Cheat-test.com 70-272 Free Exam Questions:
NO 103:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and Microsoft Office XP.
A user reports that when she runs the Spelling and Grammar... utility on a
Microsoft Word document, the French dictionary is used. English is the language of the document, so she wants to use the English dictionary when checking her
document.
You need to ensure that the user can use the English dictionary when running the
Spelling and Grammar... utility.
What should you instruct the user to do?
A. In Word, set the Spelling and Grammar language to English.
B. In Regional Options in Control Panel, choose English as the default language.
C. In Word, clear the Allow accented uppercase in French check box in the Edit options.
D. In Regional Options in Control Panel, add United States - International under
Keyboard Layout /IME in the Input Locals options.
Answer: B
Explanation: Word takes these settings from the Regional and Language options. Changing these back to English will resolve the problem.
Incorrect Answers:
A. This is also a possible answer. In Word the following command would set the preferred language: Tools->Language->Set Language.
C. Changing the allow accented uppercase in French will not change the language. It will simply not display the uppercase accented words.
D. Changing the keyboard layout will not change the default language. It will only
change what each keypress does. For example, using a Polish keyboard, the "z" will display a "w" and vice verse. In English, a "z" displays a "z". The language does not change; only what character is displayed when a particular key is pressed.
NO 104:
You are a desktop support technician for XXYYInc.
A customer running Windows XP Home Edition and Microsoft Outlook Express reports that he cannot compose an e-mail message by using the Korean character
set. You verify that the computer has the Korean language pack installed. However,
he still cannot type Korean characters.
You need to ensure that the customer can type Korean characters. What should you instruct the customer to do?
A. Reinstall the Korean language pack.
B. Download a Korean version of Outlook Express.
C. Select Auto Encoding from the View menu in Outlook Express.
D. In Regional Options in Control Panel, select the input locale that relates to the regional settings.
Answer: D
Explanation: This answer is much like one below relating to a foreign language. Understand that Windows gets its settings for languages from the Region and Language Settings in the Control Panel. Changing to Korean in the Region and Language Settings will enable him to enter in Korean.
Incorrect Answers:
A. The Korean Pack is probably correctly installed. This would not be the first thing to check, and certainly not the best answer. Any time answers are presented that prompt you
to reinstall, look at them with extreme caution.
B. There is no need to download the Korean version of Outlook Express. The question states that the user needs to type in Korean. It does not make any mention of needing the menus and buttons to be in Korean.
C. Auto Encoding will allow the display of foreign language characters from incoming messages on the screen It will not, however change what the user types from standard
text into Korean.
NO 105:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. All users use Microsoft Internet Explorer as their Web browser.
A user reports that she recently made several changes in Internet Explorer. Now, every Web site she visits displays Web page text in Times New Roman font. The
user wants Internet Explorer to display text by using its default configuration-
You need to ensure that Internet Explorer displays text on Web pages by using its default configuration.
What should you instruct the user to do?
A. Click the Restore Defaults button on the Advanced tab in Internet Options in Control
Panel.
B. Click the Reset Web Settings button on the Programs tab in Internet Options in
Control Panel.
C. Clear the Ignore font Styles specified on Web pages check box in Internet Options in
Control Panel.
D. On the View menu in Internet Explorer, point to Encoding and select Unicode
(UTF-8).
Answer: C
Explanation: Clearing this checkbox will enable web pages to use the fonts that were originally intended. With this box checked, all fonts are replaced with Times New Roman by default.
Incorrect Answers:
A. Restoring defaults under the Advanced tab will not resolve the problem. The issue is that all the fonts are being replaced. There is no setting under Advanced that will change
this. This must be done under Internet Options in Control Panel.
B. Resetting the web settings will not change the fonts. It will reset what application
opens when a particular action is performed. For example, what program opens when a news link is encountered, a particular news reader opens, or when a web page is selected
for editing, what program will open to edit the document.
D. There is no need to change the encoding type. UTF-8 is a common and accepted standard. Even if this were changed, it would not cause the fonts to be replaced with Times New Roman.
NO 106:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and Microsoft Office XP.
A user reports that when he opens a Microsoft Word document, Word does not display a toolbar that contains the Insert Comment button.
