70-680 Windows 7, Configuration

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Global Catalogue Server

A domain controller that holds a subset of the informaiton in all domain partitions for the entire Active Directory forest.,

Global Catalog Server

A domain controller that holds a subset of the information in all domain partitions for the entire Active Directory forest.

Foreign Disk

A dynamic disk that is recognized as not belonging to the computer it is currently installed in. Until the disk is imported, to change its dynamic disk computer membership, the volumes it contains are not accessible.

Location Aware Printing

A feature for mobile computers that associates a specific default printer with a physical location.

Device Stage

A feature for printers and other devices that displays all of the relevant information and management options for a device in a single location.

Tabbed Browsing

A feature in Internet Explorer 8 that allows multiple Web sites to be open in the same window

Tabbed Browsing

A feature in Internet Explorer 8 that allows multiple Web sites to be open in the same window.,

User Account Control (UAC)

A feature in Windows 7 that elevates user privileges only when required. User Accounts applet A simplifi ed interface for user management in Control Panel.

BitLocker Drive Encryption

A feature in Windows 7 that can encrypt the operating system partition of a hard drive and protect system fi les from modification. Other partitions can also be encrypted.

BitLocker

A feature in Windows 7 that can encrypt the operating system partition of a hard drive and protect system files from modification. Other partitions can also be encrypted.

Network Bridge

A feature in Windows 7 that combines two dissimilar network types, such as wireless and wired, into a single network.

Group Policy

A feature integrated with Active Directory that can be used to centrally manage the confi guration of Windows 2000 and newer Windows computers, including Windows 7.

Windows SuperFetch

A feature of Windows 7 that tracks application utilization and ensures that the most commonly used programs are kept in physical memory rather than being swapped out to disk.,

What happens to the NTFS permissions of a file you move to another volume?

A file inherits the destination folder permissions.

What happens to the NTFS permissions of a file you move within the same volume?

A file retains its permissions.

x86

A generic term used to refer to computers based on Intel CPU processors. These CPUs include 8086, 80286, 80386, 80486, the Pentium family and Pentium compatible processors from other companies such as AMD.

Hotspot

A geographic area where a Wi-Fi wireless signal from a Wireless Access Point is available to wireless networking clients to enable network and/or Internet access.

Wide Area Network (WAN)

A geographically dispersed network connected by routers and communication links. The Internet is the largest WAN.

Local Policies

A group of policies that affect the behaviour of the local computers, and the rights and privleges users have to perform various actions.

Data Collector Set

A grouping of counters that you can use to log system data and generate reports.

Data Collector Sets

A grouping of counters that you can use to log system data and generate reports.,

Logon Events

An action performed to logon to a computer (successfully or not). Can be logged to allow monitoring of access to the system.

unattend.xml

An answer fi le that is automatically searched for during the generalize, auditSystem, auditUser, and oobeSystem confi guration passes.

Answer file

An answer file is used during an unattended setup to provide configuration to Setup.exe. Windows 7 answer files are in an XML format and are created by using Windows System Image Manager.

Autounattend.xml

An answer file that is automatically searched for during the windowsPE, offlineServicing, and specialize configuration passes.

Advanced User Accounts Applet

An applet for managing users that is available only from the command line. Some options in this applet are not available in other user management utilities.

Taskbar and Start Menu

An applet that configures the behaviour of the taskbar and Start menu, including which toolbars are displayed on the taskbar.

User Profiles Applet

An applet that is used to copy or remove user profi les.

HyperText Transport Protocol Secure (HTTPS)

An application protocol commonly used to transfer TCP data in a secured session between a client and server. Because this is a common protocol used with Web servers, many firewalls allow this protocol to pass without blocking it.

symmetric encryption algorithm

An encryption algorithm that uses the same key to encrypt and decrypt data.

Asymmetric Encryption Algorithm

An encryption algorithm that uses two keys to encrypt and decrypt data. Data encrypted with one key is decrypted by the other key.

What is an Asymmetric encryption algorithm?

An encryption algorithm that uses two keys to encrypt and decrypt data. Data encrypted with one key is decrypted by the other key.,

Encrypting File System (EFS)

An encryption technology for individual fi les and folders that can be enabled by users.

Windows PowerShell

An enhanced command-line interface that can be used to perform administrative tasks.

Windows Power Shell

An enhanced command-line interface that can be used to perform administrative tasks.,

Printer Driver Package

An enhanced printer driver that can contain additional software.

File Allocation Table (FAT)

An older method of organizing fi les and folders in a hard disk partition. Files are stored in blocks of data that point to each other in a chain-like structure. The blocks that are used in the partition and the link from one to another are stored in a master table called the FAT.

Windows Driver Model (WDM)

An older standard for writing device drivers that interact with Windows. Device drivers that use this standard are still supported, but should be replaced with drivers that use the new WDF architecture.

Basic Disk

An older, IBM-originated method used to organize disk space for x86 computers into primary, extended, and logical partitions. Basic disk technology is supported by many legacy operating systems and may be required in certain multiboot confi gurations.

System Out-of-Box Experience cleanup action

An option in Sysprep that triggers the computer to run the oobeSystem confi guration pass and start Windows Welcome on reboot

System Audit Mode cleanup action

An option in Sysprep that triggers the computer to enter Audit mode and run the auditSystem and auditUser confi guration passes on reboot.

Run as administrator

An option to start an application with elevated security privileges.

Software Assurance (SA)

An option when purchasing Microsoft software that allows you to automatically receive the latest version of a product. For example, if you purchased Windows XP with Software Assurance you would automatically be able to upgrade to Windows 7.

What are Offline Updates?

An update applied to Windows 7 during installation before Windows 7 is started.

Internet Protocol Version 6 (TCP/IPv6)

An updated version of TCP/IPv4 with a much larger address space.

Windows Defender

Anti-spyware software included with Windows 7

AppLocker vs Software Restriction policies - who wins?

AppLocker

Which running service is required by AppLocker?

Application Identity Service

Where in Event Log viewer can you find performance details?

Application and Services Logs/Micrisift/Windows/Diagnostics-Performance

WIN16

Application designed to run in a Windows 16-bit instruction environment.,

Win16

Applications designed to run in a Windows 16- bit instruction environment.

Win32

Applications designed to run in a Windows 32- bit instruction environment.

Win64

Applications designed to run in a Windows 64- bit instruction environment.

Multiple Monitors

Attaching two or more displays to a single computer. The information can be exactly the same on each display, or each display can be used independentlyby using extended mode.

AutoPlay

Automatically performs a configurable action when new removable media is inserted into the computer.

ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all mobile computers run Windows 7. You are assigned a mobile computer named ABC-WS20. ABC-WS20 is configured to enter sleep mode if no activity takes place in 15 minutes. You leave your office for 20 minutes and discover that ABC-WS20 has not entered into sleep mode. What can you do to ensure that computer enters the sleep mode after 15 minutes of inactivity? A. You should consider disabling the screen saver. B. You should consider running Powercfg energy at a command prompt. C. You should consider running shutdown -s at a command prompt. D. You should consider running systeminfo at a command prompt.

B

Graphical Processing Unit (GPU)

A hardware component, similar to the CPU, that is added to video cards to calculate how to draw complex shapes on the screen. Because the GPU can perform the complex operations on its own, the CPU is free to work on other tasks.

Digital Subscriber Line (DSL)

A high-speed Internet connection over telephone lines.

Windows Firewall

A host-based fi rewall included with Windows 7 that can perform inbound and outbound packet fi ltering.

Public Keys

A key that is distributed publicly and used to decrypt files that you have encrypt.,

GUID (Globally Unique Identifier)

A label that identifies an item with a unique name or code that is used to tell it apart from similar items. Software typicallyuses a coded number or value to represent a unique identifier.

Transport Device Interface (TDI)

A legacy interface that supports the NetBIOS protocol used by many older Windows applications.

Printer Driver Store

A location in Windows 7 that caches printer drivers and is capable of storing multiple versions of a printer driver.

Printer Driver Store

A location in Windows 7 that caches printer drivers and is capable of storing multiple versions of a printer driver.,

Application Architecture

A logical description of how different components, services, and resources work together to run applications.

Domain

A logical grouping of computers and users in Active Directory.

Removable Disk Storage

A mass storage device that can be removed from the computer, either by powering down the computer fi rst or while the computer is running. This includes fl oppy disks, portable hard disks, and cartridge-based disk storage.

What is the role of the file system?

A means to organize data, retrieve and update data, as well as manage the available space on the device(s) which contain it. Organizes data in an efficient manner and is tuned to the specific characteristics of the device. Some provide mechanisms to control access to the data and metadata. Insuring reliability is a major responsibility of a it.

Preemptive Multitasking

A method for applications to share a CPU and appear that they are all running at the same time. This method adds time limits and priority levels to determine how long an application can use the processor and which application gets to go next. An application can also be preempted by another application if it has a higher priority level.

Cooperative Multitasking

A method for applications to share the CPU. All applications rotate access to and do not monopolize the CPU. If an application does not release control of the CPU, the computer may appear stalled or other applications appear very sluggish.

Parental Controls

A method for configuring time limits, controlling game playing, and allowing or blocking programs.

IKEv2 Mobility and Multihoming Protocol (MOBIKE)

A protocol designed to work together with IKEv2 to allow a host involved in a secure IKEv2 initiated SA to change its IP address, switch to a different network interface, or recover from a network outage.

iSCSI

A protocol for transferring files between a computer and external disk storage over an Ethernet network.

IP-HTTPS

A protocol that allows a secure IP tunnel to be established with a secure HTTP connection for the purpose of transporting IPv6 packets. A IP-HTTPS client must initiate a connection to a configured IP-HTTPS server. The connection between client and server is not likely to be stopped by a firewall because the HTTPS protocol is not commonly blocked.

Link-Local Multicast Name Resolution (LLMNR)

A protocol that defines methods for name resolution of local neighboring computers without using DNS, WINS, or NetBIOS name resolution services. LLMNR can operate on IPv4 and IPv6 networks with the use of specially crafted multicast addresses to query client names on other computers.

IPSec

A protocol that is used to secure and authenticate IP connections.

IPSec

A protocol that is used to secure and authenticate IP connections.,

Layer 2 Tunneling Protocol (L2TP)

A protocol used to carry PPP packets through IP networks.

Point-to-Point Tunneling Protocol (PPTP)

A protocol used to carry PPP packets through IP networks.

Remote Desktop Protocol (RDP)

A protocol used to carry remote control data between the remote control client and the remotely controlled computer.

Point-to-Point Protocol over Ethernet (PPPoE)

A protocol used to secure connections over most DSL lines.

Multimaster Replication

A replication system where updates can be performed on any server and are replicated to all other services.,

Spanned Volume

A reserved area of space combined from two or more dynamic disks. A spanned volume can be formatted with a fi le system. Files are written to each disk's reserved area of space until that area is full. Additional fi le data is then written to the next available reserved area of space on the next disk that is part of the spanned volume. The capacity of the spanned volume is the total of all reserved areas of space from each disk that is a member of the spanned volume. Loss of a single disk that holds part of the spanned volume will result in the total loss of the volume.

Simple Volume

A reserved area of space on a single dynamic disk. A simple volume can be formatted with a fi le system. The areas of space reserved for a simple volume do not have to be contiguous on the dynamic disk.

Logical Partition

A reserved block of space on a basic disk. Logical partitions can only be created within an extended partition. As long as free space exists in an extended partition, a new logical partition can be created. Logical partitions can be formatted with a file system directly.

Extended Partition

A reserved block of space on a basic disk. No more than one extended partition can exist on a single basic disk. Logical partitions are created within the extended partition. Extended partitions cannot be formatted with a fi le system directly.

How is ISATAP address used?

Between IPv4/IPv6 nodes over an IPv4 routing infrastructure.

Secure VPN protocols support ...

Data confidentiality Data integrity Replay protection Data origin authentication

What is a RAID-5 dynamic volume?

Data is interleaved equally across all disks, with a parity stripe of data also interleaved across the disks. Also known as striping with parity. Maximum capacity of the number of disks minus one (if you have five 200 GB disks, your volume would be 800 GB)

DSL

Digital Subscriber Line. A high-speed Internet connection over telephone lines.,

Disk Partition

Hard disks are subdivided into logical units called partitions. Each partition is then formatted and represented as a drive letter in Windows.

HAL

Hardware Abstraction Layer. Part of the operating system that understands how to talk to the specific computer hardware on which the operating system is installed. This portion of the operating system runs at the lowest level of the aplication hierarchy in kernel mode.,

Place software restriction rules in the order of precedence (hash, network zone, default, path, certificate).

Hash rules Certificate rules Path rules Network zone rules Default rules

How can you exclude a certain update from the update process?

Hide the update

How is the registry organized?

Hives, & Keys & Sub-Keys

Schema Partition

Holds the defi nition of all Active Directory objects and their attributes. It is replicated to all domain controllers in the Active Directory forest.

Network Zones

Home, Work, Public. Enables and disables features depending on what zone it is in.

How to determine an ISATAP address?

Locally administered interface ID ::0:5efe:w.x.y.z where w.x.y.z is any unicast IPv4 address, which includes both public and private addresses.

If you want to add other users to access the encrypted file, the desired user first needs to ...

Log on to the computer and encrypt a different file. This automatically creates her EFS certificate.

Domain

Logical groupings, administrative unit, used in Active Directory networking.

What command-line utility is able to manage data collector logs?

Logman

Malware

Malicious software designed to perform unauthorized acts on your computer. Malware includes viruses, worms, and spyware.

Devices and Printers applet

Manages the printers on a local workstation.,

Cache

Method of improving disk performance by storing frequently accessed data in faster areas (like RAM),

MMC

Microsoft Management Console. A graphical interface shell that provides a structured environment to build management utilities.,

Xml configuration files for USMT

MigApp, MigUser, MigDocs. Config

Forest

Multiple Active Directory trees with automatic trust relationships between them.,

What is a striped dynamic volume?

Multiple regions of free space from two or more disks. Data is evenly interleaved across the disks, in stripes. Known as RAID Level 0.

NAP

Network Access Protection. A computer authorization system for networks that prevents unhealthy computers form accessing the network.,

Are DVD-ROMs considered removable disks in Group Policy?

No, they are configured by CD And DVD: Deny Execute, Read, or Write Access policy.

G. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK). You are preparing to capture an image of a Windows 7 reference computer. You plan to deploy the image to new computers that have the same hardware as the reference computer. You need to ensure that the captured image contains the device drivers from the reference computer. What should you do? A. Run the Dism command with the /Add-Driver option. B. Run the Dism command with the /Mount-Wimoption. C. Run the BCDEdit command. D. Run the Start /w ocsetup command. E. Run the ImageX command with the /Mount parameter. F. Run the DiskPart command and the Attach command option. G. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True. H. Add a boot image in WDS. I. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. J. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. K. Create a capture image in WDS. L. Run the Dism command with the /Add-Package option. M. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. N. Run the PEImq /Prep command.

E. Add a boot image and create a capture image in WDS.

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. You need to capture an image of a client computer. What should you do on the server before performing actions on the client computer? A. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Mo. B. Run the DiskPart command and the Attach command option. C. Use Sysprep with an answer file and set the PersistAHDevicelnstalls option in the answer file to False. D. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. E. Add a boot image and create a capture image in WDS. F. Run the BCDEdit /delete command. G. Run the Dism command with the /Add-Driver option. H. Run the ImageX command with the /Mount parameter. I. Run the Dism command with the /Add-Package option. J. Use Sysprep with an answer file and set the PersistAHDevicelnstalls option in the answer file to True. K. Run the Start/w ocsetup command. L. Run the Dism command with the /Mount-Wim option. M. Run the PEImg /Prep command.

A. the icacls command E. the folder Properties window

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder. What should you use to achieve this goal? (Each correct answer presents a complete solution. (Choose two.) A. the icacls command B. the User Account Control Settings Control Panel window C. share permissions D. Local Users and Groups E. the folder Properties window F. the Services management console G. the netsh command H. Device Manager I. the Group Policy management console

Logical Disk counters

Performance indicators for logical disks (as opposed to physical disks),

Physical Disk Counters

Performance indicators for physical disks (as opposed to logical disks),

PPPoE

Point-to-Point Protocol over Ethernet. A protocol used to secure connections over most DSL lines.,

PPP

Point-to-Point Protocol. A network-layer transport protocol that manages connectivity over serial or modem lines. PPP can negotiate any transport protocol used by both systems involved in the link and can automatically assign TCP/IP settings.,

PXE

Preeboot eXecution Environment. A standard used by network cards to boot directly to the network and download an operating system.

PCL

Printer Control Language. A common language used by printers to describe how a page is printed.,

PID

Process Identifier. A numbe that uniquely identifies a process running on a system.,

Which options are available in Behavior of the elevation prompt for administrators in Admin Approval Mode policy?

Prompt for consent for non-Windows binaries Prompt for consent Prompt for credentials Prompt for consent on the secure desktop Prompt for credentials on the secure desktop Elevate without prompting

Which options are available in Behavior of the elevation prompt for standard users policy?

Prompt for credentials Prompt for credentials on the secure desktop Automatically deny elevation requests

Process Tracking

Protocol by which OS keeps track of running processes.,

Public Switched Telephone Network (PSTN)

Provides a connection to subscribers for dial-up devices such as analog or ISDN modems. Originally developed to connect telephones and allow people to make analog phone calls.

Which types of profiles exist and why would you use them?

Public Profile, Default Profile, Roaming Profile, Mandatory Profile.

PSTN

Public Switched Telephone Network. Provides a connection to subscribers for dial-up devices such as analog or ISDN modems. Originally developed to connect telephones and allow people to make analog phone calls.,

What types of primary conditions for rules can be used in AppLocker?

Publisher Path File hash

Disk Bottlenecks—How to fix?

RAID,

RAM

Random Access Memory, otherwise known as chip-based memory that stores instructions and data in silicon-based chips that are very quick to access but only suitable for short-term data storage.

Attributes

Read-Only, System, Hidden, Archive, Index, Encrypted, Compressed.

What feature enables you to use a USB flash drive or a Compact Flash or Secure Digital (SD) memory card as an additional source of memory?

ReadyBoost

Which performance tool tracks events such as Windows updates; software installations and removals; device driver failures,, etc. and provides a trend analysis of your computer's system stability over time?

Reliability monitor

Before converting disk partition style you must first ...

Remove any volumes or partitions from the disk.

Reports

Reports created in Performance Monitor that use XML-based rules to analyze logged data and display meaningful results.

Which policy allows BitLocker to be enabled if no TPM is present?

Require additional authentication at startup, Allow BitLocker without a compatible TPM option must be enabled.

Why is a properly configured DNS essential for Active Directory

Required for the components of Active Directory to communicate with each other , slow logon, replication doesn't happen. If not configured improperly, group policies are not applied properly.

Windows Complete PC Restore

Restores system files and settings to the point just after OS installation.,

Privilege Use

Rights, that allow you to perform various system functions unless otherwise prohibited. This is as opposed to permissions where system actions cannot be performed unless granted premissions.

Authentication Protocols

Routines used by servers to establish the identity of a remote client attempting to connect and communicate with the server.

Authentication Protocols

Routines used by servers to establish the identity of a remote client attempting to connect and communicate with the server.,

Virtualization Software

Software that allows you to run multiple operating systems on a single computer at the same time. One operating system functions as the host, while others are guest operating systems that run on the host.

Device Driver

Software that manages the communication between Windows 7 and a particular hardware component.

Where do you go in Windows 7 to add a printer?

Start>Devices & Printers>Add a Printer, or Start>Control Panel>Hardware and Sound>Devices & Printers>Add a Printer.

Environment Subsystems

Support systems designed for specific types of applications, such as Win32 applications. The environment hides the details of how the application must communicate with lower-level operating system components such as the Executive Services. Environment subsystems operate on a usermode basis but have awareness of kernel mode services hosted through Executive Services.

Bottleneck

The component in a process that prevents the overall process from completing faster.

Data Manager

The component that is used to automatically manage performance logs.

Data Manager

The component that is used to automatically manage performance logs.,

Specialize Configuration Pass

The confi guration pass that is performed after hardware has been detected. This is the most common confi guration pass to apply settings.

How copying a file can change its NtFS permissions?

The copy inherits the NTFS permissions of the destination folder.

Advanced Configuration and Power Interface (ACPI)

The current standard for power management that is implemented in Windows 7 and by computer manufacturers.

Security Accounts Manager (SAM) database

The database used by Windows 7 to store local user and group information.

Windows Welcome

The default logon method for Windows 7. This method presents icons representing each user.

Welcome Centre

The default logon method for Windows 7. This method presents icons representing each user. Also, the center that greets users after Windows 7 has been installed. Can be customized.

Hybrid Sleep

The sleep method used by Windows 7 that combines the S3 state and S4 state. When the computer moves to the S3 state, it also saves the memory file required for the S4 state.

Hybrid Sleep

The sleep method used by Windows 7 that combines teh S3 state and S4 state. When the computer moves to the S3 state, it also saves teh memory file required for the S4 state.

Network Driver

The software responsible for enabling communication between Windows 7 and the network device in your computer.

D. A static IPv6 address

To establish a DirectAccess connection to the network, what is the first requirement? A. Install a certificate B. Create a VPN connection C. A static IPv4 address D. A static IPv6 address

Windows Driver Model

WDM. An older standard for writing device drivers that interact with Windows. Device drivers that use this standard are still supported, but should be replaced with drivers that use the new WDF architecture.

Which command-line utility performs the same tasks as WDS?

WDSutil

Windows Image Format

WIM. A format to store images of applications and operating systems in image files. These images represent customized installations that can be distributed to other computers and installed using a scripted solution.,

Which editions of Win 7 include Windows XP mode?

WIn 7 Professional Win 7 Enterprise Win 7 Ultimate

Which policy allows you to deny access to cell phones?

WPD devices: Deny Execute, Read or Write Access

Catalog File

WSIM uses catalog files to read the configurable settings and their current status for an WIM image.

A. oobeSystem

Which Windows Setup configuration pass applies settings to Windows 7 before Windows Welcome starts? A. oobeSystem B. auditSystem C. specialize D. offlineServicing

D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar".

