Crunch crunch crunch
The laser printer on your floor has started to jam constantly. Which of these might cause this problem to occur? Pick two.
The laser printer on your floor has started to jam constantly. Which of these might cause this problem to occur? Pick two.
You’d like to span two disks in Windows 7 to create a single large volume. What kind of disk must be used to support this feature?
You’re having problems with an application, and you’ve been asked to make a change to the application’s configuration file from the command line. Which of these programs can help you modify the text-based configuration file?
You’re having problems with a serial port on your laptop, and your diagnostics software needs an external tool to help complete the testing. Which of these tools is often used for testing physical ports?
Windows 7 gives you many different utilities to help keep your disks in peak operating condition. In this video, you’ll learn how to defragment your drives, how to check your disk for errors, and how to configure your Group Policies to provide control over removable storage media.
Installing and managing disk volumes and RAID configurations is an important skill to have in Windows 7. In this video, you’ll learn how to manage disk volumes, decide between MBR and GPT partitions, convert between disk types, and build Windows 7 software-based RAID arrays.
The Windows 7 operating system is constantly updated, but many environments would like to control the update process. In this video, you’ll learn how to configure every aspect of the update process, including the types of updates, update policies, hiding updates, reviewing update history, and rolling back updates.
Now that your remote VPN connection is running, you can take advantage of some Windows 7 technologies to make the most of your limited bandwidth. In this video, you’ll learn about Windows’ NAP technology, the process for auditing your remote connections, and how to publish individual applications using Remote Desktop’s RemoteApp feature.
Microsoft 70-680: 6.5 – Remote Connections – Part 2 Read More »
Virtual Private Networks allow us to take our computers anywhere and still maintain a secure network connection back to our central office. In this video, you’ll learn how VPNs authenticate and tunnel our network traffic into a secure encrypted link.
Microsoft 70-680: 6.4 – Remote Connections – Part 1 Read More »
You would like to allow your office computers to access your wireless network, but you would like to hide the wireless network name from appearing on other wireless-enabled devices. What wireless network security feature can limit the visibility of your network name to other wireless systems?