You need to ensure that the appropriate toolbar is displayed when the user runs
Word on his computer.
What should you instruct the user to do?
A. Select Detect and Repair... from the Help menu.
B. Right-click one of the existing toolbars and select Reviewing from the context menu.
C. Copy a Normal.dot file from another computer to the My Documents folder on the user's computer.
D. Open a document that was created by another user. Select Shared Workspace from the
Tools menu.
Answer: B
Explanation: The Insert Comment button appears on the Reviewing Toolbar. Simply enabling this toolbar will show this button. To enable the toolbar, right click any open spot in
the toolbar area. From the dropdown list, click Reviewing. Incorrect Answers:
A. There is no need to do a Detect and Repair. Word is functioning as it should. The toolbar is simply not being displayed. Don't get fooled into thinking that the "new feature" of Office is always the right answer. This should be a last resort-type option, only to be tried when the simple solutions do not work.
C. Normal.dot contains all information used to start a blank document in Word. It contains things like what is the default font, font size, color, etc. It does not contain information about the toolbars.
D. The Shared Workspace will not resolve the situation. It is designed to allow users to collaborate. Even though another user created the document, it is being edited on this workstation, and as such will get this workstation's environment; including the toolbars. Since the toolbar is not displayed when the user works alone, it will not display in a collaborative environment, either.
NO 107:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional and Microsoft Office XP. A user travels with a portable computer. The user is required to encrypt all company data that is stored on the portable computer.
The user reports that she has to view the properties of each file to find out whether a file is encrypted or unencrypted.
You need to ensure that the user can distinguish encrypted files from unencrypted files without viewing the files' properties.
What should you instruct the user to do?
A. Ensure that the files are compressed.
B. Ensure that the files are not compressed.
C. Set the folder options to show encrypted files in color.
D. Set the folder options to show protected operating system files.
Answer: C
Explanation: Users must be able to distinguish between encrypted and unencrypted
files. The only way to do this is to have the encrypted files shown in color. Encryption is the process of protecting files by making the files unreadable unless a key is provided. Compressing removes the "white space" in files; making them smaller on the hard drive
but not altering any data.
Incorrect Answers:
A. Ensuring the files are compressed won't make any difference to encryption settings. These are two different attributes. Do not confuse the two.
B. Incorrect for the same reason as "A". Compression has no bearing on Encryption.
D. Showing protected operating system folders will have no effect on how encrypted files are shown. This setting will show files that are used by the OS, but not on files that the
user creates and wants to keep other users from viewing.
NO 108:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and an application named App1.
A user reports that whenever she attempts to open a file for App1, she is directed to the C:\Program Files folder, not to her home directory. You discover that the user
runs App1 by clicking a shortcut on her desktop.
You need to ensure that the user is directed to her home directory when she opens a file for App1.
What should you do?
A. Alter the target path for the My Documents folder.
B. Alter the Target setting for the shortcut properties.
C. Alter the Start in setting for the shortcut properties.
D. Alter the PATH system variable to include the home directory.
Answer: C
Explanation: She is directed to the C:/program files folder not her home directory like she should be.
NO 109:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and Microsoft Office XP.
A user reports that when he attempts to access a shortcut to a Microsoft Access file
on his desktop, he receives the following error message: "File missing or not available".
You verify that the user can access e-mail and the Internet. The Access file is shared
on a file server on the network, and you can access the file with no problem. What is the most likely cause of the error?
A. The user's network connection is faulty.
B. The user's shortcut is mapped to the incorrect network location.
C. The user does not have the latest Office updates on his computer.
D. The user does not have permission to read and execute on the network folder.
Answer: B
Explanation: The error message indicates that the file is not in the location that the shortcut refers to. The file has probably been moved or deleted.
NO 110:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and Microsoft Office XP.
A user reports that she cannot share a printer. You discover that the user is trying
to share the printer that is attached to a USB port on her computer. You also discover that she logs on to the computer by using a domain user account.
You need to ensure that the user can share the printer. What should you do?