Which of the following steps will keep a Microsoft Word shortcut icon on the Taskbar after the next reboot? A. Copy and paste a Microsoft Word icon to the Taskbar. B. Right click on the Microsoft Word icon and choose, "Staple to Superbar". C. Right click on the Microsoft Word icon and choose, "Pin this programm to taskbar". D. Open Microsoft Word. While the Icon is on the Taskbar, right click the icon and choose, "Pin this program to taskbar".

QUESTION 411

Will has installed Windows 7 on his Windows XP computer. The machine is now a dual-boot computer. He has FAT32 for Windows XP and NTFS for Windows 7. In addition, he boots his computer to Windows XP Professional for testing an application`s compatibility with both operating systems. Which of the following file systems will be seen by both operating systems? A. Only the FAT32 partition will be seen by both operating systems. B. Only the NTFS partition will be seen by both operating systems. C. Neither the FAT32 partition nor the NTFS partition will be seen by both operating systems. D. Both the FAT32 partition and the NTFS partition will be seen by both operating systems. Correct Answer: D

Which editions of Win 7 support creation of HomeGroup?

Win 7 Home Premium, WIn 7 Pro, Ent and Ult

Which versions of Win 7 support backup to a network location?

Win 7 Pro, ENt, Ult

Which editions of Win 7 support RAID?

Win 7 Pro, Ult and Ent

Which editions of Win 7 support incoming Remote Desktop connections?

Win 7 Pro, Ult and Ent.

Which editions of Win 7 support shadow copy?

Win 7 Professional, Enterprise, and Ultimate

Which editions of Win 7 include BitLocker feature?

Win 7 Ult and Ent

Which editions of Win 7 include Direct Access?

Win 7 Ult and Ent

Which editions of Win 7 include Branchcache?

Win 7 Ultimate and Enterprise

Which versions of Windows can work with software restriction policies?

Win XP, Win Vista, Win 7

Requirements for Hosted Cache server

Windows 2008 R2 An SSL certificate trusted by client computers

Windows Vista Enterprise (SP1, SP2) can be upgraded to ...

Windows 7 Enterprise

WHich editions of Win 7 include AppLocker?

Windows 7 Enterprise Win 7 Ultimate

Windows Vista Home Basic (SP1, SP2) can be upgraded to ...

Windows 7 Home Basic, Home Premium, Ultimate

Windows Vista Home Premium (SP1, SP2) can be upgraded to ...

Windows 7 Home Premium, Ultimate

Windows 7 Home Basic or Windows 7 Starter can be upgraded to ...

Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate

Windows Vista Business (SP1, SP2) can be upgraded to ...

Windows 7 Professional, Enterprise, Ultimate

Windows 7 Home Premium can be upgraded to ...

Windows 7 Professional, Ultimate

Windows 7 Professional can be upgraded to ...

Windows 7 Ultimate

Windows Vista Ultimate (SP1, SP2) can be upgraded to ...

Windows 7 Ultimate

Before using MDT 2010 you must first install ...

Windows Automated Installation Kit

Where can you find USMT?

Windows Automated Installation Kit

WINS

Windows Internet Naming Service. A system used to resolve computer NetBIOS names to IP addresses.,

What are the primary tools used to diagnose and repair Windows 7?

Windows RE, Advanced Boot options menu, driver rollback, system restore.

WindowsRE

Windows Recovery Environment. A command-line environment that can be loaded from the Windows Setup DVD to perform recovery operations.,

How can you check for Windows updates from a command-line?

Wuauclt.exe /detectnow

XPS

XML Paper Specification. A document format that describes how a page should be displayed. Similar to Adobe's PDF.,

D. Netsh.exe

You administer 80 computers that run Windows 7. The computers have static IP addresses. You need to change the static IP addresses on all the computers by using a startup script. Which command should you include in the startup script? A. Ipconfig.exe B. Nbtstat.exe C. Netstat.exe D. Netsh.exe

QUESTION 221 make chart?

You administer Windows 7 Enterprise computers in your company network. All computers are deployed frcm a sinule Windows image (.wim). You want to deploy the .wim file tc newly purchased computers by Windows Deployment Services (WDS). You need to protect an administrator account password used for deployment in an answer file. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

QUESTION 398 see exhibit / make chart?

You administer Windows 7 computers in your company network. You want to deploy Windows 7 to newly purchased computers by using customized DVD installation media. You download the latest updates' package files to your computer from the Microsoft website. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

Which diskpart command is used for mounting virtual hard disks?

attach vdisk

The ABC.com network contains a wireless access point (WAP) that uses Advanced Encryption Standard (AES) security but a pre-shared key has not been configured on the wireless access point. How should you connect a mobile computer named ABC-WS680 to the wireless access point? A. You should use WEP for the wireless connection. B. You should use WPA2-Enterprise for the wireless connection. C. You shoulduse WPA-PSK for the wireless connection D. You should use WPA2-PSK for the wireless connection. E. You should use WPA-Personal for the wireless connection.

b

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are working on a workstation named ABC-WS680 that runs Microsoft Windows 7 and your job is to manage the computers on the network. What settings would you change on ABC-WS680 to allow downloading of updates from a local Windows Server Update Services server? A. By changing the Windows Update settings from Windows Update on ABC-WS680. B. By changing the Windows Update settings from the local Group Policy on ABC-WS680. C. By changing the Network Location setting on ABC-WS680. D. By changing the Windows Firewall settings on ABC-WS680.

b

Which utility is used to manage your boot configuration data store?

bcdedit

Windows Imaging Format (WIM)

format to store images of applications and operating systems in image fi les. These images represent customized installations that can be distributed to other computers and installed using a scripted solution.

Which command-line utility is used for configuring NTFS permissions?

icacls.exe

What command configures BranchCache client in Distributed cache mode?

netsh branchcache set service mode=distributed

What command configures BranchCache client in Hosted cache mode?

netsh branchcache set service mode=hostedclient location=<FQDN of branchcache server>

What command lists devices currently configured to wake the computer from sleep?

powercfg -devicequery Wake_Armed

What command lists all devices that support waking the computer from sleep?

powercfg -devicequery Wake_From_Any

Which performance tool provides a summary of CPU, disk, network, and memory performance statistics including mini-graphs of recent performance?

resource monitor

What utility allows you to analyze system security by comparing your current configuration to at least one template?

secedit.exe

Network Location Awareness Service (NLA)

service that allows applications to track the state of the network connections available to the computer. An application can track how much data can be sent over a connection, if it is available, or if new connections appear. Based on this information, the application can modify its attempts to communicate over the network.

Services Console

services.msc A console that allows you to start/stop and view the services on the system.,

Windows Mobility Center

single location that you can use to confi gure the mostly commonly used settings on mobile devices.

relog

utility that allows you to break logs into smaller logs, or join smaller logs together.

sigverif utility is used for ...

verification of drivers' signatures.

What command-line utility will make a backup of your drive c: to the drive d:?

wbadmin start backup -backuptarget:d: -include:c:

What utility allows you to manually install .msu files (Windows update files)?

wusa.exe

What are the minimum requirements of Windows 7?

x86 - !GHz Processor 1GB Ram, 16GB HDD. x64 - 1GHz Processor 2GB Ram, 20 GB HDD. Both require DirectX 9 Graphics with WDDM 1.0 or higher.

Hardware requirements for 64-bit Win7

1Ghz CPU DirectX 9-capable with WDDM 1.0 or higher 2 Gb RAM 20 Gb HDD space

How to determine a unicast global address?

3 first bits - 001 (2 or 3 in hex)

IPv4

32-bit addressing, with the bits divided into four octets. Each octet is represented by a binary value of between 0 and 255. The current standard.

What bandwith value triggers slow-link mode for Offline files?

64000 bit per second

You are employed as the desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have created a workgroup, named ABC_GROUP, which includes7 workstations. One of these workstations, named ABC-WS680, is configured to host data files. You want to make sure that the data files on ABC-WS680 are shared on the ABC.com network. Which of the following actions should you take? A. You should consider transferring the files to the DataLibrary, and also creating a HomeGroup on ABC-WS680. B. You should consider enabling File and Printer Sharing in Windows Firewall, and also disabling User Account Control (UAC) on ABC-WS680. C. You should consider moving the files to the Media Library, and also disabling User Account Control (UAC) on ABC-WS680. D. You should consider enabling File and Printer Sharing in Windows Firewall, and also creating a HomeGroup on ABC-WS680.

A

You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. ABC.com has a workstation that includes a hard drive configured to make use of a RAID controller. You are in the process of installing Windows 7 via an installation DVD. You find that the files required to install the RAID controller are not on the DVD.Which of the following actions should you take NEXT? A. You should consider selecting the Load Driver option from the Install Windows dialog box. B. You should consider selecting the Drive options (advanced) option from the Install Windows dialog box. C. You should consider selecting the option to roll back the driver. D. You should consider making use of the Last Known Good Configuration boot option. You have to make sure that the installation is successful. You start by restarting the workstation using the installation DVD.

A

You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been instructed to make sure that ABC.com's users are able to perform enterprise searches from their workstations. Which of the following actions should you take? A. You should consider downloading an appropriate .osdx file from a legal resource to install Federated Search connectors. B. You should consider installing a new search bar in Internet Explorer. C. You should consider installing a phone connector. D. You should consider installing an Outlook connector

A

Dynamic Disk

A method used to organize disk space into volumes. First introduced with Windows 2000, the dynamic disk method is seen as an improvement over basic disk technology. Not all operating systems support the dynamic disk method of organizing disk space. This may restrict multiboot configurations. Dynamic disk technology supports simple, spanned, striped, mirrored, and RAID 5 volumes.

Extensible Authentication Protocol (EAP)

A modular standard for defining authentication protocols that can be used to validate a computer or user. A product developer can introduce a custom authentication protocol for their product if it is not already included with Windows 7. EAP is available as an authentication standard with dial-up, VPN, and wireless connections.

Primary Partition

A reserved region of disk space on a basic disk that is capable of loading an operating system. The first sector of the primary partition is also known as a boot sector and stores the code for beginning the operating system load process from that primary partition.

Time Limits

A part of Parental Controls that is used to control when users are allowed to log on to the computer.

Game Controls

A part of Parental Controls that is used to limit access to games.

What is Windows Communication Foundation?

A part of the .NET Framework API that applications can use to communicate with each other. Enables applications to send messages to one another. Inteded for communication between Web services, peer-to-peer sharing features, Really Simple Syndication (RSS) support, and new core networking services.

Thread

A piece of code that performs a specifi c single task. An application is written as one or more threads, each of which performs a specifi c task within the application. The thread is typically seen as a unit of work for the CPU to perform.

What are Threads?

A piece of code that performs a specific single task. An application is written as one or more threads, each of which performs a specific task within the application. The thread is typically seen as a unit of work for the CPU to perform.

Data Execution Prevention (DEP)

A primarily processor hardware-based system to prevent the installation of malware by accessing unauthorized memory spaces.

Generalization

A process performed by Sysprep to prepare a computer running Windows 7 for imaging. The computer SID, computer name, user profiles, and hardware information are removed during generalization.

Product Activation

A process put in place by Microsoft to reduce piracy. Unique information about your computer is sent to Microsoft to ensure that the package of Windows 7 purchased is installed on only a single computer.

IEEE (Institute of Electrical and Electronics Engineers)

A professional society that promotes and nurtures the development of standards used in the application of electronic technology.

Public Profile

A profile that is merged with all other user profiles. The public profile does not contain an NTUSER.DAT file.

DirectX

A programming standard for writing multimedia applications that interact with video, sound, and input devices such as the keyboard.

Extended File Allocation Table (exFAT)

A proprietary Microsoft fi le system used with external storage media to organize files and folders using a technology similar to FAT but without the space limitations of FAT32. Volume sizes over 32 GB are fully supported.

Secure Socket Tunneling Protocol (SSTP)

A protocol that allows secure communication between a VPN client and server using the SSL based encryption methods of HTTPS. The connection between client and server is not likely to be stopped by a fi rewall because the HTTPS protocol is not commonly blocked.

Default Gateway

A router on the local network that is used to deliver packets to remote networks.

Active Directory naming scheme.

A scheme used when naming Active Directory objects. Names end up looking similar to DNS names.,

Ring Level

A security level in the CPU that is used to determine a program's degree of access to memory and hardware. The ring levels are used to set user and kernel mode access in the operating system.

Wi-Fi Protected Access (WPA)

A security protocol for wireless 802.11 networks that provides stronger security than WEP. WPA can be confi gured with a preshared key or with authentication from a central authority.

Wired Equivalent Privacy (WEP)

A security protocol for wireless 802.11 networks that provides weak authentication methods in comparison to WPA. WEP uses preshared keys that attackers have been able to decipher without much diffi culty. The use of WEP is discouraged where wireless security is a major consideration.

Domain Controller

A server that holds a copy of Active Directory information.

Member Server

A server that is joined to an Active Directory domain, but does not hold a copy of Active Directory information.

Windows Deployment Services (WDS)

A server-based system for deploying desktop operating systems automatically over the network. PXE is used to connect the computers to WDS.

Windows Hardware Quality Labs (WHQL)

A service provided by Microsoft to hardware developers and vendors to test their hardware with different versions of Windows. This testing only validates that a device works with Windows; it does not compare devices.

Routing and Remote Access (RRAS)

A service installed and confi gured on Windows Server 2003 to allow remote clients and networks to connect to network services local to the server. The Routing and Remote Access service must be confi gured to support VPN connections, dial-up connections, and routed IP traffi c from routers

Windows Update

A service that automatically downloads and installs service packs and security updates.

Terminal Services (TS)

A service that can be installed on a computer running a server-based operating system. Depending on licensing limits, multiple users can connect to the Terminal Server and run applications on the Terminal Server using only a remote control client. Each remote user is unaware that other users are also remote controlling applications on the Terminal Server.

Indexing service

A service that indexes files in specified locations to speed up search queries.

Indexing

A service that indexes files in specified locations to speed up search queries.,

Active Directory site

A set of IP subnets representing a physical location that are used by Active Directory to control replication.

Microsoft Deployment Toolkit

A set of best practices, scripts, and tools to help automate the deployment of Windows operating systems.

Microsoft Deployment Toolkit (MDT)

A set of best practices, scripts, and tools to help automate the deployment of Windows operating systems.

Power Plan

A set of confi guration options for power management. The Balanced, Power save, and High performance power plans are created by default.

Baseline

A set of performance indicators gathered when system performance is acceptable.

Baseline

A set of performance indicators gathered when system performance is acceptable.,

Application Programming Interface (API)

A set of rules and conditions a programmer follows when writing an application to allow the program to interact with part of the operating system. The program is guaranteed to work if they follow the API rules published by the authors of a feature in the operating system.

User State Migration Tool (USMT)

A set of scriptable command-line utilities that are used to migrate user settings and fi les from a source computer to a destination computer. USMT is typically used by large organizations during deployments of desktop operating systems.

Local Security Policy

A set of security configuration options in Windows 7. These options are used to control user rights, auditing, password settings, and more.

Alternate IP Configuration

A set of static IP configuration information that is used instead of APIPA when a computer is unable to contact a DHCP server.

Network Discovery

A setting that control how your computer views other computers on the network and advertises its presence on the network.,

Network Discovery

A setting that controls how your computer views other computers on the network and advertises its presence on the network.

Distribution Share

A share configured through WSIM to hold drivers and packages that can be added to Windows 7 during installation.

Password Authentication Protocol (PAP)

A simple authentication method that establishes the identity of a remote client with the authentication password sent in the data stream between the client and server. This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.

Pixel

A single dot on the display.

What is a Simple dynamic volume?

A single region or multiple concatenated regions of free space on a single disk.

Sector

A single unit of storage for a hard disk that represents the smallest block of data that can be read or written to the disk. The typical hard disk sector size is 512 bytes.

Gadget

A small applet that can be mounted directly onto the Windows 7 desktop.,

QUESTION 396 see exhibit

A stand-alone computer that runs Windows 7 has only one partition. Two users named User1 and User2 share this computer. User1 encrypts a file by using Encrypting File System (EFS). User1 attempts to grant User2 access to the file as shown in the exhibit. You need to ensure that User1 can grant User2 access to the file. What should you do? A. Instruct User2 to log on to the computer and take ownership of the file. B. Instruct User1 to move the file to a shared folder on the computer. C. Instruct User2 to export the EFS certificate to a certificate file. D. Instruct User1 to export the EFS certificate to a certificate file. Correct Answer: C

Windows Driver Foundation (WDF)

A standard for writing device drivers that interact with Windows 7. This standard replaces WDM and adds new features such as support for user mode device drivers.

eXtensible Markup Language (XML)

A standard for formatting data that is exchanged between applications. By using a standard, application developers do not have to write custom data translators for every product with which their applications share data.

XML

A standard for formatting information in a self-describing way for transfer between different applications.

XML

A standard for formatting information in a self-describing way for transfer between different applications.,

MMC

A standard for graphical management utilities called Microsoft Management Consoles (MMC). Management consoles can be added as snap-ins for a bare-bones MMC application.

Event Viewer

An MMC console that is used to view messages generated and logged by Windows 7, applications, and services.

Event Viewer

An MMC console that is used to view messages generated and logged by Windows 7, applications, and services.

Services administrative tool

An MMC console used to manage Windows services

Performance Monitor

An MMC console used to monitor and troubleshoot the performance of your computer

Device Manager

An MMC snap-in that is used to manage hardware components and their device drivers.

Local Users and Groups MMC snap-in

An MMC snap-in that is used to manage users and groups.

GUID Partition Table (GPT)

A disk partitioning style that allows more partitions and advanced partition information when compared to the older MBR style disk partition scheme. Desktop computers only use GPT in specialized and limited cases due to its limited applicability.

Local Users and Groups

An MMC snap-in that is used to manage users and groups.,

Device Manager

An MMC snap-in that is used to mange hardware components adn their device drivers.,

XML PrintTicket

An XML file that describes the settings for a print job.

XML PrintTicket

An XML file that describes the settings for a print job.,

Application Manifest

An XML file that describes the structure of an application, including required DLL files and privilege requirements.

COM

An abbreviation for Component Object Model, which is a generalized method used by some applications to cross-link to and access each other. This is a broader method than OLE.

OLE

An abbreviation for Object Linking and Embedding, which is a method used by some applications to cross-link to each other.

Kernel Mode

An access mode for applications while they are running on the CPU that allows full access to all hardware devices and memory in the computer.

User Mode

An access mode for applications while they are running on the CPU that allows restricted access to all hardware devices and memory in the computer. This mode makes it diffi cult for the running application to corrupt and crash the operating system. System-level applications may need more access than is allowed and must use kernel mode instead.

Guest Account

An account with minimal privileges intended to give minimal access to Windows 7. This account is disabled by default.

XML Paper Specification (XPS)

A document format that describes how a page should be displayed. XPS is similar to Adobe Portable Document Format (PDF).

Colour Management

,

Memory Bottlenecks—How to fix?

,

Resource policy

,

User mode VS Kernel Mode

,

What are some of the improvements found in IPv6?

,

What are the basic components of Windows 7 that support networking?

,

Why use User Accounts?

,

Requirements for using WDS

- AD DS on WIn 2008 or Win 2008 R2 - DHCP - DNS - NTFS partition - Local Administrative rights - to install the role, member of Domain Users - to install an image

What modes are available in BitLocker?

- TPM-only - TPM + PIN - TPM + Startup-key - TPM with PIN and startup key - No TPM

Teredo address consists of ...

2001::/32 prefix + IPv4 (32-bit) public address of the Teredo server + TEREDO flags (16 bit) + obscured external UDP port (16 bit) + obscured external IPv4 address (32 bit)

Minimum disk space needed to support USMT operations

250 Mb

What is the default round-trip latency value that triggers the use of BranchCache?

80 milliseconds

ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network client computers currently make use of Microsoft Windows 7. You are assigned a client computer named ABC-WS25. To ensure your productivity you need to perform the following 2 tasks. - Increase the speed of physical memory. - Increase the size of the physical memory. What should you do? A. You should consider making use of ReadyBoost. B. You should consider making use of EFS. C. You should consider making use of SpeedDisk. D. You should consider making use of Pagefile.sys.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have configured a workgroup that includes numerous workstations. One of the workstations, named ABC-SR07, hosts ABC.com's multimedia files. You are required to make sure that the multimedia files are shared on ABC.com's network. You start by creating a Home Group. Which of the following actions should you take? A. You should consider transferring the multimedia files to a Media Library. B. You should consider transferring the multimedia files to a shared folder. C. You should consider creating a temporary wireless network. D. You should consider alter the default media settings via the Control Panel.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains both desktop and laptop workstations. You are responsible for managing a desktop workstation named ABC-WS620. ABC-WS620 is configured to run Windows Vista. You install Windows 7 on a new partition on ABC-WS620 but you want Windows Vista to be booted by default on ABC-WS620 instead of Windows 7. What should you do? A. You should consider running Bcdedit.exe and specifying the /default parameter. B. You should consider creating a boot.ini file in the root of the Windows 7 partition. C. You should consider running MSCONFIG and specifying the /bootOS parameter. D. You should consider running bootcfg.exe and specifying the /default parameter.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are responsible for managing a workstation named ABC-WS624. ABC-WS624 is configured to run Windows Vista and contains an accounting application named accapp.exe. ABC.com purchases a new Windows 7 workstation that will replace ABC-624. How can you export the user state as well as the settings of the accapp.exe so that it can be migrated to the Windows 7 workstation? A. By modifying the migapp.xml file on ABC-WS624 and then run Scanstate.exe with the /i parameter. B. By running USMT on ABC-WS624 and then running Loadstate.exe with the /ui parameter. C. By running Scanstate.exe with the /migapp parameter on ABC-WS624. D. By running migapp.exe with the /loadstate parameter on ABC-WS624.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. What should you do to increase the size of the paging file for a Windows 7 computer named ABCWS680? A. You should consider having the Advanced system settings modified from System. B. You should consider having the System protection setting modified from System. C. You should consider adding more RAM. D. You should consider modifying the permissions on pagefile.sys

A

You work as a senior desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been assigned a trainee technician, named Andy Reid. Andy Reid has enquired what the purpose of the oobeSystem Configuration Pass is. Which of the following options best describe your response? A. It configures settings that are applied during the end-user first-boot experience, which is also known as Windows Welcome. B. It enables OEMs and corporations to install additional device drivers, applications, and other updates to a master Windows image. C. It is used to create a Windows reference image that can be used throughout an organization. D. It applies machine-specific information for the Windows image.

