot Options screen (below) and tap Enter.

Windows 7 Feature Focus: Backup and Restore
Choose the top option to restore your entire PC.

3. After the loading files screen, choose the correct language and keyboard input method and then click Next.

4. If you booted from the hard drive, you will need to choose System Image Recovery from the System Recovery Options window that appears. Otherwise, System Recovery will examine the hard drives attached to your PC and look for Windows installs. When it’s done, it will list the install(s) it found and give you the opportunity to use Windows 7’s built-in recovery tools to fix problems with Windows (which we cover in Chapter 24) or you can restore your PC to an earlier time using a system image. Choose that latter option and click Next.

5. The Re-image your computer wizard begins. In the first phase of this wizard, you choose the latest image available (the default) or you can select a different system image. When you’ve chosen, click Next.

Windows 7 Feature Focus: Backup and Restore
This wizard will step you through the process of restoring your PC with a system image.

6. In the next step, you can choose to format the PC’s hard drive and repartition disks (as Windows 7 Setup would do) to match the layout of the system image. Generally speaking, you should enable this option. Click Next to continue.

7. In the final phase of the wizard, you can verify what you’re doing and click Finish to continue. Note that restoring an entire PC from a system image can be a time consuming process.
But wait, there’s more…

There’s much more going on with Windows 7’s data protection features, but you’ll have to check out Windows 7 Secrets for the rest, including the Windows Recovery Environment, Previous Versions, and System Restore. (We also cover Live Mesh and Windows Live SkyDrive, too.) The book is available now from Amazon.com and other booksellers. Click here to find out more about Windows 7 Secrets.

Internet Explorer Feature Focus Download Manager

While Internet Explorer’s rivals have had download managers for years, users of the Microsoft browser have had to suffer along with a more limited and less useful downloading capability. Until now, that is: With Internet Explorer 9, Microsoft is finally adding a download manager to the dominant web browser line. And while they may be late to the game, IE 9’s download manager is, as you might expect, quite a bit more capable than those of its rivals.


Best Microsoft MCTS Training – Microsoft MCITP Training at
Certkingdom.com

On the surface, the IE 9 download manager works much like similar features in other browsers. When you trigger a download, the IE 9 notification bar appears, asking you if you’d like to run or save the file, much like previous IE versions. But while there are prominent Run and Save buttons (as well as Cancel), the Save button has an ancillary drop-down that lets you choose between Save, Save as, and Save and run.

If you do choose to download the file, a View downloads button will appear, giving you access to the download manager. (You can also trigger this view by clicking Tools and then Download manager or with the CTRL + J.)

The download manager window provides a handy central location for viewing and tracking your downloads. Each entry in the list provides a location link, so you can jump directly to the folder in question, a Run or Open/Open with button so you can access the individual files, and a Remove (“X”) button so you can remove that file from the list.

Secret: If you mouse over the an item that is still downloading you can find out the transfer speed:

You can also clear the entire list and access a very simple Options window that lets you set the default download location.

OK, so most of that is likely familiar to you, if you’ve used other browsers. Where the IE 9 download manager improves on that basic design is through its integration with the IE security features, the SmartScreen Filter and a new SmartScreen download reputation service.

The SmartScreen Filter debuted in IE 8, providing users of that browser with integrated protection against electronic threats. In IE 9, the SmartScreen Filter works with the download manager, and the new download reputation service, to provide similar protections against threats from downloaded files. It checks the reputation service, scans downloads for viruses, and verifies the source of the download.

“Downloads are attack vectors,” Microsoft general manager Dean Hachamovitch told me. “The question is, are you getting real stuff or are you getting malware? This is handled generically in other browsers , which leave answering these questions up to the user.”

According to Hachamovitch, he talked to the guys at Microsoft behind IE’s phishing filter and SmartScreen features and asked them about the best way to handle download manager security. “They told me we needed application reputation. Each time the browser goes to download a file, it should be able to query a database and ask, is this a commonly downloaded thing like iTunes? Is it signed? Who signed it? Are they OK?