A. Instruct the user to attach the printer to a parallel port.
B. Instruct the user to configure Windows Explorer so that simple file sharing is enabled.
C. Add the user's domain user account to the local Users group on her computer.
D. Add the user's domain user account to the local Power Users group on her computer.
Answer: D
Explanation: Must be added to the local Power Users group to be able to add a printer to the computer. Local users group doesn't have enough rights.
NO 111:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. One of your users complains that his desktop
at home sometimes will turn on by itself at midnight. Which of the following is the likely cause (choose all that apply).
A. the wake-on-LAN feature has been enabled
B. the wake-on-LAN feature has been disabled
C. the UPS has been set to always on
D. the UPS has been set to always off
E. you have an outdated BIOS
Answer: A
Explanation: Some broadband Internet providers periodically probe your computer to see whether it's still connected. If your network interface card is configured to wake the computer, one of these probes will do it. If you don't want to disable the
wake-on-LAN feature, you can ensure that probes from your Internet connection
don't rouse your computer by turning off the computer's power completely.
NO 112:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. Your desktop uses APM for power
management. Sometimes it fails to come out of standby. What should you do?
A. check the time-out settings in your BIOS Setup program.
B. update your BIOS.
C. disable APM in Windows XP Professional
D. disable APM in the BIOS
E. None of the above.
Answer: A
Explanation: If your computer uses APM for power management and sometimes fails to come out of standby, check the time-out settings in your BIOS Setup program. If these thresholds are lower than the ones set in the Power Options
Properties dialog box, you might sometimes be unable to emerge from standby. To resolve the problem, set the BIOS time-out settings to their maximum values.
NO 113:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. One of your users complain that his desktop at home sometimes will be turned on by itself at midnite. Which of the following is the likely cause (choose all that apply).
A. the wake-on-LAN feature has been enabled
B. the wake-on-LAN feature has been disabled
C. the UPS has been set to always on
D. the UPS has been set to always off
E. you have an outdated BIOS
Answer: A
Explanation: Some broadband Internet providers periodically probe your computer
to see whether it's still connected. If your network interface card is configured to wake the computer, one of these probes will do it. If you don't want to disable the
wake-on-LAN feature, you can ensure that probes from your Internet connection
don't rouse your computer by turning off the computer's power completely.
NO 114:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional. Users store files on drive D: of their computer and back
up files daily to a network file server.
A user reports that he is having trouble moving files from one folder to another. You discover that he is attempting to move files from a child folder to a parent
folder. When he double-clicks the parent folder to view its contents, the child folder appears instead. The only way he can move the files is to open two instances of My Computer.
You need to ensure that the user can open multiple folders from one instance of My
Computer.
What should you instruct the user to do?
A. Select the Simple File Sharing check box.
B. Select the Open each folder in its own window radio button.
C. Select the Launch folder windows in a separate process check box.
D. Select the Display simple folder view in Explorer's Folders list check box.
Answer: B
Explanation: The problem here is that the browser is reusing the folders to show subfolders. Enabling this setting from Tools -> Folder Options -> View -> Open each folder in its own windowwill allow the folder to open a new window when double clicked.
Incorrect Answers:
A. Simple File Sharing allows users to share files without having to worry about ACL's
(Access Control Lists). It has nothing to do with how a folder is displayed.
C. There is no such checkbox as "Launch folder windows in a separate process". The closest match to this would be to launch each application in its own space, but this has
not been used since Windows NT. This answer tests knowledge of the options available.
D. This answer is incorrect for the same reason as "A". How folders are shared has no bearing on what happens when a folder is double clicked.
NO 115:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. Your company uses a third-party virtual private network (VPN) device that is not configured to accept IPSec VPN connections.
A user reports that every time she attempts to remotely connect to the company network, she receives the following error message.

You discover that she used the New Connection Wizard on her computer to create a VPN connection to the new company network. The user then changed some of the VPN connections settings.
You need to ensure that the user can always establish a VPN connection to the company's VPN device.
What should you do?
A. Instruct the user to select PPTP VPN as the type of VPN on the VPN connection properties page.
B. Instruct the user to select the Use preshared key for authentication check box in the
IPSec settings on the VPN connection properties page.
C. Ask an administrator to create additional PPTP ports on the VPN device.
D. Ask an administrator to install a computer certificate from your company's certification authority (CA) on the VPN device.