A

You work as a technician at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been instructed to install an additional hard disk into one of ABC.com's workstations. The additional hard disk must be used as a backup device for system images. You are required to configure the new hard disk to make sure that it operates as expected. Which of the following actions should you take? A. You should consider creating an NTFS partition. B. You should consider creating a FAT partition. C. You should consider creating a Raid 5 volume. D. You should consider creating a Raid 10 volume.

A

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. ABC.com has a workstation that is logged on to by numerous ABC.com employees. Each employee is required to encrypt data on the workstation. This data must, however, be accessible to you. Which action should you take? A. You should consider executing the Cipher command-line tool with the /k parameter B. You should consider executing the Cipher command-line tool with the /a parameter C. You should consider executing the Cipher command-line tool with the /f parameter D. You should consider executing the Cipher command-line tool with the /p parameter

A

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been instructed to make sure that the Windows Event Collector Service is enabled on a workstation, named ABC-WS07. To achieve this, you are required to execute the Wecutil.exe command. You want to include the necessary parameters. Which of the following actions should you take? A. You should consider making use of the qc parameter. B. You should consider making use of the ds parameter. C. You should consider making use of the rs parameter. D. You should consider making use of the ss parameter.

A

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. You have created a shared folder that must be available to you from your workstation even when you are not connected to the network. You then configure the folder with the Always available offline option.You want to make sure that your workstation hosts an offline version of the folder. Which of the following actions should you take? A. You should consider reviewing the status of the folder via the Sync Center. B. You should consider making use of the search option on the workstation. C. You should consider reviewing the status of the folder by accessing the Event Viewer. D. You should consider reviewing the status of the folder by accessing Programs and Features.

A

Display Applet

A Control Panel applet that gives you links to adjust the screen resolution, calibrate color, change display settings, adjust ClearType text, and set a custom text size.

Biometric Devices Applet

A Control Panel applet that is used to configure biometric devices and the authentication data associated with them.

REGEDIT

A GUI for viewing, editing, and backing up the system registry.

Snap-in

A Microsoft Management Console - a graphical interface that provides a structured environment to build management utilities.,

MS-CHAP-v1&2

A Microsoft version of the Challenge- Handshake Authentication Protocol (CHAP). MSCHAP-v1 adds features to change the password during a session, as well as limit authentication retries, between a client and server. MS-CHAP-v2 added the ability for both sides to confi rm each other's identity instead of just the server confirming the client's identity.

Striped Volume

A RAID 0 implementation using dynamic disks.

Duplexed Mirror

A RAID 1 implementation that uses one hardware controller for the fi rst disk in a RAID1 pair, and a second different hardware controller for the second RAID 1 disk. This increases fault tolerance in the case where a disk controller fails instead of a single disk. IDE and SCSI implementations of RAID 1 would typically use one hardware controller to manage both RAID 1 members. In this case the hardware controller would be a single point of failure.

Mirrored Volume

A RAID 1 implementation using dynamic disks.

B. Folder Properties window

A Remote Assistance session is established with a user's computer that runs Windows 7 Enterprise. You need to verify that a local file is encrypted with the Encrypting File System (EFS). What should you use to accomplish this goal? A. netsh command B. Folder Properties window C. Device Manager D. Share permissions E. Services management console F. Group Policy management console G. icacls command H. User Account Control Settings Control Panel window I. Local Users and Groups

Virtual DOS Machine (VDM)

A Win32 application that emulates a DOS environment for use by DOS and Win16 applications.

Windows Server Update Services (WSUS)

A Windows Server application that is used to control the process of downloading and applying updates to Windows 2000, Windows XP, Windows Vista, and Windows 7 clients.

Windows Resource Protection

A Windows 7 feature that protects system fi les and registry keys from unauthorized changes.

Internet Connection Sharing (ICS)

A Windows 7 feature that allows multiple computers to share an Internet connection by performing NAT.

WSUS

A Windows Server aplication that is used to control the process of downloading and applying updates to Windows 2000, Windows XP, Windows Vista, and Windows 7 clients.

Service

A Windows application that runs in the background without user interaction. Provides functionality to remote clients over the network.

System Image Recovery

A backup option to save the current operating system partition and all of its data to an image-based fi le.

What is a Capture image?

A boot image into which you boot a computer to capture its OS in a WIM file.

WHat is a discover image?

A boot image that locates a WDS server.

Control Panel

A central location for Windows 7 Management utilities. Most system settings are configured here.

Driver Store

A central location in Windows 7 where drivers are located before they are installed. A large set of drivers is included with Windows 7.

Network and Sharing Center

A central location used to view network status and detailed network information.

Client

A client allows you to communicate with a particular service running on a remote computer.

security identifier (SID)

A coded value assigned to a user account when it is fi rst created to act as a unique identifi er that is not duplicated for any other account. The security identifi er is unique, regardless of what name is assigned to the user's account.

Security Identifier (SID)

A coded value assigned to a user accoutn when it is first created to act as a unique identifier that is not duplicated for any other account. The security identifier is unique, regardless of what name is assigned to the user's account.

Windows Automated Installation Kit (WAIK)

A collection of utilities and documentation for automating the deployment of Windows 7.

Group Policy Object (GPO)

A collection of Group Policy settings that can be applied to client computers.

RAID 0

A collection of disks that combine their storage capacity by striping data across all drives. Data is written in a fixed block size, typically sized in KB, in a sequential fashion to each disk. The first block of data for a file is written to the first disk, the second block of data to the second disk, and so on until the last drive is reached. The next block of data starts over with the first drive and the process continues with each subsequent block of data written to the next disk. This type of storage is not fault tolerant and the failure of a single disk will result in the loss of all file data. This type of storage will generally improve write and read performance when compared with a single disk. The number of disks that can be pooled this way is limited by the operating system or hardware controller used to pool the disks.

Image

A collection of files captured using ImageX and stored in an image file.

Executive Services

A collection of kernel model support modules to manage low-level duties in the operating system such as scheduling processes, managing memory, managing virtual environments, and running core kernel programming.

What are the Executive Services?

A collection of kernel model support modules to manage low-level duties in the operating system such a scheduling processes, amanging memory, amanging virtual environments, and running core kernel programming.

MMC console

A collection of one or more snap-ins that are saved as an .msc file for later use.

Password Policy

A collection of settings to control password characteristics such as length and complexity.

Ease of Access Center applet

A collection of settings to make Windows 7 easier to use for those that have visual or hearing impairment.

Ease of Access

A collection of settings to make Windows 7 easire to use for those that have visual or hearing impairment.,

Account Lockout Policy

A collection of settings, such as lockout duration, that control account lockouts.

Application Compatibility Toolkit

A collection of tools, advice, and methodologies that guides the IT administrator in determining which legacy applications are compatible with Windows 7 and how to help make them compatible.

Application Compatibility Toolkit

A collection of tools, advice, and methodologies that guides the IT administrator in determining which legacy applications are compatible with Windows 7.

Preshared Keys

A combination of numbers, characters, and symbols that make up a pass-phrase that both sides of an authenticated and encrypted network connection must know to decode the data delivered between them successfully.

ImageX

A command-line tool for managing WIM images.

Deployment Image Servicing and Management (DISM)

A command-line tool that can be used to service Windows 7 images offline or online.

Secedit

A command-line tool that is used to apply, export, or analyze security templates.

REG.EXE

A command-line utility for viewing, editing, and backing up the system registry.

ipconfig

A command-line utility that can be used to display and manage IP address settings for network interfaces on a computer.

Route

A command-line utility that can be used to display and manage the routing table.

nbtstat

A command-line utility that can be used to display protocol statistics and current TCP/IP connections using NetBIOS over TCP/IP.

netstat

A command-line utility that can be used to display protocol statistics and current TCP/IP network connections.

netsh

A command-line utility that can be used to display, change, add, and delete network confi guration settings on a computer, including basic and advanced settings.

Hostname

A command-line utility that can be used to identify the name of the computer.

Postscript

A common language used by printers to describe how a page is printed.

Blue Screen Of Death (BSOD)

A common term used to describe an error condition in the operating system that has resulted in a full halt of the operating system due to a critical error. The error screen is usually white text on a blue background, hence the name.

QUESTION 365 see exhibit

A company has client computers that run Windows 7. You create an AppLocker policy for the client computers. You need to ensure that the AppLocker policy is enforced after the computer restarts. Which service should you modify? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

Network Access Protection (NAP)

A computer authorization system for networks that prevents unhealthy computers from accessing the network.

QUESTION 387

A computer that runs Windows 7 becomes infected with malware. You scan the computer, remove all detected malware components, and restart the computer. When you attempt to connect to a financial institution's Web site, Internet Explorer redirects to another Web site and displays an alert that the Web site may be a phishing site. You need to prevent the computer from beeing redirected to the potential phishing site. What should you do? A. Run IpConfig /flushdns. B. Configure InPrivate Browsing. C. Configure the SmartScreen Filter. D. Modify the hosts file. Correct Answer: C

D. Shrink the primary partition.

A computer that runs Windows XP has one basic disk containing a single partition. The partition has 30 GB of free space. The hard disk has 5 GB of unallocated space. You need to install Windows 7 in a dual-boot configuration. Windows 7 must not be installed in a virtual hard disk (VHD). What should you do first? A. Compress the hard drive. B. Extend the primary partition. C. Share the hard drive. D. Shrink the primary partition.

What is meant by an Unhealthy computer?

A computer with outdated anti-virus & security patches.,

Dual Boot Installation

A computer with two operating systems installed at the same time. The user selects an operating system during start up.

Dual Boot

A computer with two operating systems installed at the same time. The user typically selects an operating system to load during start up.,

Routing Table

A data table that is used by Windows 7 to select the next IP address data must be delivered to ultimately deliver data to a given target address.

CD-ROM File System (CDFS)

A file system introduced with Windows 95 and Windows NT to organize files and folders on a CD-ROM disk. The CDFS file system is considered adequate for older CD-ROM disks but not for rewritable CD-ROMs or newer DVD media formats. For those newer media technologies, UDF is the preferred file system.

New Technology File System (NTFS)

A file system introduced with Windows NT. NTFS supports advanced features to add reliability, security, and fl exibility that file systems such as FAT and FAT32 do not have. NTFS is the preferred file system for use with Windows 7.

Dynamic Link Library files (DLLs)

A file that holds application code modules. These modules are shared among applications, so the file is also called a library.DLL files can be replaced to update an application without having to replace the entire application.

Image file

A file that stores one or more images. The size of an image file is minimized through the use of single-instance storage when a file exists in multiple images.

Really Simple Syndication (RSS)

A format for distributing content as articles. Internet Explorer 7 is capable of reading RSS feeds.

RSS

A format for distributing content as articles. Internet Explroer 7 is capable of reading RSS feeds.,

Plug and Play technology

A general term used to describe hardware that can be plugged in to the computer system and removed at any time. The computer will recognize the hardware dynamically, load a device driver for it, and make it available to the user in a short period of time.

FAT

A generic term that refers to early versions of the FAT file system (FAT12, FAT16) or to any FAT file system in general, also see File Allocation Table.

x64

A generic term used to refer to Intel and AMD CPU processors capable of 64 bit operations that are compatible with the Windows operating system.

Microsoft Management Console (MMC)

A graphical interface shell that provides a structured environment to build management utilities.

Windows Easy Transfer

A graphical wizard for migrating user fi les and settings from Windows 2000 Professional, Windows XP, or Windows Vista to a new Windows 7 computer.

Tree

A group of Active Directory domains that share the same naming context and have automatic trust relationships among them.

802.11

A group of IEEE standards that define how to transfer Ethernet 802.3 data over wireless networks.

802.3

A group of IEEE standards that define the transfer of data over wired Ethernet based networks.

Administrative Tools

A group of MMC consoles that are used to manage Windows 7. Computer Management, Event Viewer, and Services are the most commonly used.

Shim

A group of fixes for applications applied by the Application Compatibility Toolkit.,

ad hoc network

A group of wireless computers sharing data directly with each other without the use of a wireless access point.

Hardware Compatibility List (HCL)

A legacy method of determining if hardware is compatible with the operating system. This has been replaced by the Windows Catalog and the Windows Marketplace Web site.

Industry Standard Architecture (ISA)

A legacy standard for connecting expansion cards to the motherboard in computers.

Drive Letter

A letter of the alphabet assigned to a formatted partition or volume as a reference point for future access by the user or their applications.

What use are drive letters?

A letter of the alphabet assigned to a formatted partition or volume as a reference point for future access by the user or their applications.,

Registry Key

A level in a hive's hierarchy defi ned by its name and position relative to other keys in the hive hierarchy. A registry key can contain subkeys (other registry keys), values, or both.

Windows PE

A limited version of Windows that can be used to perform recovery tasks and install Windows 7.

Suggested Sites

A list of Web sites provided by Internet Explorer 8 based on the content that you are currently looking at.

Windows 7 Compatability Center

A list of software or hardware and associated device drivers that have been tested with Windows 7.

Advanced Sharing

A method for sharing folders that allows you to pick the specific options you want. NTFS permissions are not configured.

Thunking

A method where data and parameters passed from 16-bit software to 32-bit software is translated in a bidirectional manner

Thunking

A method where data and parameters passed from 16-bit software to 32-bit software is translated in a bidirectional manner.,

X.25

A networking technology standard that defi nes packet switching networks used for WAN connectivity.

Active Partition

A primary partition that is indicated in the partition table as the partition to use when loading the rest of the operating system. If a basic disk has multiple primary partitions, only one primary partition can be marked as active at a time. The primary partition's boot sector is used to load the rest of the operating system.

Mandatory Profile

A profile that cannot be changed by users. NTUSER.DAT is renamed to NTUSER.MAN.

Last Known Good Configuration

A recovery option that restores settings in the registry hive HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet that were in place the last time the computer was started successfully and a user logged on.

System Restore

A recovery option that restores the operating system to a previously saved state by reversing changes to Windows system fi les, the registry, and newly installed software.

System Restore

A recovery option that restores the operating system to a previously saved state by reversing changes to Windows system files, the registry, and newly installed software.

Virtual Private Network (VPN)

A remote access technology that creates an encrypted tunnel for communication between the VPN client and a remote access server. VPN connections are commonly used over the Internet to secure communication when accessing offi ce data from home.

B. Run Psr.exe and then click Start Record.

A remote user has a computer that runs Windows 7. The user reports that he receives several error messages while using an application. You do not have remote access to the user's computer. You need to tell the user how to create screenshots of the actions he performs on the computer. The solution must track the mouse actions that the user performs. What should you instruct the user to do? A. Press ALT+PrintScreen. B. Run Psr.exe and then click Start Record. C. From Mouse Properties, select Display pointer trails. D. Run Snippingtool.exe, click New, and then click Window Snip.

DirectAccess

A replacement for VPN access to corporate intranet data sources and applications utilizing bidirectional IPv6 communication with a specialized DirectAccess server. Workstations and users connect separately, allowing corporate IT administrators to manage both.

Direct Access

A replacement for VPN access to corporate intranet data sources and applications utilizing bidirectional IPv6 communication with a specialized DirectAccess server. Workstations and users connect separately, allowing corporate IT administrators to manage both.

Multimaster Replication

A replication system where updates can be performed on any server and are replicated to all other servers.

Smart Card

A small physical card that contains a processor and memory. The processor is capable of interacting with a computer in which the card is plugged. The most common use of a smart card is to store and validate personal security credentials for a computer or user. The smart card can be physically removed and stored in a small space, such as a wallet

MMC snap-in

A small software component that can be added to an MMC console to provide functionality. An MMC snap-in typically manages some part of Windows.

Shadow copy

A snapshot of the fi le system that tracks changes to fi les and allows the restoration of previous fi le versions.

Shadowcopy

A snapshot of the file system that tracks changes to files and allows the restoration of previous file versions.,

System Center Configuration Manager (SCCM)

A software package that can perform inventory, implement a standardized confi guration, deploy software, deploy operating systems, and deploy software updates.

TrustedInstaller

A special security service designed to restrict access to critical operating system fi les and registry settings. Administrators and the operating system only have read-only access to resources protected by TrustedInstaller. The TrustedInstaller service will not install an update unless Microsoft digitally signs the update.

Backup DC (BDC)

A specialized Windows NT server that is responsible for holding a read-only copy of the domain security database.

Primary DC (PDC)

A specialized Windows NT server that is responsible for holding a writeable copy of the domain security database.

Access Control Entries (ACE)

A specific entry in a fie or folder's ACL that uniquely identifies a user or group by its security identifier and the action it is allowed or denied to take on that file or folder.

Windows Display Driver Model (WDDM)

A standard API for writing device drivers that are compatible with the newer graphical subsystem that is part of Windows 7.

Local

A type of account stored only on the machine on which they are created.,

Terabyte

A unit of data that consists of 1024 gigabytes. Commonly abbreviated as TB.

D. Start the computer from the Windows 7 installation media and select Install now.

A user reports that he is unable to start his computer. He provides the following information: - The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker). - The user cannot locate his BitLocker recovery key. You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort. What should you do? A. From the BIOS, disable the Trusted Platform Module (TPM). B. Start the computer from the Windows 7 installation media and select Repair your computer. C. Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK. D. Start the computer from the Windows 7 installation media and select Install now.

C. Use the Restore Files Wizard to restore the Favorites folder in the user's backed-up profile.

A user telephones your help desk. Her Favorites list is corrupt and she is having problems accessing the Web sites she visits regularly. All the computers in your organization are backed up every night with a file and folder backup that uses default settings. A restore point was created on all the company's client computers 24 hours ago because a new device driver was installed. You performed a System Image backup on all the computers in your organization three weeks ago. The user is not computer-literate and you need to fix the problem for her. What is the most efficient way to do so? A. Perform a system restore. B. Perform a System Image restore. C. Use the Restore Files Wizard to restore the Favorites folder in the user's backed-up profile. D. Access the History tab under Favorites on the user's browser. Browse to recently visited sites and add them to Favorites.

C. Open her Recycle Bin, right-click the file, and choose Restore.

A user telephones your help desk. She has just accidentally deleted a file she was working on earlier that day. You have configured her computer to carry out backups every evening, and you installed a new graphics driver two days ago. How should you advise the user to retrieve her file? A. Open the Backup And Restore console and restore the file from backup. B. Use the Restore Previous Versions feature to restore the file. C. Open her Recycle Bin, right-click the file, and choose Restore. D. Perform a system restore.

B. Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off.

A user wants to install the games included with Windows 7 on his PC. They were not installed by default. Windows components can be added or removed using which of the following in Windows 7. A. Click the Start Bar, Control Panel, Add/Remove Programs, and click Windows Components. B. Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off. C. Click the Start Bar, Settings, Windows Control Center. D. Right click the "My Computer" icon, Choose Properties, Choose Computer Management, on the left pane choose Add Remove Windows Components.

Windows Fax and Scan

A utility in Windows 7 to manage scanning and faxing.

Aero Glass

A visual effect that is part of the Aero theme of Windows 7. Many graphical elements have a semitransparent appearance to allow users to see other windows under the active one. This is done to allow the user a better feel for what other applications are doing in the background without being too distracting.

What is a Path rule?

A way of restricting access to applications that specifies a specific path by path.,

Services

A windows application that runs in the background without user interaction. Provides functionality to remote cients over the network.,

Create A Shared Folder Wizard

A wizard in Computer Management to create shared folders that does not configure NTFS permissions.

Share With

A wizard that simplifi es the setup process of sharing folders and confi guring relevant share and NTFS permissions.

You are employed as the network Administrator at ABC.com. The ABC.com network client computers currently make use of Microsoft Windows XP Professional. ABC.com has recently decided to have the client computers upgraded to Microsoft Windows 7. You decide to check whether the current workstations comply with the minimum hardware requirements to be able to use Windows 7. Which of the following are minimum requirements? (Choose all that apply) A. You will require a 16 GB available disk space (32-bit)/20 GB (64-bit). B. You will require a 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor. C. You will require a 1 Gbps network card. D. You will require a DirectX 9 graphics processor with WDDM 1.0 or higher driver. E. You will require a 4GB RAM (32-bit)/2 GB RAM (64-bit).

ABD

You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All computers on the ABC.com network are configured to run Windows 7. You are in the process of identifying the various ratings for games in Windows 7. What will you find? A. You will find the Teen (T) rating setting in Windows 7. B. You will find the Everyone (E) rating setting in Windows 7. C. You will find the General Audience (G) rating setting in Windows 7 D. You will find the Universal (U) rating in Windows 7. E. You will find the Adults Only (AO) rating setting in Windows 7.

ABE

You are employed as desktop technician at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. A user contacts you to ask what the problem is when a flag with a red "x" in the toolbar indicates. Which of the following could be the possible cause? (Choose ALL that apply.) A. Information system alerts. B. E-mail alerts. C. Configuration alerts. D. Restriction alert.

AC

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have set up a test computer that has Windows 7 installed. You have configured a user account that belongs to the Administrators group, and a user account that belongs to the Users group. The accounts are named TestA and TestU respectively. You are then instructed to make sure that the Control Panel is inaccessible to TestU and completely accessible to TestA. Which of the following actions should you take? (Choose TWO.) A. You should consider configuring a local GPO, and associating it with the TestU account. B. You should consider configuring a local GPO, and associating it with the TestA account. C. You should consider making use of the Prohibit Access to Control Panel option via User Configuration. D. You should consider making use of the Allow Access to Control Panel option via User Configuration.

AC

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. You want to configure ABC.com's workstations to produce a new Security ID (SID) as well as a Welcome screen when the workstation is booted.You plan to make use of the Sysprep.exe tool on each workstation. You need to select the required parameters. Which combination of the following options should you use? (Choose ALL that apply.) A. Oobe B. audit C. generalize D. reboot E. shutdown F. quit G. quiet H. unattend:answerfile

AC

Tags

Additional metadata that can be added to the properties of a fi le.

