Welcome to Certifiable, your exam prep headquarters. Here you'll find questions about some of the tricky areas that are fair game for the certification exams. Following the questions, you'll find the correct answers and explanatory text. We change the questions weekly.
This week's questions cover topics for Exam 70-270: Installing, Configuring, and Administering Microsoft Windows XP Professional.
Windows XP lets you add events and descriptions to event logs. As an administrator, you can view event logs and filter their contents from the command line, without using any GUI consoles.
You have issued the Schtasks command to schedule a batch file to run every day at 3:00 P.M. You want this batch file to insert an information event into the Application log when the job is finished. You want an event ID of 998 and "The script has executed correctly" in the description field. Which of the following lines should you add to the batch file? (Choose the best answer.)
- eventcreate /t information /id 999 /L application /d "The script has executed correctly"
- eventcreate /t information /id 999 /L application /d "The script has run"
- eventcreate /t error /id 999 /L application /d "The script has executed correctly"
- eventcreate /t information /id 998 /L application /d "The script has executed correctly"
- eventcreate /t warning /id 998 /L application /d "The script has executed correctly"
From the command line, you query to determine what tasks are scheduled on a Windows XP Professional machine in your company's multimedia lab. The query returns the following information:
cryptic 18:00:00, 26/12/2001
yourtask 21:33:00, 19/12/2001
othertask 19:00:00, 24/12/2001
You're surprised to see the cryptic task, and you want to know more about it--specifically, who scheduled it and what command it will run at 18:00 on December 26. Which of the following commands should you issue to learn the name of the user who scheduled the task so that you can ask her about it? (Choose the best answer.)
- at /query /fo LIST /v
- schtasks /query /fo LIST /v
- showtasks /query /fo LIST /v
- tasklist /query /fo LIST /v
- listtasks /query /fo LIST /v
Which of the following presents the various encryption technologies in the order of increasing key lengths? (Choose the best answer.)
- IPSec DES, MPPE Std, IPSec 3DES, MPPE Strong
- IPSec DES, IPSec 3DES, MPPE Std, MPPE Strong
- MPPE Std, MPPE Strong, IPSec DES, IPSEC 3DES
- MPPE Std, IPSec DES, IPSEC 3DES, MPPE Strong
- MPPE Std, IPSec DES, MPPE Strong, IPSec 3DES
Answer to Question 1
The correct answer is D—eventcreate /t information /id 998 /L application /d "The script has executed correctly." Answer D is the only option that contains the correct ID, event type, and description. The eventcreate utility is an excellent addition to the administrator's arsenal. Administrators have long sought to interact with the event logs from the command line, and Microsoft has finally delivered.
Answer to Question 2
The correct answer is B—schtasks /query /fo LIST /v. This command will return information similar to the following:
Next Run Time: 6:00:00 PM , 26/12/2001
Status: Not yet run
Last Run Time: Never
Task To Run: C:\enrious\cryptic.exe
You now know that you can contact maryL to ask her what this task does and why she scheduled it.
Answer to Question 3
The correct answer is E—MPPE Std, IPSec DES, MPPE Strong, IPSec 3DES. These network encryption technologies have the following key lengths:
Microsoft Point-to-Point Encryption (MPPE) Std: 40 or 56 bits
IP Security (IPSec) Data Encryption Standard (DES): 56 bits
MPPE Strong: 128 bits
IPSec Triple DES (3DES): 168 bits