Answer: A
Explanation: IPSec is not used, so L2TP connections should not be used either. Instead reconfigure to use PPTP VPN.
NO 116:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. All client computers are joined to an Active Directory domain.
A user reports that he used the New Connection Wizard on his portable computer
to create a virtual private network (VPN). When he attempts to establish a VPN
connection to the company VPN server, he receives the following error message:

The user states that he did not change any of the default settings for the VPN
connection. No other users report problems connecting the VPN server by using the
default VPN connection settings. You verify that this user's computer is connected
to the Internet before he attempts to establish a VPN connection.
You need to ensure that the user can establish a VPN connection to the company
VPN server.
What should you do?
A. Instruct the user to enter the IP address of the company VPN server in the VPN
connection properties page.
B. Instruct the user to select the Include Windows logon domains check box on the VPN
connection properties page.
C. Ask an administrator to select the Allow access option button for the dial-up permissions on the user's user account.
D. Ask an administrator to configure the logon hours for the user's account to allow him
to log on seven days per week, twenty-four hours per day.
Answer: B
Explanation: Confirmed the error on the knowledge base pages with MS.
NO 117:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. You configure one dial-up connection on a user's portable computer. You test the dial-up connection and verify that it successfully establishes a connection to the Internet.
One day later, the user reports that the modem on his portable computer will not
dial. You verify that the user is using Microsoft Internet Explorer to connect to the
Internet.
You need to ensure that Internet Explorer on the user's computer automatically establishes a connection to the Internet.
What should you instruct the user to do in Internet Options in Control Panel?
A. Configure the LAN settings to automatically detect settings.
B. Configure the connection settings to always dial the default connection.
C. Configure the dial-up connection settings to automatically detect settings.
D. Configure the dial-up settings to enter the address and port numbers of your company's proxy server.
Answer: B
Explanation: We only have one dial-up connection so this will be the default connection. We can configure the connection settings to always dial the default connection so the modem will dial up whenever the user attempts to access an internet resource.
NO 118:
You are a desktop support technician at XXYYInc.com. All client computers run
Windows XP Professional and are configured as DHCP clients.
A user reports that her portable computer is not able to access any Web sites now
that she is in the main office. You discover that the computer was able to access all
Web sites this morning while at the branch office.
You verify that the computer is properly connected to the network and that it can ping its loopback address. You discover that the computer is unable to ping any Web site by using the IP address.
You need to ensure that the computer can access Web sites. What should you do first?
A. Run the netsh command from a command prompt window.
B. Run the ipconfig /renew command from a command prompt window.
C. Modify the default gateway in the user's network configuration.
D. Modify the DNS server IP address in the user's network configuration.
Answer: B
Explanation:
The computer has a active lease on the IP address offered from the
DHCP at the branch office. To release and request a new IP address you type ipconfig /renew.
NO 119:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. Your user desktop is connected to the internet through a DSL line directly. To protect this desktop, which of the following should
you deploy?
A. ICF
B. ICS
C. ARS
D. ASR
Answer: A
Explanation: Internet Connection Firewall (ICF. is a software component that
blocks unsolicited traffic from the Internet. It does this by monitoring all inbound and outbound communication involving the computers it protects.
NO 120:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional. The company has a main office and a branch office. The branch office is connected to the Internet by a persistent cable modem connection.
A user at the branch office reports that she is unable to find the log generated by Internet Connection Firewall (ICF) on a computer named Client1. You discover that Client1 is configured to have ICF log all dropped packets.
You need to ensure that the user can find the log generated by ICF on Client1. What should you instruct the user to do?
A. View the security.log file.
B. View the pfirewall.log file.
C. View the system log in Event Viewer.
D. View the application log in Event Viewer.
Answer: B
Explanation: If you search the help on your local computer for ICF. Then view security log file you will see pfirewall.log file. This is the default name for the firewall.log, which is
located in the Windows folder.
NO 121:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. Your user desktop is connected to the internet through a DSL line directly. To protect this desktop, you configure the connection firewall to log dropped packets. What format does this log use?