Internet Key Exchange Version 2 (IKEv2)

An authentication protocol that identifies the identity of both the client and server to each other. Once the identity of both sides is established, one or more IPSec based SAs are established between them for data transfer. IKEv2 is considered a strong authentication protocol.

Dynamic Host Configuration Protocol (DHCP)

An automated mechanism to assign IP addresses and IP configuration information over the network.

A. Carry out a System Image restore. D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.

An employee who works from home telephones your help desk. A virus attack has deleted his computer's single internal hard disk. He carried out a System Image backup on his computer three months ago and automatically backs up his personal files every night. He uses an external USB hard drive formatted with the NTFS file system to hold his backups. All his personal files are in his Documents library. What do you advise? (Choose all that apply; the answers form a complete solution.) A. Carry out a System Image restore. B. Carry out a system restore. C. Use Restore Previous Versions to restore his Documents library from a shadow copy. D. Use Restore My Files in the Backup And Restore console to restore his Documents library folder.

Mount Point

An empty folder in an NTFS-formatted file system that is used to point to another FAT,FAT32, or NTFS partition.

What are Volume Mount Points and how are they set up?

An empty folder in an NTFS-formatted file system that is used to point to another FAT, FAT32, or NTFS partition. The mount point appears as just another folder in the file system.

Protected Extensible Authentication Protocol (PEAP)

An enhancement of EAP that encrypts the entire EAP process. This protects all EAP communication before authentication is performed.

Alert

An event that is triggered when a count value is above or below the specified threshold value.

Alert

An event that is triggered when a count value is above or below the specified threshold value.,

Device Setup Class

An identifier included with a hardware device driver that describes how the device driver is to be installed.

What is a boot image?

An image that initially boots a target computer.

What is a install image?

An image that you install on a target computer.

Image-based installation

An image-based installation that uses ImageX to apply an image of an operating system to a computer. The image can include applications as well as the operating system.

Serial Line IP (SLIP)

An implementation of the IP protocol over serial lines. SLIP has been made obsolete by PPP.

Package Manager

An installation manager that manages the addition of packages.,

DVD Boot Installation

An installation of Windows 7 that is started by booting from CD or DVD to run Setup.exe.

Distribution Share Installation

An installation of Windows 7 that is started by running Setup.exe over the network from a distribution share.

Unattended Installation

An installation that does not require any user input because all necessary confi guration information is provided by an answer fi le.

Unattended Installation

An installation that does not require any user input because all necessary configuration information is provided by an answer file.,

Clean Installation

An installation that is performed on a new computer, or does not retain the user settings or applications of an existing computer.

Upgrade Installation

An installation that migrates all of the settings from a preexisting operating system to Windows 7.

Attended Installation

An installation when a network administrator must be present to answer configuration questions presented during Windows 7 installation.

Attended Installation

An installation when a network administrator must be present to answer configuration questions presented during Windows 7 installation.,

Away Mode

An instant-on power saving mode that keeps the system in the S0 state.

Windows Sockets (Winsock) user mode

An interface that supports communication between user applications such as a Web browser and the TCP/IP protocol.

Winsock Kernel (WSK)

An interface that supports communication between kernel mode software, such as clients and services, and the TCP/IP protocol.

Network Driver Interface Specification (NDIS)

An interface that supports communication between network protocols and network drivers.

Offline Update

An offline update is applied to Windows 7 during installation before Windows 7 is started. The packages used for offline updates are supplied by Microsoft

ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network workstations are configured to run Windows 7.You are assigned a computer named ABC-SR05. During the course of the day you receive an instruction from the CIO to identify the applications that were installed on ABC-SR05 the previous week. You need to gather this information as soon as possible. Which of the following actions should you take? A. You can locate this information by reviewing the informational events from the Reliability Monitor, and by checking the Programs and Features section in the Control Panel. B. You can locate this information by reviewing the informational events from the Reliability Monitor, and by viewing all events in the Applications Log in Event Viewer. C. You can locate this information by reviewing the informational events from the Reliability Monitor, and by checking the process list in Task Manager. D. You can locate this information by viewing all events in the Applications Log in Event Viewer, and by checking the process list in Task Manager. E. You can locate this information by viewing all events in the Applications Log in Event Viewer, and by checking the Programs and Features section in the Control Panel. F. You can locate this information by checking the Programs and Features section in the Control Panel, and by checking the process list in Task Manager.

B

You are employed as an Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been instructed to make sure that a user is able to run a program that requires administrator rights. The user should not, however, be given permanent administrator rights. Which of the following options should you take? A. You should consider granting the user local administrator rights. B. You should consider logging on to the user's workstation every time the user wants to run the program, and enter your password. C. You should consider giving the user your password. D. You should consider adding the user to the global administrators group.

B

You are employed as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are responsible for managing a computer named ABC-WS25 that is using Windows 7 operating system.You notice that your computer is running very slowly when it is connected to the network. What step you can do to help you in viewing the processes that are producing network activity at present in order to identify the problem? A. You should consider changing the Windows Firewall settings. B. You should consider opening Resource Monitor and clicking the Network tab.. C. You should consider viewing the status of the network connection. D. You should running the netstat command.

B

You work as an administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 Enterprise installed, and are assigned both static and dynamic IP addresses. Subsequent to aABC.com DNS server being reconfigured, ABC.com users whose workstations have statically assigned IP addresses report that they are now unable to access the network servers. You want to make sure that IP addresses and DNS server addresses are received by ABC.com's workstations via a DHCP server. Which of the following actions should you take? A. You should consider making use of the Nslookup command. B. You should consider making use of the Netsh command. C. You should consider making use of the Ntsd command. D. You should consider making use of the Ipseccmd command.

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. After a recent Windows update, you realize that the update was unnecessary and taking up valuable space. You would like to remove the update with as little administrative effort. Which of the following actions should you take? A. You should consider making use of a System Restore. B. You should consider accessing Programs and Features from the Control Panel. C. You should consider making use of Internet Explore to uninstall the update. D. You should consider rebooting with the Last Known Good Configuration option.

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. When you receive reports from a ABC.com user, named Kara Lang, saying that she is constantly experiencing problems with her hardware, you want to view her workstation's hardware problem history for the last 3 months. Which of the following actions should you take? A. You should consider running replemon.exe on Kara Lang's workstation. B. You should consider making use of the Reliability Monitor on Kara Lang's workstation. C. You should consider making use of the Event viewer on Kara Lang's workstation. D. You should consider running a trace on Kara Lang's workstation.

B

You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com has its headquarters in London and a branch office in Athens. All servers on the ABC.com network run Windows Server 2008 and all client computers run Windows 7. The servers are located at the London office and the client computers at the Athens office. BranchCache has been enabled on the services located at London Office. You receive numerous complaints from users at the Athens office stating that it takes a long time to open large files in the London office. How could you minimize the time it takes for users in the Athens office to open files from the London office? A. Your best option would be to enable Universal Group Caching in the Athens office. B. Your best option would be to configure the client computers to make use of the BranchCache Distributed Cache mode at the Athens office. C. Your best option would be to configure DFS to replicate the data from the London office to the Athens office. D. Your best option would be to configure a VPN between the London office and the Athens office.

B

You are employed as a desktop technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are working on a client computer named ABC-WS680 running on Windows 7. You want to determine whether recent Windows Updates have been applied to ABC-WS680. What should you do? (Each correct answer presents a complete solution. Choose TWO.) A. You should check the %systemroot%\Updates folder. B. You should check the ReportingEvents.log file. C. You should check the update history in the Windows Update applet. D. You should check the WindowsUpdate.log file. E. You should check the Setup event log.

BC

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are working on a Microsoft Windows 7 workstation named ABC-WS680. that has not been responding properly. You had performed an image backup of ABC-WS680 last week that you now want to restore. What should you do? (Each correct answer presents part of the solution. Choose TWO.) A. You should consider selecting the Last Known Good Configuration boot option on ABC-WS680. B. You should consider booting ABC-WS680 from the Windows 7 DVD. C. You should consider running the Startup Repair tool. D. You should consider running the System Image Recovery tool. E. You should consider booting ABC-WS680 from Windows Preinstallation Environment (Windows PE). F. You should consider running the Imagex.exe utility.

BD

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. Subsequent to installing a new display adapter in a test workstation, named ABC-WS001, you install the accompanying driver. You then reboot ABC-WS001, and a blank screen is presented. You have to rectify the problem as soon as possible. Which of the following actions should you take? (Choose ALL that apply.) A. You should consider acquiring a new display adapter. B. You should consider restarting ABC-WS001, and accessing the Advanced Boot Options. C. You should consider making use of ASR. D. You should consider configuring the BIOS. E. You should consider using the Safe Mode, Enable Low Resolution Video, or Last Known Good Configuration (Advanced) options.

BE

ABC.com has employed you as a network Administrator. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network run Windows Server 2008 and all client computers run Windows 7. ABC.com has multiple custom applications that are digitally signed. For security purposes ABC wants you to devise a security policy that will only enable company approved digitally signed applications to be executed.Which of the following options would achieve this? A. Your best option would be run Software Explorer on each client computer. B. Your best option would be to Bitlocker rule created. C. Your best option would be to have an AppLocker executable rule created. D. Your best option would be to have a software restriction policy that applies a path rule.

C

ABC.com has hired you as a network Administrator for their network. All servers on the ABC.com network run Windows Server 2008. Half the client computers run Windows Vista and the rest Windows XP Professional. You are in the process of identifying the utilities are not a part of Windows PE. What should you identify? A. You should consider identifying Winpeshl. B. You should consider identifying Oscdimg. C. You should consider identifying Subinacl. D. You should consider identifying Diskpart.

C

You are employed as the network Administrator at ABC.com. The ABC.com network workstations are configured to either use Windows XP Professional or Windows Vista. ABC.com management is considering an upgrade of all workstations to Windows 7. Management has enquired which mail client forms part of the Windows 7 package. Which of the following statements best describes your response? A. Outlook Express. B. Microsoft Mail. C. Windows 7 does not contain a preinstalled mail client. D. Windows Live Mail.

C

You are employed as the network administrator at ABC.com. The ABC.com network contains 150 client computers currently running Microsoft Windows XP Professional. ABC.com has recently decided to deploy Windows 7 to 80 client computers on the ABC.com network. You decide to install Windows 7 on a computer named ABC-WS06 and want it to be an image for all the remaining computers on the network. You need to determine which step can be performed prior to the creation the image of ABCWS06? A. You should consider starting ABC-WS06 from the Windows Preinstallation Environment.Thereafter the Setupmgr utility should be run. B. You should consider running unattended installation answer file on the computer. C. You should consider running Sysprep. D. You should consider running Windows System Image Manager (Windows SIM).

C

You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a Virtual Private Network server named ABC-SR01 that is configured to run Windows Server 2008. You are responsible for a computer named ABC-WS10 that is configured to run Windows 7. During the course of the day you receive an instruction from the CIO to make use of a smart card for authentication of ABC-SR01 in order to establish connevitity to ABC-SR01 . What should you do? A. Your best option would be to make use of PAP. B. Your best option would be to make use of PMS-CHAP v2. C. Your best option would be to make use of EAP. D. Your best option would be to make use of MS-CHAP. E. Your best option would be to make use of PCHAP.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. You used Microsoft Application Compatibility Toolkit for the creation of an application shim named APPSHIM for an accounting application named ACCOUNTAPP which is created by ABC.com (Third Party) What should you do to make sure that when ACCOUNTAPP is run next time, the APPSHIM should be applied? A. You should consider modifying the permissions on the application file. B. You should consider reinstalling the application. C. You should consider having the Sdbinst.exe command run. D. You should consider running Windows Update. E. You should consider having the Msiexec.exe command run.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. All the client computers are connected to ABC.com. All the client computers are running Windows Remote Management as well. You need to perform the task of creating additional disk volumes on one of the computers named ABC-WS01. However you need to perform the task from another computer on the network named ABC-WS02. What step can you perform in order to accomplish this task? A. You should consider running the Diskpart \\ABC-WS01 command on ABC-WS02. B. You should consider running Disk Management on ABC-WS02 and connect to ABC-WS01. C. You should consider having the Winrs command run and then running the Diskpart command on ABC-WS02. D. You should consider having the Diskmgmt.msc \\ABC-WS01 command on ABC-WS02.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com has two client computers ABC-WS01 and ABC-WS02 which have Windows Remote Management (WinRM) enabled. During the course of the day you receive instruction from ABC.com to have an additional disk volume created remotely on ABC-WS01 using ABC-WS02. What should you do? A. You should consider running the Diskpart \\ABC-WS-01 command on ABC-WS02. B. You should consider running Disk Management on ABC-WS02 and connect to ABC-WS01. C. You should consider having the Winrs command run and then running the Diskpart command on ABC-WS02. D. You should consider having the Diskmgmt.msc \\ABC-WS01 command on ABC-WS02.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows Vista. You are planning to upgrade a desktop workstation to Windows 7 and therefore need to find out if there are some applications running on Windows Xp which might have known problems in Windows 7. What should you do? A. You should consider instructing Mia Hamm that the winnt /checkupgradeonly command can be used. B. You should consider instructing Mia Hamm setup.exe can be used from the Windows 7 installation media. C. You should consider instructing Mia Hamm that the Windows 7 Upgrade Advisor Microsoft tool can be used. D. You should consider instructing Mia Hamm that Windows Update can be used.

C

You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are responsible for managing a computer named ABC-SR05 that is using Windows 7 operating system. ABC-SR05 is configured to host two volumes. The details of the volumns are shown below. Volume1 - C Volume2 - D Are have created a folder on the Volume2 named D:\TESTDATA. During the course of the day you receive notification from management that Windows Search should be able to index of all the contents of the folder. What action can you perform to allow this? A. You should consider enabling EFS on the folder. B. You should consider enabling the archive attribute on the folder. C. You should consider creating a new library and adding TESTDATA to it. D. You should consider modifying the permissions on the folder. E. You should consider changing the properties of the Windows Search service.

C

ABC.com has hired you as a network Administrator for their network. A ABC.com user named Rory Allen is a senior manager in the Marketing department. You receive a request from Rory Allen to ensure that his children are only able to login to Windows 7 at certain times. How would you do this? A. Your best option would be to go to the System Configuration utility and configure the logon hours. B. Your best option would be to go configure logon hours in the user account properties. C. Your best option would be to prohibit the children from using the workstation when you are at work. D. Your best option would be to go to the Start then Control Panel.Then you should go to User Accounts and Family Safety and select Setup Parental Controls.Thereafter Time Restrictions can be set.

D

ABC.com has hired you as a network Administrator for their network. The ABC.com network contains 50 client computers that are configured with Microsoft Windows XP Professional. During the course of the day you receive an instruction from the CIO to determine which current applications installed on the client computers are compatible with Windows 7. How can perform the task with the least amount of time and effort? A. You should consider running Package Manager. B. You should consider running ImageX. C. You should consider running Windows Deployment Services (WDS). D. You should consider installing Microsoft Application Compatibility Toolkit (ACT)

D

You are employed as the network Administrator at ABC.com. The ABC.com network client computers currently make use of Windows Vista Enterprise (x86). You are responsible for managing a client computer named ABC-WS20. During the course of the day you receive instructions from ABC.com to identify the Windows 7 version and edition ABC-WS20 can directly upgrade to. What should you do? A. Your best option would be to make use of Windows 7 Enterprise (x64). B. Your best option would be to make use of Windows 7 Home Professional (x86). C. Your best option would be to make use of Windows 7 Home Basic (x86). D. Your best option would be to make use of Windows 7 Ultimate (x86). E. Your best option would be to make use of Windows 7 Ultimate (x64).

D

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. You have recently installed a new application on your workstation. You want to view which resources are being consumed by this application. Which of the following actions should you take? A. You should consider making use of Device Manager. B. You should consider making use of the Reliability Monitor. C. You should consider making use of Event Viewer. D. You should consider making use of Resource Monitor

D

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. A ABC.com user, named Kara Lang, has a manually created restore point configured on her workstation. Kara Lang has requested that a copy of a file she saved to the system drive on her workstation the day before yesterday be retrieved. You want to achieve this with as little human input as possible. Which of the following actions should you take? A. You should consider restarting Kara Lang's workstation and using ASR. B. You should consider restarting Kara Lang's workstation and using the Safe Mode option. C. You should consider advising Kara Lang to access the file's properties and choosing the Sharing tab. D. You should consider advising Kara Lang to access the file's properties and choosing the Previous Versions tab.

D

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been instructed to devise a strategy to monitor ABC.com's workstations. The strategy should allow for an e-mail message to be sent whenever an application error has been logged in the event location. The strategy should also make provision for the execution of a script that reboots a workstation in the event of an application error taking place for a specified period. Furthermore, the strategy should reduce the consumption of administrative resources for application monitoring. Which of the following actions should you take? A. You should consider configuring a scheduled task on all workstations for forwarding event logs. B. You should consider configuring a scheduled task on a centralized workstation for forwarding event logs. C. You should consider having a trace log configured on all workstations. D. You should consider having an event subscription configured on all workstations to forward event logs to a centralized workstation.

D

You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com has acquired a new computer named ABCWS25 which came with the factory settings and has no operating system. You want to perform an installation of Windows 7 on ABC-WS25. There is an installation of Windows 7 available on virtual hard drive in your department. You proceed with creating a partition on ABC-WS25 and copying it to the Virtual Hard Drive from the Windows Pre installation Environment (Windows PE). What command can you use in order to boot ABC-WS25 from the virtual hard disk A. Your best options would be to make use of sysprep.exe and bootcfg. B. Your best options would be to make use of VHDmgr.exe and Diskmgmt.msc. C. Your best options would be to make use of Bcdedit.exe and Diskpart.exe. D. Your best options would be to make use of Diskpart.exe and Bcdboot.exe.

D

Deployment Image Servicing and Management

DISM. A command-line tool that can be used to service Windows 7 images offline or online.,

What is a mirrored dynamic volume?

Data on one disk is replicated on the second disk. Cannot be extended. Known as RAID Level 1. Maximum capacity is of the smallest disk.

Binary Format

Data that is stored in its raw digital form as binary numbers. Data stored in this format cannot be viewed properly by text editors such as Notepad or Wordpad.

.NET

Defines multiple Application Program Interfaces that developers use as the programming foundation for their applications. Feature sets include Windows Presentation Foundation, Windows Communication Foundation, Windows Workflow Foundation, Windows CardSpace.

Location Type

Describes the type of network: public, private, or domain. Different configuration settings are applied based on the location type.

What security levels are used in software restriction policies?

Disallowed Basic User Unrestricted

Virtual Hard Disk (VHD)

Disk space that stores fi les and folders in a formatted fi le system. The disk space is not an actual physical device; it is actually stored in a single fi le. That fi le will have the extension ".vhd". Once the vhd fi le is created it can be attached, or opened for use. The operating system can use the space inside the fi le as if it was an actual disk device, but it is really a virtual disk. The vhd fi le itself is stored on a real physical device.

Windows Flip

Displays a live thumbnail of each open Window as you use ALT-Tab to select a window. 3D Displays each open Window in a three-dimensional list and allows you to scroll through the windows using the mouse wheel.,

Windows Flip 3D

Displays each open Window in a three-dimensional list and allows you to scroll through the windows using the mouse wheel.

What information can you retrieve from the System Information Tool?

Displays information about the system in a hierarchal tree format. Provides information about hardware resources, Components, and the Software Environment.

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. A network user, named Rory Allen, is a member of a group named KingAccess and currently uses a shared workstation. Rory Allen recently informed you that the computer has a folder, named RAllen, and wants you configure the permissions on the RAllen folder. You have to make sure that the permissions are customized to allow Rory Allen to delete all files, and alter permissions on the RAllen folder. Furthermore, the permissions should give the members of the KingAccess group the ability to create files in the RAllen folder. However, members of the KingAccess group should only be allowed to delete files from the RAllen folder that they created. Which of the following actions should you take? A. You should consider having Rory Allen assigned the Modify permission whilst having the KingAccess group denied read permission assigned. B. You should consider having Rory Allen assigned the Write permission and having the Write permission assigned to the KingAccess group. C. You should consider having Rory Allen assigned the Modify permission whilst assigning theWrite permission to KingAccess group. D. You should consider having Rory Allen assigned the Change permission whilst assigning the Write permission to KingAccess group E. You should consider having Rory Allen assigned the Full Control permission whilst assigning the Write permission to the KingAccess group.

E

What authentication methods are used by IKEv2?

EAP (PEAP), EAP-MS-CHAPv2, smart cards and other certificates

What operating modes are available in AppLocker?

Enforcement Audit mode

Protocols

Established sets of rules governing communication. TCP/IP, FTP, HTTP, Telnet, UDP

Connection Oriented

Establishes connection before data is sent and ensures that data was received successfully.

Where can you find AppLocker events?

Event Viewer\Application and Services Logs\Microsoft \Windows\AppLocker

Which categories of rules are avalable in AppLocker?

Executable rules (exe and com) Windows Installer rules (msi and msp) Script rules (bat, cmd, js, ps1, vbs)

Using scripts to manage the installation process cannot ensure consistency.

False Statement.,

.VHD

File Extension indicating a Virtual PC virtual hard drive. Disk space that stores files and folders in a formatted file system. The disk space is not an actual physical device; it is actually stored in a single file. That file will ahve the extension .vhd. Once the vhd file is created it can be attached, or opened for use.

Long File Names

File names that can be a maximum of 255 characters in length.

Which parameters are specified by Designated file types policy in Software restriction policies?

File types that are considered executables.

How do you set up roaming profiles?

Find a share on network, copy NTUSER.DAT, then go back to account, add it to the profile and point to the location. Go back to the account and change the type of account it is (Roaming). Should make it a mandatory profile.

How many and which partitions can be created on a basic disk?

Four primary partitions or three primary partitions plus an extended partition; the extended partition can contain any number of logical drives.

Microsoft Security Essentials

Free antivirus software that is available if your copy of Windows 7 is genuine.

From which and to which OSes can you perform the USMT migration?

From XP, Vista, 7 to 7 From 7 to Vista

When data is lostwhat is the only way to recover it?

From a backup.,

What are the requirements for using VPN Reconnect feature?