“This is an early warning system for malware,” Hachamovitch said. “Of the stuff that people download that has no reputation data, about 30 to 40 percent is malware. You need an early warning system.”

Note: IE 9’s reputation checking is running in silent mode during the beta and will be enabled (during the beta) when Microsoft feels it has enough data to make accurate download decisions. This update will not require users to download any code or update the browser explicitly.
Final thoughts

The Internet Explorer download manager was a long time coming, but Microsoft’s decision to bolster this functionality with important security features was a good one. Worth the wait? Absolutely. And if you’ve been pining for a true download manager, IE 9 won’t force you to switch browsers or download and maintain a separate add-on.

Internet Explorer Feature Focus One Box

Like other browsers, Internet Explorer 9 dispenses with the traditionally separate address bar and search box, replacing both with a single control that Microsoft calls the One Box. The IE 9 One Box, shown below, provides a single place for getting started, whether that means navigating to a particular site or searching for a site, term, or phrase.


IE 9 One Box

While other browser makers may have beaten Microsoft to market with a single, all-in-one address bar, IE 9 goes further than the competition in many ways. Key among these is keystroke privacy, which is enabled by default. In other browsers, each keystroke you type is sent automatically to the configured search provider. But in IE 9, this is not the case: Keystrokes are not sent to the search provider unless you explicitly enable this functionality. (Doing so provides support for search suggestions, which are described below.)


Best Microsoft MCTS Training – Microsoft MCITP Training at
Certkingdom.com

Navigate
For the most part, navigation in the IE 9 One Box works as it did with the address bar in older IE versions. That is, you can select the control (ALT + D, or CTRL + L), type in a URL (with or without http://,www, or a site extension) and browse the web normally. According to Microsoft, One Box will evaluate single words to determine if they represent a valid URL (“apple” for www.apple.com, for example, or “microsoft” for www.microsoft.com). If they do, it will load that site. (During the beta, this functionality does not appear to work correctly, however, loading instead the search provider’s results page.)

Inline autocomplete

As you type in the One Box, IE 9 provides inline autocomplete functionality so that you can quickly get to the sites you want after typing only a few letters. IE 9 anticipates your needs by autocompleting with popular web sites, and also with items from your Favorites and history. And if your search provider supports it, you can type in common terms like “news” or “music” to navigate quickly to the site you prefer.


IE 9 One Box Search

In previous versions of IE, you would need to select the dedicated Search box to search the web from the browser. But now you can do so from the One Box, by typing in a search term instead of a URL. For example, if you want to see a weather report, you could type “Seattle weather” (or whatever; no quotes) and tap ENTER, instead of manually navigating to weather.com or whatever site you might use.


IE 9 One Box Switch search providers

You can also switch search providers on the fly, and choose between Google, Yahoo!, Bing, and whatever other providers you like. So if you don’t see the results you want on one, you can easily try another. Search providers are accessed from the One Box drop down that appears as you type. Or, you can click and drag down on the One Box to display this drop down and select a new provider.

IE 9 One Box Use search suggestions
If you enable search suggestions, One Box will display search suggestions as you type directly in the drop down that appears. So as you type “Seattle weather” you’ll get the forecast inline, without having to display the search results page.


IE 9 One Box

These search suggestions are often very visual as well. So if you search for a product, place, or other thing, you will often see pictures inline in the drop down.

IE 9 One Box Corporate search
PCs that are connected to a corporate domain can use the IE 9 One Box to quickly find intranet sites using single words with a forward slash. So if you have an internal web site at http://vail, you can get there by typing vail/ in the IE 9 One Box. That’s because the single word vail, without the slash, would trigger a search.

Access browsing history and Favorites
To access your recent browsing history and Favorites directly from One Box, just click, hold, and drag down on the One Box control, or click the little down arrow at its far right.


IE 9 One Box Pin a web site

You can also pin a web site to the Windows 7 taskbar by dragging its web site icon from the One Box to the taskbar. This process is described in my Pinned Web Sites feature focus.

Go to Top