A. W3C
B. W3C Extended
C. BIN
D. ISC2
Answer: B
Explanation: The log uses the W3C Extended Log format, a standard logging format that allows you to analyze data using third-party utilities. To understand what the columns mean, look at the column headers in line 4.
NO 122:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the
mainstream OS deployed. Your major duty is to assist in the configuration and
maintenance of desktop applications. On your desktop you have enabled ICF. After that your small web service no longer works according to the users who are
expected to view your pages. What should you do?
A. Configure ICF to allow incoming web traffic
B. Configure ICF to allow outgoing web traffic
C. Configure the TCP/IP filter to explicitly allow port 80 traffic
D. Install IIS on your desktop
Answer: A
Explanation: By default, ICF blocks all unsolicited incoming data packets. If you
run a Web, FTP, or Telnet site, or if you want to enable contact from the outside on some particular TCP port, you need to take some additional setup steps. To enable a service, such as HTTP Web Server, click the Services tab in the Advanced Settings dialog box.
NO 123:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. On your desktop you have enabled ICF. After
that no one from outside the internal network can ping your desktop. What should you do?
A. Configure the relevant ICF settings
B. Map the ICMP port to the LAN interface
C. Release and renew your DHCP configuration
D. Check your network connection and retry
Answer: A
Explanation: Error correction and diagnostic commands, such as Ping and Tracert, use Internet Control Message Protocol (ICMP. rather than TCP or UDP. These functions are also disabled by default on an ICF-protected network. To enable
them, click the ICMP tab of the Advanced Settings dialog box.
NO 124:
You are the desktop application support specialist for XXYYInc.com. XXYYInc.com uses a variety of windows computers. Windows XP Professional is one of the mainstream OS deployed. Your major duty is to assist in the configuration and maintenance of desktop applications. You enabled ICF on your computer. What
ICF setting allows you to inspect outgoing traffic?
A. Configure the relevant ICF settings
B. Map the outgoing traffic port to the LAN interface
C. Release and renew your DHCP configuration
D. Check your network connection and retry
E. There is nothing you can do about it with ICF.
Answer: E
Explanation: ICF is concerned only with blocking unwanted inbound traffic. However, some viruses and Trojan horses do their mischief by lodging themselves
on your system, reading your address books, and then using your computer to launch attacks.
NO 125:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. All users use Microsoft Internet Explorer as their Web browser.
A user reports that when she tries to purchase an airline ticket online, she receives the following error message: "Cannot load the page, please contact your system administrator".
You discover that she can access other sites without receiving the error message. What is the most likely cause of the error?
A. The network connection is faulty.
B. The TCP/IP stack has been corrupted.
C. Port 80 (HTTP) on the firewall is disabled.
D. Port 443 (HTTPS) on the firewall is disabled.
Answer: D
Explanation: He is on a secure web site purchasing airplane tickets. Thus port 443 (https) closed on the firewall.
NO 126:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional. The company has a main office and a branch office. Each computer in the branch office has a static IP address.
A user at the branch office uses the New Connection Wizard to create a broadband connection to the Internet. The connection requires a user name and password. The user enables Internet Connection Sharing (ICS) on the Internet connection. The
user tests the connection and is able to view Web sites on the Internet.
The user reports that after enabling ICS he cannot connect to any other computers
at the branch office. In addition, the other computers at the branch office cannot
connect to his computer or access the Internet by using his computer.
You need to ensure that all computers in the branch office can connect to each other and connect to the Internet by using the user's computer.
What should you instruct the user to do?
A. Tell the other users in the branch office the user name and password for the Internet connection on his computer. Instruct all these users to create a broadband connection to
the Internet by using the user name and password.
B. Clear the Allow other network users to control or disable the shared Internet connection check box on the Advanced tab of the Internet connection properties page.
C. Select the Obtain an IP address automatically and the Obtain DNS server address automatically option buttons on the TCP/IP properties page.
D. Run the ipconfig /renew and the ipconfig /flushdns commands on all computers in the branch office.
Answer: C
Explanation: When ICS is enabled, all computers must use DHCP to obtain
addresses. ICS will install by default a mini-DHCP server, and assign all computers that need to use ICS an ip in the range of 192.168.0.1-192.168.0.254. Since all the workstations are using static IP addresses, the connection can not be made.