IKEv2 VPN protocol Win 2008 R2 VPN server

C. 192.168.1.30

If you have a router in the network your connected to and the Default Gateway is set to 192.168.1.1 and the subnet mask is 255.255.255.0, which of the following are useable IP addresses on that network? A. 192.168.1.1 B. 192.168.1.300 C. 192.168.1.30 D. 192.168.2.10

IEEE

Institute of Electrical and Electronics Engineers. A professional society that promotes and nurtures the development of standards used in the application of electronic technology.,

Forest

Multiple Active Directory trees with automatic trust relationships between them.

How can you configure Direct Access client from a command line?

Netsh interface ipv6 set teredo enterpriseclient IPv4_address Netsh interface 6to4 set relay IPv4_address Netsh interface httpstunnel add interface client https://fqdn/IPHTTPS

NAP

Network Access Protection. A comptuer authorization system for networks that prevents unhealthy computers from accessing the network.,

NAT

Network Address Translation. A system that allows multiple computers to share a single IP address when connecting to the Internet.,

NDIS

Network Driver Interface Specification. An interface that supports communication between network protocols and network drivers.,

OLE

Object Linking and Embedding. A method used by some applications to cross-link to each other.,

Which VPN authentication protocol uses unencrypted passwords?

PAP

SLIP

Pre PPP, Fast, no overhead, sends all data as clear text. Obsolete, not secure.

Which policy allows you to specify the location of an internal update server?

Specify Intranet Microsoft Update Service Location

Remote Desktop (RD)

Terminal Services has been rebranded as Remote Desktop Services in Windows Server 2008 R2.

Which firewall rules are required when using Distributed Cache mode of BranchCache?

The BranchCache - Content Retrieval (Uses HTTP) predefined rule (inbound and outbound traffic on TCP port 80). The BranchCache - Peer-Discovery (Uses WSD) predefined rule (inbound and outbound traffic on UDP port 3702).

Unicast loopback address

The IPv6 loopback address is 0:0:0:0:0:0:0:1, or ::1.

Forest Root Domain

The first domain created in an Active Directory forest.,

Volume Master Key (VMK)

The key used to encrypt hard drive data when BitLocker Drive Encryption is enabled

Full Volume Encryption Key (FVEK)

The key used to encrypt the VMK when BitLocker Drive Encryption is enabled.

Work Network

The location type that is used for trusted networks where limited security is required, for example, a small offi ce.

Base Score

The overall rating of your computer generated from the subscores.

Counters

The performance indicators that can be recorded in Performance Monitor.

File Extension

Typically a three-character name at the end of a file name that is used to indicate the type of data contained in the file. Common extension examples include DOC for documents and EXE for executable programs.

C. Bcdedit.exe

What command-line utility can you use in Windows 7 to edit boot options? A. Bootmgr.exe B. Winload.exe C. Bcdedit.exe D. Winresume.exe

How often is group policy downloaded?

When someone logs on and every 5 minutes(domain) 90 minutes (user) after.,

Aero Shake

When the user clicks the top of a window and shakes the mouse, all other open windows are minimized.

When are you unable to undo a System Restore?

When you perform a system restore in Safe Mode or by using the System Recovery options.

B. Windows Professional Edition C. Windows Ultimate Edition D. Windows Enterprise Edition

Which of the following Windows 7 Editions allows you to join an Active Directory domain? (Choose three.) A. Windows Home Edition B. Windows Professional Edition C. Windows Ultimate Edition D. Windows Enterprise Edition

C. Cipher.exe

Which of the following Windows 7 utilities was used to create the output in the above figure? A. MemManager.exe B. SysPrep.exe C. Cipher.exe D. Performance Monitor

C. A flag in the taskbar with a red "x" indicates there is a problem needing attention.

Which of the following best describes how the user is alerted with information system and configuration alerts? A. A popup occurs and the Windows 7 desktop contrast is dimmed. Until you acknowledge the alert the screen will not move. B. If Aero is installed the shaking alert flag appears in the index bar of every open window. C. A flag in the taskbar with a red "x" indicates there is a problem needing attention. D. All of the above.

D. ReadyBoost

Which of the following can be used to increase the physical memory on your Windows 7 PC and increase the speed? A. PhysiRAM B. Aero Glass C. DirectAccess D. ReadyBoost

D. None of the above.

Which of the following is not a Windows PE tool? A. Diskpart B. Oscdimg C. Winpeshl D. None of the above.

B. 4GB RAM (32-bit)/2 GB RAM (64-bit)

Which of the following is not a minimum requirement to install Windows 7? A. 1 GHz or faster 32-bit (x86) or a 64-bit (x64) processor B. 4GB RAM (32-bit)/2 GB RAM (64-bit) C. 16 GB available disk space (32-bit)/20 GB (64-bit) D. DirectX 9 graphics processor with WDDM 1.0 or higher driver.

A. General Audience (G)

Which of the following is not a rating for games in Windows 7? A. General Audience (G) B. Everyone (E) C. Teen (T) D. Adults Only (AO)

D. All of the above are volume types in Windows 7

Which of the following is not a volume type usable by Windows 7? A. FAT B. exFAT C. NTFS D. All of the above are volume types in Windows 7

D. There is no preinstalled mail client included with Windows 7.

Which of the following is true of Windows 7? A. MailCentral is included as the new default mail client with Windows 7. B. Outlook Express is included with Windows 7. C. Microsoft Outlook is included with Windows 7. D. There is no preinstalled mail client included with Windows 7.

B. User Account Control

Which of the following is used to control when the security pop-up notifications are used? A. Security Control Manager B. User Account Control C. User Access Control Panel D. Notification Control Settings Manager

C. WAIK

Which of the following must you download from Microsoft's Web site to obtain USMT 4.0? A. Windows Anytime Upgrade B. Windows Upgrade Advisor C. WAIK D. Microsoft Toolkit

B. Windows XP Professional C. Windows Vista D. Windows 7

Which of the following operating systems support an offline migration using USMT? (Choose three.) A. Windows 2000 Professional B. Windows XP Professional C. Windows Vista D. Windows 7

A. Windows 7 Upgrade Advisor

Which of the following tools can you use to determine if the applications installed on your computer running Windows Vista are known to have problems with Windows 7? A. Windows 7 Upgrade Advisor B. Sysprep C. USMT D. Windows PE

B. USMT C. Windows Easy Transfer

Which of the following utilities can you use to transfer user encryption certificates from a computer running Windows XP Professional to Windows 7 Professional? Choose two. A. File Settings and Transfer Wizard B. USMT C. Windows Easy Transfer D. Robocopy.exe

A. 512 MB of RAM C. A display adapter without WDDM Support but with SVIDEO

Which of the following will cause the Online Compatibility Check to fail during a Window 7 installation? Choose two. A. 512 MB of RAM B. A display adapter with WDDM Support C. A display adapter without WDDM Support but with SVIDEO D. An 80 GB Hard Disk

Which command configures remote machine for using Windows Remote Management Service?

WinRM quickconfig

WMI

Windows Management Instrumentation. A standard for accessing operating system operational status and configuration controls through remote management utilities.,

What is WPF and what does it do for printing?

Windows Presentation Foundation. It controlls how information is drawn to screen. XPS uses a subset of commands WPS uses in order to render the jobs. This allows documents to be rendered exactly as they appear on screen because no conversion to a different format is necessary.,

Which utility can assist with the creation of answer files?

Windows SIM

Tools included with Windows AIK are ...

Windows SIM, ImageX, DISM, Windows PE, USMT

WOW

Windows on Windows. For running 32-bit & 16-bit windows apps on modern computers through a process called Thunking.,

A. Install another 1 GB of RAM.

You administer a desktop computer that has the following hardware specifications: - Dual-core 2.5 GHz processor - 1 GB RAM - 25 GB unpartitioned disk space - Onboard graphics that has WDDM 1.0 You install a customized Windows 7 Enterprise 64-bit image on the computer by using unpartitioned disk space. The computer operates unacceptably slow. You need to improve the performance of the computer. What should you do? A. Install another 1 GB of RAM. B. Open Task Manager. Set the priority of all SYSTEM processes to High. C. Install a video card that has 128 MB of video RAM. D. Perform the initial Windows Experience Index run.

QUESTION 404

You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You log on to one of the portable computers by using a domain user account and install a new device for a bar-code scanner. You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable. You need to be able to roll back the driver to its previous version. What should you do? A. From the Local Group Policy, modify Device Installation Restrictions. B. Run the Device Manager by using elevated permissions. C. Start the portable computer from the Windows 7 installation media and select Startup Repair. D. Start the computer and select Last Known Good Configuration from the advanced startup options. Correct Answer: B

QUESTION 399 see exhibit

You are performing a native VHD boot from Windows Vista to Windows 7 Professional. Window 7 Professional is installed on F:\Windows7Pro.vhd. You run the bcdedit /copy {current

QUESTION 300 see exhibit

You are performing an audit of the installed updates on a computer running Windows 7 Enterprise. You need to find a list of the installed updates on the computer. Which settings categories should you choose? (To answer, select the appropriate settings in the work area.) Hot Area: Correct Answer:

QUESTION 418

You are the network administrator for your organization. You are asked by your manager to modify a few file extensions that are associated with Internet Explorer. How can you accomplish this task? A. In Control Panel, open Default Programs and then click Set Associations. Set the proper file extensions. B. In Internet Explorer, set extensions on the extension tab. C. In Control Panel, open System and then click Set Associations. Set the proper file extensions. D. In Internet Explorer, set extensions on the advanced tab. Correct Answer: A

B. Run Gpupdate /force.

You have a computer that runs Windows 7. You enable Advanced Audit Policy Configuration in the Local Computer Policy and discover that the policy is not applied. You need to ensure that Advanced Audit Policy Configuration is applied on the computer. What should you do? A. Restart the computer. B. Run Gpupdate /force. C. Enable the Security Settings policy option. D. Run Secedit /refreshpolicy machine_policy.

C. From Performance Options, modify the visual effects.

You have a computer that runs Windows 7. You generate a System Diagnostic Report and receive the following warning message: "The Graphics rating for the system is poor and may be the cause of performance problems." You need to increase the graphics performance of the computer without modifying the current hardware or drivers. What should you do? A. From Personalization, modify the screen saver. B. From Indexing Options, modify the Advanced options. C. From Performance Options, modify the visual effects. D. From Performance Options, modify the processor scheduling.

QUESTION 156 see exhibit C. From the Start menu, open a new Internet Explorer window.

You have a computer that runs Windows 7. You open Windows Internet Explorer and access a Web site as shown in the exhibit. You click the Suggested Sites button, but the suggestions fail to display. You need to obtain suggested sites. What should you do? A. From the Page menu, enable Caret Browsing. B. From the Safety menu, disable the SmartScreen Filter. C. From the Start menu, open a new Internet Explorer window. D. From the Microsoft Corporation Web site, refresh the Suggested Sites Web Slice.

QUESTION 6 see exhibit A. Shrink volume C.

You have a computer that runs Windows 7. You open the Disk Management snap-in as shown in the exhibit. You need to ensure that you can create a new partition on Disk 0. What should you do? A. Shrink volume C. B. Compress volume C. C. Convert Disk 0 into a dynamic disk. D. Create and initialize a Virtual Hard Disk (VHD).

C. Start the computer from the Windows 7 DVD and then use the System Image Recovery tool.

You have a computer that runs Windows 7. You perform an image backup. A virus infects the computer and causes the computer to become unresponsive. You need to restore the computer as quickly as possible. What should you do? A. Start the computer by using the Last Known Good Configuration feature. B. Start the computer from the Windows 7 DVD and then use the Startup Repair tool. C. Start the computer from the Windows 7 DVD and then use the System Image Recovery tool. D. Start the computer from Windows Preinstallation Environment (Windows PE) and then run Imagex.exe.

C. Run Imagex.exe and use the /config parameter.

You have a computer that runs Windows 7. You plan to create an image of the computer. You need to prevent files with the ISO file extension from being included in the image. What should you do? A. Run Dism.exe and use the /image parameter. B. Run Dism.exe and use the /scratchdir parameter. C. Run Imagex.exe and use the /config parameter. D. Run Imagex.exe and use the /norpfix parameter.

QUESTION 224 see exhibit

You have a computer that runs Windows 7. You run Ipconfig as shown in the exhibit. You need to ensure that you can establish a DirectAccess connection to the network. What should you do first? A. Create a new VPN connection. B. Configure a static IPv4 address. C. Enable IPv6 on the network adapter. D. Add an additional default gateway address. Correct Answer: C

A. From Credential Manager, modify the Windows credentials.

You have a computer that runs Windows 7. You run Runas and specify the /savecred parameter to start an application. You need to delete the stored password. What should you do? A. From Credential Manager, modify the Windows credentials. B. From Authorization Manager, modify the Authorization Manager options. C. Run Del and specify the /p parameter. D. Run Runas and specify the /noprofile parameter.

QUESTION 30 see exhibit A. Connect a removable disk.

You have a computer that runs Windows 7. You run the Configure Backup wizard as shown in the exhibit. You need to ensure that you can back up the computer to a local disk drive. What should you do before you run the Configure Backup wizard? A. Connect a removable disk. B. Log on as an administrator. C. Start the Volume Shadow Copy Service (VSS). D. Add your user account to the Backup Operators group.

A. Restart in safe mode and then roll back the video card driver.

You have a computer that runs Windows 7. You update the driver for the computer's video card and the computer becomes unresponsive. You need recover the computer in the minimum amount of time. What should you do? A. Restart in safe mode and then roll back the video card driver. B. Restart in safe mode and then revert the computer to a previous restore point. C. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Restore. D. Start the computer from the Windows 7 installation media. Select Repair your computer and then select System Image Recovery.

QUESTION 91 see exhibit B. Move the file to a disk that has the NTFS file system.

You have a computer that runs Windows 7. You view the properties of a file on the computer as show in the exhibit. You need to ensure that you can configure permissions on the file. What should you do? A. From Folder Options, modify the View settings. B. Move the file to a disk that has the NTFS file system. C. Open Windows Explorer by using elevated privileges. D. Hold the SHIFT key, right-click the file, and click Properties.

QUESTION 363 see exhibit A. Click Work Offline.

You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. You need to ensure that you can access Web pages on both the Internet and the Intranet. From the tools menu, what should you do? A. Click Work Offline. B. Click ActiveX Filtering. C. Point to SmartScreen Filter and then click Turn off SmartScreen Filter. D. Click Compatibility View.

A. An AppLocker executable rule

You have a computer that runs Windows 7. Your company has three custom applications named app1.exe, app2.exe, and app3.exe. The applications have been digitally signed by the company. You need to create a policy that allows only applications that have been digitally-signed by the company to run. What should you create? A. An AppLocker executable rule B. An AppLocker Windows Installer rule C. A software restriction policy and a certificate rule D. A software restriction policy and a hash rule

B. From windows Firewall with Advanced Security, create a custom rule.

You have a computer that runs windows 7. The network contains a monitoring server named server1. The computer runs a monitoring service named Service1. Service1 uses Remote Procedure Calls (RPCs). You need to ensure that Service1 can receive requests from Server1. What should you do? A. From windows Firewall with Advanced Security, create a predefined rule. B. From windows Firewall with Advanced Security, create a custom rule. C. From the Network and Sharing Center, modify the network location settings. D. From the Network and Sharing Center, modify the advanced sharing settings.

C. Upgrade the video adapter.

You have a computer that runs windows 7. The windows experience index displays the subscores in the following: - Component Subscore - Processor 6.9 - Memory (RAM) 5.3 - Graphics 3.2 - Gaming graphics 4.1 - Primary hard disk 4.5 You need to increase the Windows Experience Index base score. What should you do? A. Add more RAM. B. Add a second hard disk. C. Upgrade the video adapter. D. Upgrade to a faster processor.

C. On Computer1, make Share1 available offline and enable encryption of offline files.

You have a portable computer named Computer1 that runs Windows 7. You have a file server named Server1 that runs Windows Server 2008. Server1 contains a shared folder named Share1. You need to configure Computer1 to meet the following requirements: - Ensure that cached files from Share1 are encrypted. - Ensure that files located in Share1 are available when Server1 is disconnected from the network. What should you do? A. On Server1, encrypt the files in Share1. On Computer1, make Share1 available offline. B. On Server1, configure BitLocker Drive Encryption. On Computer1, make Share1 available offline. C. On Computer1, make Share1 available offline and enable encryption of offline files. D. On Computer1, copy the files from Share1 to the Documents library and configure BitLocker Drive Encryption.

D. New-PSSession

You have three computers that run Windows 7. You use Windows PowerShell to perform remote administration tasks on all three computers. You need to remotely administer all three computers by using PowerShell. Which PowerShell cmdlet should you use? A. Enable-PSRemoting B. Enable-PSSessionConfiguration C. New-PSDrive D. New-PSSession

C. Import a foreign disk.

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has a dynamic disk. You remove the disk from Computer1 and connect the disk to Computer2. You need to ensure that you can open files on all hard disk drives connected to Computer2. What should you do from the Disk Management snap-in? A. Convert a disk. B. Rescan the disks. C. Import a foreign disk. D. Attach a virtual hard disk (VHD).

D. Winrs r:computer2 disk.exe

You have two computers named Computer1 and Computer2 that run Windows 7. Computer2 is configured for remote management. From Computer1, you need to remotely execute a third-party command line tool named disk.exe on Computer2. Which command should you run? A. Start disk.exe /d \\computer2 B. Tscon disk.exe /dest:computer2 C. Winrm e disk.exe r:computer2 D. Winrs r:computer2 disk.exe

QUESTION 73 make chart B. Ping -6 fe80::44df:1b68%10

You have two computers on the same subnet. The computers have the IPv6 addresses shown in the following table: You need to test the connection to the IPv6 address from Computer1 to Computer2. Which command should you run? A. Ping -6 fe80::44df:1b68%12 B. Ping -6 fe80::44df:1b68%10 C. Ping -R fe80::44df:1b68%12 D. Ping -R fe80::44df:1b68%10

QUESTION 96 make chart A. On Computer1, create a wireless ad hoc network.

You have two portable computers that run Windows 7. The computers are not connected to a network. The computers are configured as shown in the following table: You need to transfer a 1 GB file from Computer1 to Computer2. What should you do first? A. On Computer1, create a wireless ad hoc network. B. On Computer2, configure the Bluetooth File Transfer Wizard to send files. C. On Computer2, create a network profile to connect to a network named Homegroup. D. On Computer1, configure the computer to be a member of a workgroup named Homegroup.

A. Start the computer, press F8, and then select Repair Your Computer.

You install Windows 7 on a new computer. Every time you start the computer, you receive a "STOP" error message. You suspect that the RAM on the computer has a problem. You need verify the RAM on the computer. What should you do first? A. Start the computer, press F8, and then select Repair Your Computer. B. Start the computer, press F8, and then select Debugging Mode. C. Start the computer by using Windows PE and then run the bootsect.exe /all command. D. Start the computer by using Windows PE and then run the bcdedit /bootsequence command.

C. Security

You install a local printer on a computer. You share the printer. You need to ensure that only members of a local group named Group1 can print documents on the printer. Which settings should you modify on the printer? A. Printing preferences B. Priority C. Security D. Share

A. From Recovery, restore a system restore point.

You install an application named app1.exe on a computer. After the installation the computer becomes unresponsive. You restart the computer and attempt to uninstall App1.exe. The uninstallation of App1.exe fails. You need to restore the computer to its previous functional state. You must achieve the goal by using the minimum amount of administration. What should you do? A. From Recovery, restore a system restore point. B. From the Previous Versions tab of App1.exe, click Restore button. C. Start the computer, press F8 and then use the Last Known Good Configuration. D. Create a system repair disc and then start the computer from the system repair disc.

B. All Removable Storage Classes: Deny All Access

You want to prohibit read, write, and execute access to all types of external storage devices. What computer policy setting do you enable? A. All Removable Storage: Allow Direct Access In Remote Sessions B. All Removable Storage Classes: Deny All Access C. Removable Disks: Deny Read Access D. Removable Disks: Deny Write Access

D. Add the URL of the Web site to the Local intranet zone.

Your company has an Active Directory domain. All computers are members of the domain. Your network contains an internal Web site that uses Integrated Windows Authentication. From a computer that runs Windows 7, You attempt to connect to the Web site and are prompted for authentication. You verify that your user account has permission to access the Web site. You need to ensure that you are automatically authenticated when you connect to the Web site. What should you do? A. Create a complex password for your user account. B. Open Credential Manager and modify your credentials. C. Add the URL of the Web site to the Trusted sites zone. D. Add the URL of the Web site to the Local intranet zone.

What command would you use to encrypt a file or a directory?

cipher /e

device vhd=[f:]\Windows7Pro.vhd F. Bcdedit / default

current

device vhd=[f:]\Windows7Pro.vhd E. Bcdedit /set

ded5a252-7077-11e0-8ac8-a2d217dce703

What command converts MBR disk to GPT?

diskpart> convert gpt

Which command allows you to set the identification field of BitLocker protected drive to the value specified in the Provide the unique identifiers for your organization policy?

manage-bde -SetIdentifier <drive letter>

Which command lists data recovery agents configured for a BitLocker-protected drive?

manage-bde -protectors -get <drive letter>

Which command allows you to see whether a drive has been assigned an identification field?

manage-bde -status <drive letter>

What command allows you to unlock a BitLocker protected drive?

manage-bde.exe -unlock <drive> -Certificate -ct <certificate thumbprint>

Network zone rules apply only to ...

msi files and files downloaded from IE

Which Utility can give you information on all hardware conflicts and shared resources on a computer?

msinfo32.exe

Driver Verifier Manager (verifier) is used to ...

stress test drivers for possible incorrect behaviour.

ImageX

A command-line tool for managing WIM images.,

ACL

Access Control List. For those file systems that support ACLs for files and folders, such as NTFS, It is a property of every file and folder in that file system. It holds a collection (that is, list) of ACE items that explicitly defines what actions are allowed to be taken on the file or folder to which it is attached.

How to determine an IPv4-mapped address?

0:0:0:0:0:FFFF:w.x.y.z or ::FFFF:w.x.y.z

Hardware requirements for 32-bit Win7

1 GHz CPU DirectX 9-capable with WDDM 1.0 or higher 1 Gb RAM 16 Gb HDD space

What are the advantages of GPT over MBR?

128 partitions per disk Maximum 256 Tb disk size redundant primary and backup partition tables

Anycast address

A packet is delivered to the nearest of multiple interfaces (in terms of routing distance).

IPv6

128-bit addressing, with the bits divided into 8 groups (each group representing 2 octets) represented by hexadecimal values ranging from 0 to FFFF. Also includes more efficient headers, IPSec built in, more efficient routing.

DISM can be used to ...

- Add, remove, and enumerate packages and drivers - Enable or disable Windows features - Configure international settings - Upgrade a Windows image to a different edition

What security levels are available in UAC settings?

- Always notify me - Default-Notify me only when programs try to make changes to my computer - Notify me only when programs try to make changes to my computer (do not dim my desktop) - Never notify me

How to determine an IPv4-compatible address?

0:0:0:0:0:0:w.x.y.z (where w.x.y.z is the dotted decimal representation of a public IPv4 address)

Into what types of logs are events recorded in the Event Viewer?

- Application: logs related to applications, including alerts by data collector sets. - Security: logs related to security (audited events) - Setup: setup of applications - System: events related to actions taking place on the computer in general, including hardware-related events - forwarded events - Applications and Services logs: events from single applications or components. Logs might include categories such as Distributed File Service (DFS) replication, hardware events, Internet Explorer events, Key Management service events, and Media Center events.

What are the infrastructure requirements for using Direct Access?

- At least one domain controller and DNS server that is running Windows Server 2008 SP2 or Windows Server 2008 R2. When UAG is used, DirectAccess can be deployed with DNS servers and domain controllers that are running Windows Server 2003 when NAT64 functionality is enabled. - public key infrastructure - - without UAG, an optional NAT64 device to provide access to IPv4-only resources for DirectAccess clients

What disk maintanence tools are available in Win 7?

- Disk Cleanup (cleanmgr.exe) - Disk defragmenter (defrag.exe) - Error checking (chk

What types of events are recorded to Event viewer logs?

- Error - Warning - Information

What are the options for Connecting DirectAccess Clients to the Network?

- Globally routable IPv6 address - IPv6 - Public IPv4 address - 6-to-4 - Private (NAT) IPv4 address - Teredo - If unable to connect using these methods - IP-HTTPS

What categories of Windows updates are available in Windows 7?

- Important updates - Recommended updates - Optional updates

What options can be configured for Windows Update?

- Install Updates Automatically (Recommended) - Download Updates But Let Me Choose Whether To Install Them - Check For Updates But Let Me Choose Whether To Download And Install Them - Never Check For Updates (Not Recommended) - Give Me Recommended Updates The Same Way I Receive Important Updates - Allow All Users To Install Updates On This Computer

What modes of operation are available for Offline files?

- Online mode - Auto offline mode - Manual offline mode - Slow-link mode

What System Recovery Options are available in Windows Recovery Environment?

- Startup Repair - System Restore - System Image Recovery - Windows Memory Diagnostic - Command Prompt

When the drive can't be used as a backup destination?

- The drive is a tape drive - the drive is the same drive - the drive isn't formatted as NTFS, FAT or UDF - the drive is an OS drive or a system drive - the drive is a recovery partition - the drive is locked by BitLocker

What are the ways to configure Windows Update so that a client can communicate with with the Microsoft Update servers through the proxy?

- Web Proxy Auto Detect - netsh winhttp import proxy source=ie

Requirements for Direct Access server

- Windows 2008 R2 - 2 network adapters: one that is connected directly to the Internet and one that is connected to the intranet - two consecutive public IPv4 addresses, assigned to the network adapter, connected to the Internet

What requirements does client computer need to be able to use Direct Access?

- Windows 7 Ult or Ent - member of AD DS domain - member of a special security group

What are the types of credentials used in Credential Manager?

- Windows credentials - Certificate-based credentials - Generic credentials

What are the NAP criteria of a client computer's health?

- antivirus installed and up-to-date - anti-spyware installed and up-to-date - windows firewall enabled - automatic updates enabled - software updates installed

What are the disadvantages of dynamic disk?

- does not contain partitions or logical drives and therefore can't be read by another operating system - laptop computers do not support dynamic disks

What are the steps for configuring BitLocker to use data recovery agents?

- enable Provide the unique identifiers for your organization policy with Allow DRA option - assign a BitLocker identification field to a BitLocker-protected drive - add a data recovery agent

What backup destinations can be used by Windows Backup?

- internal or external HDD - CD-R or DVD-R (no scheduled system image) - USB flash drive (no system image) - Network location

What are the limitations of native-boot VHDs?

- only Win7 Ent or Ult, or WIn 2008 R2 - no compression or encryption for VHD files - no Bitlocker on host volume - no Hibernation for guest OSes - VHD file can't be located on remote share or USB flash drive

What are the advantages of dynamic disk over basic?

- support of spanned, striped, mirrored, and RAID-5 volumes - an almost unlimited number of volumes - working with and upgrading disk volumes without reboot

How is a Source-Initiated Subscription configured?

- winrm quickconfig (or winrm qc) on a collector computer - wecutil qc on a collector computer - create a source-initiated subscription on a collector computer (in the Event Viewer or wecutil cs configuration.xml) - winrm quickconfig (or winrm qc) on a source computer - add a collector computer to SubscriptionManager setting in Computer Configuration\Administrative Templates\Windows Components\Event Forwarding node

How is a Collector-Initiated Subscription configured?

- winrm quickconfig (or winrm qc) on a source computer - add the computer account of the collector computer to the local Event Log Readers group or the local Administrators group (for retrieving Security logs) on the source computer - wecutil qc on a collector computer - create an event subscription on a collector computer by specifying types of events and source computers

DISM mounting options are

/Mount-Wim /Unmount-wim /Commit-wim /Remount-wim /Cleanup-wim /Get-WimInfo /Get-MountedWimInfo

DISM option for installing unsigned drivers is ...

/forceunsigned

DISM option for working with a running system is ...

/online

Unicast unspecified address

0:0:0:0:0:0:0:0:, or a double colon (::)

You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network workstations currently make use of Microsoft Windows XP Professional. ABC.com has recently decided to have the workstations upgraded to Microsoft Windows 7 with all the installed applications. You are in the process of informing the newly appointed users in your department when the Aero Shake feature will work. What should you inform them? (Choose ALL that apply.) A. The Aero Shake feature will work if the Windows Experience Index is 3 or greater, and if the display adapter is compatible with the installed WDDM. B. The Aero Shake feature will work if the windows experience index is 4 or greater, and if the display adapter is compatible with the installed WDDM. C. The Aero Shake feature will work if the display adapter is compatible with the installed WDDM. D. The Aero Shake feature will work Windows Media Player 10 or later is installed, and if the display adapter is compatible with the installed WDDM. E. The Aero Shake feature will work if the Windows Experience Index is 3 or greater, and if Windows Media Player 10 or later is installed. F. The Aero Shake feature will work if the Windows Experience Index is 4 or greater, and if Windows Media Player 10 or later is installed.

A

You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single IPv4 subnet that contains 15 computers. The computers are all configured to run Windows 7. You are in the process of adding a new computer named ABC-WS16 with an IP address subnet. After the installation you discover that you are unable to connect to the other computers on the network, however, the other computers are able to make a connection to each other. You run the ipconfig command on ABC-WS16 and verify that IPv4 address is 169.254.25.32. How can you allow the connectivity of ABC-WS16 to the all other computers present within the network? A. This can be accomplished by having a static TCP/IP address configured. B. This can be accomplished by disabling IPv6. C. This can be accomplished by configuring an exception for File and Printer Sharing in Windows Firewall. D. This can be accomplished by running disabling DHCP. E. This can be accomplished by clearing the Block All Incoming Connections setting on the Windows Firewall.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com and includes a Direct Access infrastructure. ABC.com has purchased a new laptop named ABC-WS680. You join ABC-WS680 to a domain after performing a clean installation Windows 7. How can you make sure the connectivity to the domain from ABC-WS680 using Direct Access connections? A. By installing a computer certificate on ABC-WS680. B. By disabling User Account Control (UAC) on ABC-WS680. C. By modifying the network connection properties on ABC-WS680. D. By adding the computer account for ABC-WS680 to the RAS and IAS Servers group in the domain.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. A ABC.com user named Rory Allen uses of a Microsoft Windows 7 Professional workstation named ABC-WS680. During the course of the day Rory Allen attaches a USB disk to ABCWS680. However, Rory Allen cannot enable BitLocker To Go on the USB disk. You need to ensure that Rory Allen can enable BitLocker To Go on the USB disk. Which of the following actions should you take? A. You should consider upgrading ABC-WS680 to Microsoft Windows 7 Ultimate. B. You should consider initializing the Trusted Platform Module (TPM) hardware on ABC-WS680. C. You should consider downloading a Microsoft Encryption certificate for ABC-WS680. D. You should consider enabling IPSEC on ABC-WS680

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are currently working on a workstation named ABC-WS680. You use the Windows Preinstallation Environment (Windows PE) to boot ABC-WS680 and you want to access the network using a network adapter device driver in Windows PE. How do you load the network adapter device driver? A. By running Drvload.exe and specifying the network adapter driver path. B. By running Sysprep.exe. C. By executing the ntloader command after running Wpeutil.exe. D. By running sigverif.exe and specifying the network adapter driver path.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been assigned a workstation, named ABC-WS13, which has access to ABC.com's network via a VPN connection. You want to make sure that the Internet is available after establishing a VPN connection. You also want to make sure that that Internet traffic is not transmitted via the VPN connection. Which of the following actions should you take? A. You should consider making changes to the VPN connection's advanced TCP/IP settings. B. You should consider configuring a new IP address for the VPN connection. C. You should consider disabling TCP/IPv6. D. You should consider disabling TCP/IPv4.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been assigned a workstation, named ABC-WS13. You want to start an application using the Runas command-line tool, with the /savecred parameter. You want to make sure that the stored password is removed. How would you accomplish this task? A. You should consider making use of Credential Manager to alter the Windows credentials. B. You should consider making use of the Local Security Policy to alter the Windows credentials. C. You should consider making use of Authorization Manager to alter the Windows credentials. D. You should consider removing all Windows credentials from Windows vault.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.A user, named Mia Hamm, is assigned to a workstation named ABC-WS07. You have been instructed to make sure that Mia Hamm is allowed to update the display adapter driver on ABCWS07. Which of the following actions should you take? A. You should consider accessing the Global Group Policy to alter the device setting for Mia Hamm. B. You should consider accessing the Local Group Policy to alter the device setting for Mia Hamm. C. You should consider creating a new GPO configured with the required permissions. D. You should consider accessing the Local Group Policy to alter the device setting for ABCWS07. E. You should consider accessing the Global Group Policy to alter the device setting for ABCWS07.

A

QUESTION 204 see exhibit x2

A company has client computers that run Windows 7. You need to secure a virtual private network (VPN) connection on the client computers so that two-factor authentication is used. Which setting should you choose? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 with Internet Explorer 8 (IE8) installed. A ABC.com user, named Kara Lang, has informed you that when she tries to open a Web page she is presented with an error message informing her that the web page is not rated. You have received instructions to make sure that Kara Lang is able to open the Web page. Which of the following actions should you take? A. You should consider reconfiguring the Content Advisor settings from the Content Tab of the Internet Options window. B. You should consider reconfiguring the Manage add-ons settings from the Programs Tab of the Internet Options window. C. You should consider reconfiguring the Tabs settings from the General Tab of the Internet Options window. D. You should consider reconfiguring the Feeds and Web Slices settings from the Content Tab of the Internet Options window.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains an internal Web site that uses Integrated Windows Authentication. A ABC.com user named Amy Walsh has been assigned a workstation named ABC-WS680 that is running Windows 7. Amy Walsh reports that she is prompted for authentication when she attempts to access the internal Web site. You verify that Amy Walsh's user account has permission to access the internal Web site. You need to make sure that authentication occurs automatically when Amy Walsh attempts to connect the Web site. How would you accomplish this task? A. You should consider configuring the Local Intranet zone on ABC-WS680 to host the Web site's URL. B. You should consider changing Amy Walsh's user account password. C. You should consider changing the access control for the internal Web site to allow Anonymous Access. D. You should consider changing the security level for Internet Explorer to Medium-Low on ABCWS680.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. Subsequent to the installation of a new application, the workstation that it is installed on develops performance issues. You decide to reboot the workstation before attempting to remove the application. After the restart you try to remove the application without success. You want to make sure that the workstation is returned to the condition it was in prior to installation of the application. Your solution should require as little administrative effort as possible. Which of the following actions should you take? A. You should consider making use of a system restore point. B. You should consider making use of ASR. C. You should consider restarting the workstation in safe mode. D. You should consider formatting the workstation's hard drive.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers run Microsoft Windows 7. You are assigned a client computer named ABC-WS680. How would you change the file extensions on ABC-WS680 that are linked to Internet Explorer? A. By opening Default Programs and selecting Set Associations from the Control Panel. B. By modifying the properties of iexplore.exe. C. By modifying the Internet Properties on the Content tab within Internet Explorer. D. By running msconfig to open the System Configuration utility.

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains both desktop and laptop workstations. You are responsible for managing a desktop workstation named ABC-WS620. ABC-WS620 is configured with the following configuration of Windows. Windows Vista on first partition. Windows 7 on a second partition has been installed recently. How can you setup Windows Vista as the default operating system during the system strart up? A. By running Bcdedit.exe and specifying the /default parameter. B. By running MSCONFIG and specifying the /bootOS parameter on Windows Vista Partition. C. By running bootcfg.exe and specifying the /default parameter on Windows 7 Partition. D. By running bootcfg.exe and specifying the /default parameter on Windows Vista Partition E. By running MSCONFIG and specifying the /bootOS parameter on Windows 7 Partition

A

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are responsible for maintaining a desktop workstation named ABC-WS680 running Windows 7. What is the easiest way to verify the digital signing on all the device drivers which have been installed? A. You should consider running Sigverif.exe at a command prompt on ABC-WS680. B. You should consider running sfc /scannow at a command prompt on ABC-WS680. C. You should consider viewing the properties of each device listed in Device Manager on ABCWS680. D. You should consider running Windows Update on ABC-WS680.

A

You work as a desktop support technician at a company named ABC.com. All ABC.com users are divided into groups named ABC_ADMIN, ABC_SUPRT and ABC_STAFF. The ABC.com network contains a stand-alone Windows 7 computer named ABC-WS680. Several ABC.com users make use of ABC-WS680. You need to prevent the ABC.com users of the ABC_STAFF group from running Windows MediA Player on ABC-WS680.However, all other members must still be able to run Windows Media Player. You want to accomplish this task by using the least amount of administrative effort. You have Which of the following actions should you take? A. You should consider creating an executable rule on ABC-WS680 via AppLocker. B. You should consider creating an executable rule on ABC-WS680 via BitLocker. C. You should consider running Software Explorer on ABC-WS680. D. You should consider creating a certificate rule on ABC-WS680.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. A network user named Mia Hamm has a client computer which she regularly backs up. Mia Hamm additionally creates system image backups. During the course of the day Mia Hamm's computers disk fails. You format the hard drive and run the scandisk to ensure that there are no problems with the hard drive. You booted the computer using the Windows 7 DVDs. How can proceed with recovery of Mia Hamm's computer to the previous Window installation? A. You should consider having the System Image Recovery option selected. B. You should consider having the Upgrade option selected. C. You should consider having the System Restore option selected. D. You should consider having the Command Prompt option selected. E. You should consider having the Last Known Good Configuration selected

A

QUESTION 205 see exhibit x2

A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that uses a preshared key for authentication. You need to create the VPN connection on the client computers. Which setting should you choose? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com informed you that one of the client computers which you are managing has two disks that there is extra disk space available on the second disk drive.How can you configure the computer in such a way that the system is able to boot from the second hard disk in the event of first hard disk failure? A. You should consider having a RAID-1 volume created. B. You should consider having a RAID-5 volume created. C. You should consider having a RAID-6 volume created. D. You should consider having a RAID-0 volume created.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com currently has an internal Web site that uses HTTPS and has a self-signed certificate. A network user named Rory Allen makes use of Internet Explorer 8 to browse the internal Web site. During the course of the day you receive complaints from Rory Allen that he receives the error message while browsing the website even when he is using HTTPS. The details of the error message are below. "There is a problem with the website's security certificate" What can you do to solve the problem? A. You should consider having the Web sites certificate imported into the Trusted Root Certification Authorities store using Certificate Manager. B. You should consider having the Web sites certificate imported into the Trusted Root Certification Authorities store using Windows Explorer. C. You should consider changing the security level for the Internet zone to Medium-Low from the Internet Options. D. You should consider having Web site added to the Internet zone from Internet Explorer.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com has recently installed and configured a file and data server named ABC-SR01 on the network. A network user named Rory Allen makes use of a computer named ABC-WS01 and tried connecting to ABC-SR01 using an account named RAllen unsuccessfully. How can you ensure the account named KingAdmin is used for authentication when connecting to ABC-SR01? A. You should consider using the Add a Windows credential from Credential Manager on ABCWS01. B. You should consider having the File and Printer Sharing settings modified on ABC-WS01. C. You should consider having the network location set to Public on ABC-WS01. D. You should consider having the network location set to Private on ABC-WS01.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Rory Allen asked in order to obtain USMT 4.0 what must be downloaded from Microsoft Corporation Web site. What should you tell him? A. You should consider instructing Rory Allen that WAIK should be downloaded from Microsoft Corporation to obtain USMT 4.0. B. You should consider instructing Rory Allen that Windows Deployment Services should be downloaded from Microsoft Corporation to obtain USMT 4.0. C. You should consider instructing Rory Allen that the Windows 7 Resource Kit Tools should be downloaded from Microsoft Corporation to obtain USMT 4.0. D. You should consider instructing Rory Allen that Windows Easy Transfer should be downloaded from Microsoft Corporation to obtain USMT 4.0.

A

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. The ABC.com network users currently make use of a standalone workstation for storing their encrypted data. You want to make sure that you are able to access and view this data. Which of the following actions should you take? (Choose ALL that apply.) A. You should consider executing the Cipher.exe command-line tool with the /r parameter B. You should consider having User Account Control (UAC) disabled. C. You should consider assigning your user account the Full Control permission to all encrypted files. D. You should consider having a data recovery agent added from the local security policy. E. You should consider installing a Certificate Authority and enrolling for an EFS certificate.

A

You work as a support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. A ABC.com client, named Mia Hamm, previously upgraded her home office PC from Windows 7 Home Basic to a trial version of Windows 7 Professional. Mia Hamm informs you that the trial period of the Windows 7 Professional installation has since expired. Furthermore, she informs you that she installed the trail version over the existing partition. You want to advise Mia Hamm the correct steps to take to make use of the previous installation data for restoring the Windows 7 Home Basic installation without retaining any files and settings of the trial Windows 7 Professional installation. Which of the following steps should you advise Mia Hamm to take FIRST? A. You should consider advising Mia Hamm to make use of the System Recovery media. B. You should consider advising Mia Hamm to recover data from a previous backup. C. You should consider advising Mia Hamm to format her system drive. D. You should consider advising Mia Hamm to back up her current data.

A

You work as a technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows Vista installed.All ABC.com's workstations only have a single partition Basic hard disk installed, and all have available space on the disk. You have been instructed to install windows 7 in a dual-boot configuration with the existing Windows Vista installation on one of the workstations. Which of the following actions should you take? A. You should consider making use of the Custom Installation option, after booting the workstation from the Windows 7 installation disc. B. You should consider making use of the Standard Installation option, after booting the workstation from the Windows 7 installation disc. C. You should consider making use of the Custom Installation option, after initializing the Windows 7 installation from within Windows Vista. D. You should consider making use of the Standard Installation option, after initializing the Windows 7 installation from within Windows Vista.

A

QUESTION 332 see exhibit

A company has client computers that run Windows 7. You set up a virtual private network (VPN) infrastructure that encapsulates Point-to-Point Protocol (PPP) traffic over the Secure Sockets Layer (SSL) channel of the HTTPs protocol. You need to create the VPN connection on the company's client computers. Which type of VPN should you use? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. A ABC.com workstation, which has Encrypting File System (EFS) configured, is logged on to by numerous ABC.com employees. Each employee is required to encrypt data on the workstation. You have been instructed to make sure that the EFS certificate is backed up. You are preparing to run the Cipher command-line tool to complete this task. You need to include the required parameter. Which of the following actions should you take? A. You should consider including the /x parameter B. You should consider including the /a parameter C. You should consider including the /f parameter D. You should consider including the /p parameter

A

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have previously configured a customized image of Windows 7, which you are intending to deploy to three new workstations that are not connected to ABC.com's network. You are then informed that the deployment solution should allow for automatic installation of a customized application, subsequent to the image deployment. Which of the following actions should you take? A. You should consider running the New Media Wizard after creating a custom task sequence via the Microsoft Deployment Toolkit (MDT). B. You should consider running the New Media Wizard after creating a custom task sequence via the Microsoft Assessment and Planning (MAP) Toolkit. C. You should consider running the New Media Wizard after creating a custom task sequence via the Microsoft Application Compatibility Toolkit (ACT). D. You should consider running the New Media Wizard after creating a custom task sequence via the Windows Automated Installation Kit (AIK)

A

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have either Windows Vista or Windows 7 installed. ABC.com has a workstation, named ABC-WS01, which must only be accessible via Remote Desktop toABC.com users that have Windows Vista and Windows 7 workstations. Which of the following actions should you take? A. You should consider accessing the Remote tab of the System Properties window on ABCWS01 to configure the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) option. B. You should consider accessing the Remote tab of the System Properties window on each workstation to configure the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) option. C. You should consider accessing the Remote tab of the System Properties window on ABCWS01 to configure the Allow connections from computers running any version of Remote Desktop (less secure) option. D. You should consider accessing the Remote tab of the System Properties window on each workstation to configure the Allow connections from computers running any version of Remote Desktop (less secure) option.

A

802.1x

A IEEE standard designed to enhance security of wireless networks by authenticating a user to a central authority.