Incorrect Answers:
A. Instructing all users to create a broadband connection will not work principally due to the fact that none of the users have a broadband connection on their workstation. The
whole intent of this question is to allow all other users to utilize this connection and not have to create one of their own. Therefore, this can not be the correct answer.
B. Other users can not currently see the workstation, and especially not the ICS connection. Until the users can see the workstation, there is no need to change the permissions on the ICS. Therefore, this can not be the best answer.
D. Running ipconfig /renew will not have any effect on the computers in the office since they all use static IP addresses. Ipconfig /renew is only valid for workstations using
DHCP.
NO 127:
You are a desktop support technician for XXYYInc. All client computers run Windows XP Professional. A user in the company uses Windows XP Professional computers at both the office and at home. The office computer is connected to the company network. The home computer uses a static IP address and connects to the Internet by using a persistent cable modem connection. The company network is connected to the Internet by a T1 line.
The user reports that he wants to use a Remote Desktop connection from his office computer to control his home computer. You verify that the company's Internet
firewall permits Remote Desktop connection traffic. However, the user cannot make
a connection by using Remote Desktop.
You need to ensure that the user can make a Remote Desktop connection from his office computer to his home computer. Your solution must prevent any other
Internet traffic from reaching the home computer.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two)
A. On the user's office computer, enable Internet Connection Sharing (ICS).
B. On the user's office computer, add the user's domain user account to the Remote
Desktop Users group.
C. On the user's home computer, enable Internet Connection Firewall (ICF).
D. On the user's home computer, enable the Remote Desktop option in the Internet
Connection Firewall (ICF) services.
Answer: C, D
Explanation:
To keep the home computer secure you should start by enabling the ICF. By
default if you're running Windows XP Service Pack 2 (SP2) and you enable Remote
Desktop, Windows Firewall will be automatically configured to allow Remote Desktop connections to your computer. If you or someone else has removed the Remote Desktop exception then you'll have to manually add it by open the Security Center, click Windows Firewall and click the Exceptions tab, and select Remote Desktop.
NO 128:
You are a desktop support technician for XXYYInc. All client computers run
Windows XP Professional and Microsoft Office XP. The company has a main office and a branch office.
The user reports that he cannot use Remote Desktop to connect to his computer at the main office while he is on his computer at the branch office. You discover that the user has a computer at the main office and a computer at the branch office. The
user runs Internet Connection Firewall (ICF) on both computers.
You verify that Remote Desktop is enabled on the user's computer at the main
office. You run the ping command between the user's two computers and find that they communicate with each other. You also ensure that the firewall between the main office and the branch office allows for Remote Desktop connections.
You need to ensure that the user can connect to his computer at the main office by using a Remote Desktop connection while working at the branch office.
What should you do?
A. Instruct the user to disable ICF on his computer located at the main office.
B. Instruct the user to disable ICF on his computer located at the branch office.
C. Enable Internet Connection Sharing (ICS) on the user's computer located at the main office.
D. Enable Internet Connection Sharing (ICS) on the user's computer located at the branch
office.
Answer: A
Explanation: ICF will prevent Remote Desktop Connections from working by default. In order to allow this, the ICF must be set to allow RDC connections (Port
3389). Since there is no mention that this is done, this is the most likely problem. Disabling the ICF on the receiving computer (in this case the work computer) should resolve the problem.
Incorrect Answers:
B. Disabling the ICF of the branch office will not help the user to connect to the work office. ICF needs to be disabled on the workstation that is RECEIVING the request.
C. ICS is not relevant here. The user is not trying to share his internet connection. He is trying to connect from one computer to another. Since there is already a connection established (known because the two computers can ping each other), there is no need for ICS.
D. Incorrect for the same reason as "C". Remember to know the difference between ICS
and ICF.
Note: By default, with the ICF enabled, the two computers would not be able to ping each other, as ICMP (ping) requests are dropped! Unless the ICF has been modified
already, this situation will not exist in real life. However, for the purposes of this exam, answer "A" is still the best answer.
Click here for More Free 70-272 Exam Questions