802.1x

A IEEE standard designed to enhance security of wireless networks by authenticating a user to a central authority.,

Disk Management

A MMC console snap-in used to administer hard disks in Windows 7.,

RAID 5

A collection of disks that combine their storage capacity by striping data and error-correcting parity information across all drives. The parity information is calculated from the data itself and can be used to identify and regenerate damaged or missing data. The data and parity information is striped in the same fashion as RAID 0 data. RAID 5 is fault tolerant in that a single disk in the collection may fail and the missing data can be calculated from the remaining data and parity information distributed across the remaining disks. A multiple disk failure will result in the loss of all data in the collection. The disks space cost for parity information is approximately the same as the size of disks space contributed from one disk member. For example, if five 10 GB disks are collected into a single RAID 5 solution then the space of one disk, 10 GB, is consumed by parity information. The remainder of 40 GB is available for file storage. A minimum of three disks is required to build a RAID 5 solution.

pathping

A command-line utility that can be used to test IP communications between the computer running the utility and a remote target. In addition to the basic IP communication test, the pathping utility will trace the routers involved in establishing the IP communication path.

Tracert

A command-line utility that can be used to trace the routers involved in establishing an IP communication path between the computer running the command and a target address.

nslookup

A command-line utility that can be used to view or debug the data returned from a DNS server in response to a DNS name resolution query.

NETSH

A command-line utility that can be used to display , change, add, and delete network configuration settings on a computer, including basic and advanced settings.

ARP

A command-line utility that can be used to display and manage the ARP table, which maps IPv4 addresses to physical MAC addresses.

Getmac

A command-line utility that can be used to display the MAC address for network adapters on a system.

Ping

A command-line utility that can be used to test IP communications between the computer running the utility and a remote target.

PostScript

A common language used by printers to describe how a page is printed. Invented and developed by Adobe.,

Printer Control Language (PCL)

A common language used by printers to describe how a page is printed. Printer driver Software used by Windows 7 to properly communicate with a specific make and model of printer.

QUESTION 208 see exhibit

A company has client computers that run Windows 7. You create an AppLocker policy for the client computers. You need to ensure that the AppLocker policy is enforced after the computers restart. Which service startup type should you use?(To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

HIVES

A discrete body of registry keys and values stored in files as part of the operating system.,

QUESTION 209 see exhibit

A company has client computers that run Windows Vista. All client computers have a single Basic hard disk with a single partition that consumes all the available space on the hard disk. You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation. Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

QUESTION 336 see exhibit

A company has client computers that run Windows Vista. You need to install Windows 7 on a client computer in a dual-boot configuration with the existing Windows Vista installation, without reducing the size of the partition that contains Windows Vista. Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

QUESTION 382 see exhibit / make chart?

A company has client computers that run Windows XP. The company plans to upgrade all the client computers to Windows 7. Each employee will keep the same computer. You need to upgrade the client computers from Windows XP to Windows 7 while maintaining each user's files and settings. Which actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

QUESTION 304 see exhibit

A company is upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image. The menu on the title bar of the application is not displayed properly, although other graphical elements are displayed correctly. You need to ensure that the application's menu is displayed correctly on client computers that run Windows 7. Which option should you choose to achieve this goal? (To answer, select the appropriate check box in the dialog box.) Hot Area: Correct Answer:

QUESTION 301 see exhibit

A company is upgrading its client computers from windows XP to windows 7. You add an application to the Windows 7 base image. Large fonts are interfering with the appearance of the application. You need to ensure that the application is displayed correctly on client computers that run Windows 7. Which option should you select? (To answer, select the appropriate check box in the dialog box.) Hot Area: Correct Answer:

QUESTION 305 see exhibit

A company's security policy prohibits employees from running any software from Fabrikam on computers running Windows 7 Enterprise. The applications are digitally signed by the publisher. You need to configure a single deny rule in AppLocker by applying a condition to restrict all of the applications from running, without affecting other programs. You have selected one of Fabrikam's applications as a reference. Which property should you choose? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

Security Association (SA)

A connection established between two computers for the purpose of securely exchanging data. The connection is only allowed if both sides of the connection know how to fi nd each other on the network, agree on how to authenticate their identities, and agree on how to encrypt and decrypt the data sent between them. Any aspect of the SA connection may be renegotiated periodically to ensure that the other side of the connection is still a valid communication partner.

Organizational Unit (OU)

A container within a domain that is used to create a hierarchy that can be used to organize user and computer accounts and apply group policies.

Peripheral Component Interface (PCI)

A current standard for connecting expansion cards to a computer motherboard. PCI devices are plug and play.

Partition Table

A data structure contained in the MBR that is used to identify reserved areas of disk space for hard disks formatted for x86 computers. The partition table holds a maximum of four entries originally tasked to point to a maximum of four primary partitions, or three primary and one extended partitions.

Routing Table

A data table that is used by Windows 7 to select the next IP address data must be delivered to ultimately deliver data to a given target address.,

Boot Configuration Data (BCD)

A database of boot configuration data that is used during the boot process for Windows Vista and Windows 7.

QUESTION 367 see exhibit

A device driver for a laser printer connected through the LPT port in a computer running Windows 7 does not function correctly. You uninstall the driver without issue and this process does not prompt a restart. The device does not appear in the Device Manager. Your need to ensure that Device Manager can detect the device, and then reinstall the device driver. Which Action open should you choose? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

Central Processing Unit (CPU)

A device responsible for the actual execution of instructions stored in applications and operating system code. Windows 7 supports 32- and 64-bit CPUs.

Wireless Access Point

A device that allows wireless devices to connect through it to a wired network.

DSL Modem

A device that converts DSL signals to standard Ethernet.

Modem

A device that converts computer signals to a format that can travel over phones (modulate) and also performs the reverse function (demodulate).

Cable Modem

A device that converts network signals from the cable company to a standard Ethernet.

Integrated Service Digital Network (ISDN)

A direct, digital dial-up connection to a PSTN that operates at 64 KB per channel over regular twisted-pair cable between a subscriber and the PSTN office.

Active Directory

A directory of network information about users, computers, and applications that links multiple domains together.

Hives

A discrete body of registry keys and values stored in files as part of the operating system.

Challenge-Handshake Authentication Protocol (CHAP)

A more secure authentication protocol than PAP. CHAP is used to periodically identify the client identity without sending the actual password over the client and server data stream. CHAP passwords are simple by design and do not support strong security methods.This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.

Trusted Platform Module (TPM)

A motherboard module that is used to store encryption keys and certifi cates.

Universal Naming Convention (UNC)

A naming system used by windows computers to locate network fi le shares and network printers. The format is \\ servername\sharename.

B. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box on Computer 1.

A network contains computers that run Windows 7 and Windows Vista. A computer named Computer 1 runs Windows 7. You need to ensure that only users running Windows 7 and Windows Vista can connect to Computer 1 using Remote Desktop. In the System Properties window, on the Remote tab, what should you do? A. Click the Advanced button. Select the Allow this computer to be controlled remotely check box on Computer 1. B. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box on Computer 1. C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box on Computed. D. Select the Allow Remote Assistance connections to this computer check bcx on Computer 1.

Client/Server

A network where a server controls security and and access to network resources such as files and printers.,

Peer-to-Peer

A network where all computers store their own security informaiton and share data. A network where all computers are equals.,

Peer-to-Peer Network

A network where all computers store their own security information and share data.

Domain-Based Network

A network where security information is stored centrally in Active Directory.

Point-to-Point Protocol (PPP)

A network-layer transport protocol that manages connectivity over serial or modem lines. PPP can negotiate any transport protocol used by both systems involved in the link and can automatically assign TCP/IP settings.

Compatibility View

A new feature in Internet Explorer 8 that provides backward compatibility for Web sites and application that were targeted for previous versions of Internet Explorer

Compatibility View

A new feature in Internet Explorer 8 that provides backward compatibility for Web sites and applications that were targeted for previous versions of Internet Explorer.,

BitLocker To Go

A new feature in Windows 7 that allows you to encrypt removable storage.

BitLocker To Go

A new feature in Windows 7 that allows you to encrypt removable storage.,

HomeGroup

A new feature in Windows 7 that is used to confi gure file and printer sharing for small peer-to-peer computer networks.

AppLocker

A new feature in Windows 7 that is used to define which programs are allowed to run. This is a replacement for the software restriction policies found in Windows XP and Windows Vista.

AppLocker

A new feature in Windows 7 that is used to define which programs are allowed to run. This is a replacement for the software restriction policies found in Windows XP and Windows Vista.,

Print Management snap-in

A new printer management tool in Windows 7 that allows you to manage local and remote printers.

Print Management snap-in

A new printer management tool in Windows 7 that allows you to manage local and remote printers.,

XML PrintCapabilities

A new system to advertise the capabilities of a printer.

XML PrintCapabilities

A new system to advertise the capabilities of a printer.,

Manage Add-ons

A new tool in Internet Explorer 8 that makes it easier to identify, disable, and remove unwanted Add-ons.

Problem Steps Recorder

A new tool included in Windows 7 that allows users to record the exact steps required to reproduce a problem. The recorded steps can then be forwarded to help desk staff for analysis.

Problem Steps Recorder

A new tool included in Windows 7 that allows users to record the exact steps required to reproduce a problem. The recorded steps can then be forwarded to help desk staff for analysis.,

Classless Inter-Domain Routing (CIDR)

A notation technique that summarizes the number of binary bits in an IP address that identify the network an IP address belongs to, counted starting from the left-hand side of the IP address as written in binary form. The number of bits is written at the end of the IP address with a slash "/" symbol separating the two values (e.g. 192.168.1.0/24 or FE80::/64).

Subnet Mask

A number that defi nes which part of an IP address is the network ID and which part is the host ID.

Security Identifier (SID)

A number that is added to the access control list of a resource when a user or group is assigned access.

Hash

A one way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.,

Hash Encryption Algorithm

A one-way encryption algorithm that creates a unique identifier that can be used to determine whether data has been changed.

Multicast address

A packet is delivered to multiple interfaces.

Unicast address

A packet is delivered to one interface.

8.3 file name

A standard for naming files first introduced with MS-DOS operating systems. The numbers indicate the maximum number of characters that can be used for that part of the name, eight characters and three characters respectively. The period is a separator character between the two names. The three-character field is also known as the file extension.

Processor Affinity

A standard in which a process that starts in a computer with more than one CPU is usually assigned to that CPU again the next time it runs.

Extensible Firmware Interface (EFI)

A standard initially created by Intel to replace the BIOS based computer firmware.

VGA

A standard low-resolution graphics mode that is typically used when troubleshooting incompatible video drivers or drivers set to a high resolution that is not supported by the attached monitor.

Naming convention

A standard process for creating names on corporate networks and computers. Creates a standard so that users and administrators can know what an object name is referring to.,

Domain Name System (DNS)

A standard service in the TCP/IP protocol used to define how computer names are translated into IP addresses.

EDID (Extended Display Identification Data)

A standard that defines how the monitor hardware can pass details about its abilities to the graphics card and ultimately the operating system. Details such as preferred refresh rate and screen resolution can be set by the monitor manufacturer and EDID will allow this information to be passed to the operating system.

Preboot eXecution Environment (PXE)

A standard used by network cards to boot directly to the network and download an operating system. Once that operating system is started, tasks such as imaging can be performed.

B. Add User1 to the Administrators group.

A standard user named User1 has a computer that runs Windows 7. You need to ensure that User1 can run Windows Easy Transfer. What should you do? A. Disable User Account Control (UAC). B. Add User1 to the Administrators group. C. Configure User1 to have a complex password. D. Copy the support folder from the Windows 7 installation media to the local hard disk drive.

Subkey

A subordinate or lower level registry key within a hive that can contain values and other subkeys.

Disk Quota

A system of tracking owners for fi le data within an NTFS-formatted partition or volume and the total disk space consumed by each owner. Limits or warning can be established to restrict disk space usage.

Network Address Translation (NAT)

A system that allows multiple computers to share a single IP address when connecting to the Internet.

Device Driver Signing

A system that ensures that a device driver is from a known publisher and that the device driver has not been modified since it was signed.

Teredo

A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.

Teredo

A system to tunnel IPv6 addressed packets over an Ipv4 network, even if NAT is used on the IPv4 network.

Windows Internet Naming Service (WINS)

A system used to resolve computer NetBIOS names to IP addresses.

Point and Print

A system used by Windows to distribute printer drivers over the network when network printers are installed.

Point and print

A system used by Windows to distribute printer drivers over the network when network printers are installed.,

Automatic Private IP Addressing (APIPA)

A system used to automatically assign an IP address on the 169.254.x.x network to a computer that is unable to communicate with a DHCP server. A default gateway setting is not configured with APIPA.

Remote Access

A system where clients are able to remotely connect to a network and access resources as though the remote client is connected directly to the network.

Explain Remote Access

A system where clients are able to remotely connect to a network and access resources as though the remote client is connected directly to the network.,

Remote Control

A system where clients are able to remotely connect to a server to run applications and access data. Application and files are accessed at the server and only screen drawing commands are sent back to the client.,

Remote Control

A system where clients are able to remotely connect to a server to run applications and access data. Applications and fi les are accessed at the server and only screen drawing commands are sent back to the client.

Hyper-Threading

A technique used in certain Intel processors to improve their overall performance by working on more than one thread at a time. When one thread is waiting for an operation to complete a second thread can use some of the processor's hardware instead of the processor just idling. This extra work is done inside the processor's hardware and is specific to the design of the processor itself. Programmers writing application threads and the operating system that schedules those threads to run must be aware of the benefi ts and limits of the Hyper-Threaded processor to take best advantage of any performance gain that might be possible.

Boot Sector

A term used to describe a special-purpose block of data on a disk or partition essential to the boot process of an x86 computer. The computer's BIOS will process the boot sector of the MBR initially to find a partition to continue the boot process. The first sector of that partition or volume contains a boot sector with code responsible for beginning the operating system load process from a partition or volume.

Multitasking

A term used to describe the appearance of more than one application sharing the CPU of the computer. To the user, the applications all seem to berunning at the same time.

process

A term used to describe the files, memory, and application code that combine together to form a single running application. Each application running on a multitasking system is referenced by a single process.

Multiprocessor

A term used to refer to a computer with more than one CPU.

Volume

A term used to refer to a region of disk space reserved to store fi le data. The term is used to generically refer to both dynamic disk volumes and basic disk partitions.

Universal Disk Format (UDF)

A third-party standard that defi nes how data is stored on removable media such as DVD disks.

Backup and Restore

A tool included in Windows 7 that allows you to set up backup regiments to back up files, restore files, create a system image, and create a system repair disc.

Applet

A tool or utility in Control Panel that is focused on configuring a particular part of Windows 7.

Startup Repair Tool

A tool provided in Windows 7 to help users determine why their computer failed and what they should do to repair it.

Startup Repair Tool

A tool provided in Windows 7 to help users determine why their computer failed and what they can do to repair it.,

Sysprep

A tool that is used to generalize Windows 7 and prepare computers for imaging.

Action Center

A tool that provides you with a single location where you can identify and address any security issues, maintenance requirements, and errors that have arisen.

Reliability Monitor

A tool that rates the system stability of Windows 7 and lets you monitor the events that contribute to system stability.

System Information

A tool that scans the current state of the computer and reports its fi ndings in a searchable tree format

Safe Mode

A troubleshooting startup mode that is typically used when the regular startup mode for Windows 7 fails.

Safe Mode

A troubleshooting startup mode that is stypically used when the regular startup mode for Windows 7 fails.,

What is Safe Mode?

A troubleshooting startup mode that is typically used when the regular startup mode for Windows 7 fails. It doesn not load non-essential services, and only loads basic versions of drivers.

Standard User Account

A type of user account that does not have privileges to modify settings for other users. This type of account is a member of the Users local group.

Security Set Identifier (SSID)

A unique ID that identifi es a wireless access point to the wireless networking clients that send data to it.

Instances

A unique copy of the item, you can monitor all HDD together, or you can monitor them individually as instances.

Cluster

A unit of storage for reading and writing file data in a file system. The cluster size is determined when a partition or volume is first formatted with a file system. Cluster size is based on the sector size of a disk and the number of sectors used per cluster. Cluster sizes typically range from 512 bytes to 64 KB.

Local User Account

A user account that is defined in the SAM database of a Windows 7 computer. Local user accounts are valid only for the local computer.

D. Windows Anytime Upgrade

A user has a home computer with a cable Internet connection and no other computers on his home network. Which of the following methods can this person use to upgrade from Windows 7 Home Premium to Windows 7 Ultimate? A. Sysprep B. Windows PE C. WDS D. Windows Anytime Upgrade

QUESTION 217 see exhibit

A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type. You need to ensure that users can connect to the database. Which setting should you choose? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

QUESTION 261 see exhibit B. On Folder1, remove the Deny - Write permission for Group1.

A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1. The computer contains a folder named Folder1. The permissions for User1 are shown in the User1 Permissions exhibit. The permissions for Group1 are shown in the Group1 Permissions exhibit. You need to ensure that User1 can create files in Folder1. All other members of Group1 must be prevented from creating files in Folder1. What should you do? User Permissions: Group Permissions: A. On Folder1, assign the Full control permission to User1. B. On Folder1, remove the Deny - Write permission for Group1. C. Share Folder1. Assign User1 the Read and Change share permission. D. Share Folder1. Assign Group1 the Read and Change share permission. Correct Answer: B

A. Assign Group1 the Write permission. Assign User1 the Modify permission.

A user named User1 uses a shared computer that runs Windows 7. User1 is a member of group named Group1. The computer contains a folder named Folder1. You need to configure the permissions on Folder1 to meet the following requirements: - User1 must be allowed to delete all files in Folder1. - Members of Group1 must be able to create files in Folder1. - All other members of Group1 must be prevented from deleting files they did not create in Folder1. - All users must be prevented from modifying the permissions on Folder1. What should you do? A. Assign Group1 the Write permission. Assign User1 the Modify permission. B. Assign Group1 the Modify permission. Assign User1 the Write permission. C. Deny Group1 the Write permission. Assign User1 the Modify permission. D. Deny Group1 the Modify permission. Assign User1 the Write permission.

B. Run Pnputil.exe and specify the i a parameters.

A user named User1 uses a shared computer that runs Windows 7. User1 is a standard user. User1 attempts to connect a USB device to the computer and is prompted to enter administrative credentials. You need to ensure that User1 can use the USB device without requiring administrative credentials. What should you do first? A. Add User1 to the Power Users group. B. Run Pnputil.exe and specify the i a parameters. C. Run Driverquery.exe and specify the /SI parameter. D. Copy the driver files to the C:\windows\system32 folder.

D. Ask the user to open his Recycle Bin.

A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help. What action can you take? A. Restore the file from the previous night's backup. B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin. C. Restore the file from an older backup. D. Ask the user to open his Recycle Bin.

Roaming Profile

A user profi le that is stored in a network location and is accessible from multiple computers. Roaming profi les move with users from computer to computer.

Roaming Profile

A user profile that is stored in a network location and is accessible from multiple computers. Roaming profiles move with users from computer to computer.,

QUESTION 207 see exhibit

A user-installed Windows update for Windows 7 has caused an error in software that is critical to the user. You need to find and uninstall the update to restore functionality to the software. Which settings categories should you choose? (To answer, select the appropriate settings in the work area.) Hot Area: Correct Answer:

Resource Monitor

A utility launched from Performance Monitor that provides real-time monitoring of the most common system performance indicators.

Windows System Image Manager (WSIM)

A utility that is used to create answer fi les for Windows 7 unattended installations. WSIM can also create distribution shares and confi guration sets.

Task Scheduler

A utility that allows you to schedule tasks to run at a particular time or based on specifi c events occurring.

Task Scheduler

A utility that allows you to schedule tasks to run at a particular time or based on specific events occuring.,

Task Manager

A utility that allows you to view overall system information and manipulate processes.

What is the role of Task Manager?

A utility that allows you to view overall system information and manipulate processes.,

File Signature Verification Utility

A utility that verifies the digital signature on operating system fi les and device drivers.

Windows Memory Diagnostics Tool

A utility used to perform tests on the physical memory of a computer.

Category

A view of the control panel in which applets are grouped by a common theme.,

Saved Search

A virtual folder that contains the fi les matching a search query.

Disk Management console

An MMC console snap-in used to administer hard disks in Windows 7.

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day a network user named Dean Austin asked you which of the Microsoft operating systems supports offline migration using USMT. What should you do? (Choose all that apply) A. You should consider instructing Dean Austin that Microsoft Windows Vista supports offline migration using USMT. B. You should consider instructing Dean Austin that Microsoft Windows XP Professional with SP2 or later supports offline migration using USMT. C. You should consider instructing Dean Austin that Microsoft Windows XP Professional supports offline migration using USMT. D. You should consider instructing Dean Austin that Microsoft Windows 7 supports offline migration using USMT. E. You should consider instructing Dean Austin that Microsoft Windows 2000 Professional with SP4 supports offline migration using USMT.

ABCD

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. ABC.com has two workstations, named ABC-WS13 and ABC-WS14. You are currently able to retrieve files that are encrypted using Encrypting File System (EFS) for all ABC.com's domain users from ABC-WS13. You have been instructed to make sure that you are able to do the same from ABC-WS14. Which of the following actions should you take? (Choose ALL that apply.) A. You should consider exporting the data recovery agent certificate from ABC-WS13. B. You should consider running a system image backup of ABC-WS13. C. You should consider importing the data recovery agent certificate to ABC-WS14. D. You should consider restoring a daily backup of ABC-WS13 on ABC-WS14.

AC

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed.One of ABC.com's workstations is shared by numerous ABC.com employees. You have received instructions to make sure that these employees are allowed to consume a specified amount of space on the workstation's C: drive. Which of the following actions should you take? (Choose ALL that apply.) A. You should consider having disk quota management enabled. B. You should consider creating a new GPO. C. You should consider configuring a default quota limit. D. You should consider configuring user permissions.

AC

Popup Blocker

An Internet Explorer feature that prevents most popup advertising from being displayed while you browse web sites.,

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has a workstation, named ABC-WS07, on which a HomeGroup has been created. You are then instructed to make sure that access to the HomeGroup is allowed when ABC-WS07 is linked to a private network, but prevented when ABC-WS07 is linked to a public network. Which two of the following actions should you take? (Choose TWO.) A. You should consider accessing Windows Firewall to configure the HomeGroup exception to include Home or work (private) networks. B. You should consider accessing Windows Firewall to configure the HomeGroup exception to include Public networks. C. You should consider accessing Windows Firewall to configure the HomeGroup exception to block Home or work (private) networks. D. You should consider accessing Windows Firewall to configure the HomeGroup exception to block Public networks.

AD

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7 or Microsoft Windows XP Professional. During the course of the day a network user named Dean Austin asked you which of the Microsoft utilities can be used when transferring user encryption certificates from a computer that is configured to run Microsoft Windows XP Professional to a computer configured to run Microsoft Windows 7. What should you do? (Choose two) A. You should consider instructing Dean Austin that the Windows Easy Transfer utility can be used for transferring the user encryption certificates. B. You should consider instructing Dean Austin that the xcopy.exe utility can be used for transferring the user encryption certificates. C. You should consider instructing Dean Austin that the ImageX utility can be used for transferring the user encryption certificates. D. You should consider instructing Dean Austin that the USMT utility can be used for transferring the user encryption certificates.

AD

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have previously created a customized image of Windows 7. When you notice that the image has a corrupt boot configuration data store, you decide to configure the image with a new configuration store. Which of the following actions should you take? (Choose ALL that apply.) A. You should consider making use of the Imagex.exe command with the /mountrw parameter FIRST. B. You should consider making use of the Bcdedit.exe command FIRST. C. You should consider making use of the Imagex.exe command with the /mountrw parameter NEXT. D. You should consider making use of the Bcdedit.exe command NEXT.

AD

ACE

Access Control Entries. A specific entry in a file or folder's ACL that uniquely identifies a suer or group by its security identifier and the action it is allowed or denied to take on that file or folder.,

What are tags?

Additional metadata that can be added to the properties of a file.,

Secure Logon

Adds the requirement to press Ctrl+Alt+Del before logging on.

Secure Logon

Adds the requirement to press Ctrl+Alt+Del before logging on.,

Which Group Policy configures the behaviour of UAC for the built-in Administrator account?

Admin Approval Mode for the Built-in Administrator

What are some of the differences between the Administrator account and the initial account?

Administor is a member of the administrators group that cannot be removed, cannot be deleted, and is not visible on the welcome screen.

Which Group Policy node contains IE compatibility policies?

Administrative Templates\Windows Components\Internet Explorer\Compatibility View

Which Group Policy node contains InPrivate policies?

Administrative Templates\Windows Components\Internet Explorer\InPrivate

Which Built-in groups exist?

Administrators, Backup Operators, Cryptographic Operators, Distributed COM Users, Event Log Readers, Guests, IIS_IUSRS, Network Configuration Operators, Performance Log Users, Performance Monitor Users, Power Users, Remote Desktop Users, Replicator, Users.

Security Configuration and Analysis tool

An MMC snap-in that is used to apply, export, or analyze security templates.

QUESTION 413

Alexandria is the payroll manager and stores critical file on her local drive for added security on her Windows 7 computer. She wants to ensure that she is using the disk configuration with the most fault tolerance and the highest level of consistent availability. Which of the following provisions should she use? A. Disk striping B. Spanned volumes C. Mirrored volumes D. Extended volumes Correct Answer: C

Which parameters are specified by Enforcement Properties policy in Software restriction policies?

All software files or All software files except dlls All users or All users except Local Administrators Enforce or Ignore certificate rules

C. Windows Ultimate Edition D. Windows Enterprise Edition

All the games including Titan Chess come with which versions of Windows 7? Choose two. A. Windows Home Edition B. Windows Professional Edition C. Windows Ultimate Edition D. Windows Enterprise Edition

Which Group Policy allows Remote Assistance to automatically disable secure desktop for elevation prompts?

Allow UIAccess applications to prompt for elevation without using the secure desktop

Fast user switching

Allows multiple users to ahve applications running at the same time. However, only one user can be using the console at a time.

Fast User Switching

Allows multiple users to have applications running at the same time. However, only one user can be using the console at a time.

Aero Peek

Allows the user to view the desktop, and turn all open windows transparent by pointing to end of the taskbar.

Redundant Array of Independent Disks (RAID)

Also known as Redundant Array of Inexpensive Disks. A standard reference to a collection of disks grouped to store data. The RAID level indicates the type of grouping and is indicated by a number following the term RAID. Common RAID levels are RAID 0 striped storage, RAID 1 mirrored storage, and RAID 5 striped storage with error-correcting information.

How to determine a multicast address?

Always begins with "FF".

Unified Extensible Firmware Interface (UEFI)

An open standard that builds on the proprietary EFI standard started by Intel to replace the legacy BIOS fi rmware design.

Windows Firewall with Advanced Security utility

An utility that is used to confi gure Windows Firewall and IPsec rules.

Security Template

An .inf fi le that contains security settings that can be applied to a computer or analyzed against a computer's existing confi guration.

S3 state

An ACPI power saving mode that disables power to all devices except RAM.

S0 state

An ACPI power saving mode that disables power to specifi c devices as requested by the operating system, but keeps the overall system running.

S4 state

An ACPI power saving mode that saves the contents of RAM to disk and then disables power to all devices including RAM.

Application Partition

An Active Directory partition created by an administrator to hold and replicate application-specific information. It is replicated only to specified domain controllers.

What is an InPrivate Browsing?

An IE mode that prevents prevents Internet Explorer from storing data (such as cookies, webpage history, temporary files) about your browsing session.

What is an InPrivate Filtering?

An IE mode that prevents website content providers from collecting information about sites you visit.

SmartScreen Filter

An Internet Explorer 8 feature that warns you about Web sites known to install malicious software or used in phishing attacks

InPrivate Filtering

An Internet Explorer 8 feature that allows you to control which advertisers get access to your information.

InPrivate Browsing

An Internet Explorer 8 feature that prevents caching of Web content and logging of Web activity in Internet Explorer.

InPrivate Browsing

An Internet Explorer 8 feature that prevents caching of Web content and logging of Web activity in Internet Explorer.,

SmartScreen Filter

An Internet Explorer 8 feature that warns you about Web sites known to install malicious software or usedin phishing attacks.,

Popup Blocker

An Internet Explorer feature that prevents most popup advertising from being displayed while you browse Web sites.

You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. ABC.com has recently acquired a new workstation that has Windows Vista SP2 installed. ABC.com has released a written policy requiring all workstations to run Windows 7. You need to make sure that the policy is adhered to. Which of the following actions should you take? A. You should consider performing a clean install of Windows 7. B. You should consider performing an upgrade from Windows Vista SP2 to Windows 7. C. You should consider migrating from Windows Vista SP2 to Windows 7. D. You should consider you should consider upgrading to Windows Vista business before upgrading to Windows 7.

B

You are the newly appointed network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. Workstations on the ABC.com network currently make use of Microsoft Windows XP Professional. You receive an instruction from the CIO to install Windows 7 on a workstation, named ABC-SR01. During a test installation you discover that the Online Compatibility Check has failed. You are required to fix the problem. Which of the following actions should you take? A. You should consider making sure that the display adapter has only one SVGA port and that it also supports WDDM. B. You should consider making sure that the display adapter supports WDDM, and that the workstation has the required amount of RAM. C. You should consider making sure that the workstation has the required amount of RAM, and that the display adapter has only one SVGA port. D. You should consider making sure that the display adapter has only one SVGA port, and that the Hard Disk is replaced with a larger one.

B

You are the newly employed desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are assigned a workstation named ABC-WS680. ABC-WS680 is configured to run Windows 7.You need to determine the applications that were installed by another desktop support technician the previous week. Which of the following actions should you take? A. You should consider running Software Explorer. B. You should consider reviewing the informational events from Reliability Monitor. C. You should consider running Component Services. D. You should consider running Resource Monitor

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are preparing to install a new computer on the network using image-based deployment. You have created a custom answer file named customanswer.xml. This answer file must be applied after the image is deployed. What should you do? A. Run Imagex.exe / generalize /oobe /unattend:customanswer.xml before capturing the image. B. Run Sysprep.exe /generalize /oobe /unattend:customanswer.xml before capturing the image. C. Run Imagex.exe /unattend:customanswer.xml /run command before capturing the image. D. Run setup.exe from the Windows 7 installation media before capturing the image.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are working on a Windows 7 workstation named ABC-WS680.You want to backup data on ABC-WS680.When you open the Configure Backup wizard, however, a message is displayed informing you that no drives could be found to save backups to. It is imperative that data is backed up to a local disk drive. Which of the following actions should you take? A. You should consider adding your user account to the Backup Operators group before running the Configure Backup wizard. B. You should consider opening Disk Management and creating a new volume before running the backup. C. You should consider stopping the explorer.exe process before running the backup. D. You should consider logging on to ABC-WS680 as an administrator before running the Configure Backup wizard. E. You should consider connecting a removable disk to ABC-WS680 before running the Configure Backup wizard.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You would like to connect a Windows Mobile Professional 6.1 device to your Windows 7 workstation for the purpose of synchronizing files to the mobile device. You need to accomplish this without installing drivers for the device. You have opened Sync Center. Which of the following actions should you take? A. You should consider making use of the "review the status" option. B. You should consider making use of the "set up new sync partnerships" option. C. You should consider making use of the "view sync partnerships" option. D. You should consider making use of the "scan for hardware changes" option

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 Professional installed. You are working on a workstation, named ABC-WS680, which has been assigned to a ABC.com user, named Amy Walsh. You have been instructed to update the printer connected to ABCWS680 so that Amy Walsh can print graphics at a higher resolution. Subsequent to the update, Amy Walsh's workstation reacts in a manner that prevents her from working. You want to make sure that Amy Walsh's workstation is returned to its previous state as quickly as possible. Which of the following actions should you take? A. You should consider rebooting the workstation in Safe Mode, before rolling back the printer driver. B. You should consider uninstalling the printer driver. C. You should consider rebooting the workstation using the Last Known Good Configuration. D. You should consider rebooting the workstation, and use ASR to restore the workstation.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been assigned a workstation, named ABC-WS13. You have been instructed to make sure that, while browsing, Internet Explorer is unable to store any browsing information. Which of the following actions should you take? A. You should consider selecting the Delete browsing history on exit option from the general tab of Internet Options. B. You should consider enabling Inprivate Browsing. C. You should consider enabling Caret Browsing. D. You should consider managing Internet Explorer's add-ons.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed.You have been assigned a workstation, named ABC-WS13, which links up to a ABC.com wireless access point. After deactivating the Service Set Identifier (SSID) broadcasts on the wireless access point, you are no longer able to connect to the wireless access point. Which of the following actions should you take to restore the connection? A. You should consider creating a new local GPO. B. You should consider accessing the Network and Sharing Center to make changes to the wireless network connection settings. C. You should consider accessing the Network and Sharing Center to modify the advanced sharing settings. D. You should consider creating an ad hoc networ

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network is configured to use IPv6 addressing. You have installed Windows 7 on a client computer named ABC-WS680 and have used automatic IPv6 addressing on ABC-WS680. What command can be used to help you in verifying IPv6 address of ABC-WS680? A. Running the Net view command from the command prompt on ABC-WS680. B. Selecting Details from the network connection status on ABC-WS680. C. Running the msconfig command to open the System Configuration utility on ABC-WS680. D. Running the Nbtstat command from the command prompt on ABC-WS680.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are assigned two workstations named ABCWS625 and ABC-WS680. ABC-WS625 is configured to run Windows Vista operating system and ABC-WS680 is configured to run Windows 7 operating system. You need to perform a migration of the user data files and folders along with profiles from ABCWS625 to ABC-WS680. Which command can you use that can help you in calculating the space needed for the migration? A. Run USMT \\ABC-WS625\store /nocompress /p on ABC-WS680. B. Run Scanstate c:\store /nocompress /p on ABC-WS625. C. Run migapp /user \\WS625\store /nocompress on ABC-WS680. D. Run sysprep c:\store /nocompress on ABC-WS625.

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com has two offices, named Detroit and Miami, which are located on an isolated private wired Class C subnet. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. The two offices have the IP configuration shown below: OfficeWorkstationIPv4 Address DetroitABC-WS07192.168.34.140 MiamiABC-WS13192.168.34.210 During your routine maintenance, you ping Detroit's IPv4 address and the command times out. You then try pinging Miami's IPv4 address and meet with the same result. You have been tasked with rectifying the problem. Which of the following actions should you take? A. You should consider having the DHCP service reconfigured. B. You should consider having the firewalls on both workstations to allow ICMPv4 traffic to pass through it. C. You should consider making the WINS service available on the subnet. D. You should consider implementing IPsec.

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has recently deployed a server named ABC-SR01 configured as a DHCP server that has Network Access Protection (NAP) enforcement point configured. During the course of the day you receive instruction from ABC.com to configure a network user named Rory Allen's workstation as a NAP client. You have set the Network Access Protection Agent service Startup Type to Automatic via the Services snap-in. Which of the following is another action you should take? A. You should consider configuring the Network Location as Public. B. You should consider having the DHCP Quarantine Enforcement Client enabled from the NAP Client Configuration console. C. You should consider having the Winlogon service Startup Type set to Automatic from the services snap-in. D. You should consider disabling the DHCP client service.

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has recently deployed a workstation, named ABC-WS01, which hosts a shared folder. You have been instructed to configure a strategy that allows workstations on the Intranet to access the shared folder by connecting via Remote Desktop. You have also been informed that the shared folder should not be accessible to workstations that connect to the ABC.com network remotely via the Internet. Which of the following actions should you take? A. You should consider configuring the Network Location to Public on ABC-WSO1. B. You should consider making changes to the properties of the File and Printer Sharing firewall exceptions. C. You should consider configuring the Network Location to Private on ABC-WSO1. D. You should consider modifying the share permissions on the shared folder. E. You should consider modifying the NTFS permissions on the shared folder.

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. A ABC.com employee named Rory Allen has a computer at his second office with a cable modem connection. Rory Allen has recently requested that you guide him by selecting the appropriate method which will allow him in the upgradation to Microsoft Windows 7 Ultimate from Microsoft Windows 7 Home Premium. What should you do? A. You should instruct Rory Allen that Windows Update can be used. B. You should instruct Rory Allen that Windows Anytime Upgrade can be used. C. You should instruct Rory Allen that upgrade.exe /s can be used. D. You should instruct Rory Allen that upgrade.exe /i can be used.

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day you receive instruction from ABC.com to have a client computer configured for the following options for the non administrative users . Users should not be able access to Event Viewer. Users should be able to access Disk Management Which of the following options would achieve this? A. You should consider having the permissions modified on the Microsoft Management Console. B. You should consider having the Microsoft Management Console (MMC) settings modified from the local computer policy. C. You should consider having the driver installation settings modified from the local computer policy. D. You should consider having the User Account Control (UAC) settings modified from the local computer policy

B

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers running Microsoft Windows Vista (x86) named ABC-Ws680. How can you install Microsoft Windows 7 (64-bit) on ABC-Ws680? A. You should consider having the computer started using the Windows 7 installation media.You should then have the sysprep option selected from the Install Windows dialog box. B. You should consider having the computer started using the Windows 7 installation media.You should then select the Custom (advanced) option from the Install Windows dialog box. C. You should consider having the uninstall.exe command used from the Windows 7 installation media. D. You should consider having the format.exe /C command run from the Windows 7 installation media.

B

You work as a network administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 installed. ABC.com has its headquarters in London, and a branch office in Paris. ABC.com has a server, named ABC-SR07, which hosts a shared folder and is located in the London office. ABC.com also has a laptop computer, named ABC-WS15, in the Paris office. You have been instructed to make sure that when ABC-WS15 accesses the ABC.com network, it only has access to resources in the shared folder on ABC-SR07. You also have to make sure that network traffic between the two offices is kept to a minimum. Which of the following actions should you take? A. You should consider having transparent caching enabled on ABC-SR07. B. You should consider having transparent caching enabled on ABC-WS15. C. You should consider having the Network Discovery firewall exception enabled. D. You should consider having ABC-WS15's computer account added to the Network Configuration Operators group.

B

You work as a technician at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. ABC.com has acquired a workstation that has Windows XP SP2 installed. They then inform you that the workstation has to be upgraded to Windows 7. You want to complete the upgrade as quickly as possible. Which of the following actions should you take FIRST? A. You should consider upgrading to Windows Vista SP1. B. You should consider upgrading to Windows Vista SP2. C. You should consider upgrading to Windows 7. D. You should consider formatting the hard disk.

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and all workstations have Windows 7 Enterprise installed. ABC.com has a server, named ABC-SR07, which has the following configured: •Microsoft Deployment Toolkit (MDT) •Windows Deployment Services (WDS) •Windows Automated Installation Kit (WAIK) You have received instructions to capture a standard image of Windows 7 from one of the ABC.com workstations. Furthermore, you are informed that the workstation's device drivers should not be included in the image. You plan to execute the Sysprep tool with an answer file.Which of the following actions should you take NEXT? A. You should consider setting the PersistAllDeviceInstalls option of the answer file to True. B. You should consider setting the PersistAllDeviceInstalls option of the answer file to False. C. You should consider setting the WillReboot option of the RunSynchronousCommand to Never. D. You should consider setting the WillReboot option of the RunSynchronousCommand to OnRequest

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. A ABC.com workstation, which forms part of a workgroup, has a local group configured. You have since been instructed to make sure that users belonging to a local group are unable to initialize a certain application. You have also been informed that your solution makes use of as little administrator input as possible. Which of the following actions should you take? A. You should consider configuring a newuser control policy. B. You should consider configuring a new application control policy. C. You should consider configuring a new computer control policy D. You should consider configuring a new group control policy

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. The ABC.com network has a VPN server, named ABC-SR13, which is configured to make use of a pre-shared key. You have been assigned to a workstation, named ABC-WS07, which should be configured to access the ABC.com network via a VPN link. You are planning to create an L2TP/IPsec VPN link. Which of the following options are TRUE with regards to an L2TP/IPsec VPN link? A. L2TP/IPsec allows multiprotocol traffic to be encrypted and then encapsulated in an IP header to be sent across an IP network or a public IP network. B. L2TP/IPsec allows multiprotocol traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery. C. L2TP/IPsec is a tunneling protocol that makes use of the HTTPS protocol over TCP port 443 to permit traffic via firewalls and Web proxies. D. L2TP/IPsec provides flexibility to the VPN client when the client moves from one wireless hotspot to another or when it switches from a wireless to a wired connection.

B

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Windows 7 installed. ABC.com has a workstation, named ABC-WS07, which has Advanced Audit Policy Configuration enabled in the Local Computer Policy. When you discover that the policy has not been applied, you want to rectify it as soon as possible. You decide to make use of the Gpupdate command. Which of the following actions should you take? A. You should consider including the /boot parameter. B. You should consider including the /force parameter. C. You should consider including the /logoff parameter. D. You should consider including the /wait:value parameter

B

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. After ABC.com acquires a demo windows 7 workstation from one of their suppliers, you are tasked with finding out whether there are any drivers installed on the workstation that has not been signed. Which of the following actions should you take? A. You should consider making use of the Driverquery.exe command with the /s parameter. B. You should consider making use of Driverquery.exe command with the /si parameter. C. You should consider making use of Driverquery.exe command with the/fo list parameter. D. You should consider making use of Driverquery.exe command with the /v parameter.

B

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. Your workstation is configured to run a system image backup on a daily basis. When one of your files becomes corrupt, you decide to restore the file from the latest system image backup. You have to make sure that your solution requires little or no user input. Which of the following actions should you take? A. You should consider restarting your workstation and choosing the Last Known Good Configuration option from the Advanced Boot Menu. B. You should consider making use of the restore my files option via Backup and Restore. C. You should consider restarting your workstation and running ASR. D. You should consider restoring the latest image in its entirety via Backup and Restore.

B

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have a desktop workstation in the office and a laptop for in the field. You then make use of the Advanced Sharing feature to create a shared folder on your desktop workstation. You want to make sure that automatic caching occurs when the shared folder is accessed from your laptop. Which of the following actions should you take? A. You should consider altering the properties of the shared folder on your laptop. B. You should consider having all BranchCache rules enabled in Windows Firewall. C. You should consider altering the properties of the shared folder on your desktop workstation. D. You should consider creating a temporary wireless network.

C

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. The ABC.com network contains a workstation, named ABC-WS680, which you have attached to a printer named PRINTER01.You then install the printer drivers, and remove the Everyone group from the access control list (ACL) for PRINTER01before sharing the printer. You need to ensure that print jobs produced by employees belonging to a group named ABC_STAFF, are able to alter those print jobs. They should not, however, have the ability to alter print jobs produced by other ABC.com employees. Which of the following actions should you take? A. You should consider disabling User Account Control (UAC) on ABC-WS-680. B. You should consider lowering the priority of PRINTER01. C. You should consider including the ABC_STAFF group in the ACL. D. You should consider assigning the Deny - Modify permission on PRINTER01.

C

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. The Research and Development department is working on a confidential project. The hard disks of ABC.com's workstations have BitLocker configured for data encryption. The BitLocker password is stored on a USB drive. All encrypted workstations make use of Trusted Platform Model (TPM) chips on their motherboards. A member of the Research and Development department, named Amy Wilson, has been assigned a workstation named ABC-WS680.Amy Wilson reports that she was not able to start ABC-WS680 due to a problematic TPM chip. You have been instructed to recover the encrypted data from ABC-WS680. Which of the following actions should you take? A. You should consider replacing the motherboard on ABC-WS680 with a motherboard that has the same brand of TPM chip. B. You should consider updating the BIOS on ABC-WS680. C. You should consider making use of the BitLocker password from to access the BitLocker Drive Encryption Recovery console on ABC-WS680. D. You should consider running WinRE on ABC-WS680.

C

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network has Windows 7 installed. You are assigned to a workstation that has many operators. You then configure a shared folder on the workstation, and configure it to have auditing enabled. You want to make sure that a log is recorded whenever the shared folder is opened. Which of the following actions should you take? A. You should consider having the Audit object access setting configured via the Global Group Policy. B. You should consider configuring a trace event. C. You should consider having the Audit object access setting configured via the local Group Policy. D. You should consider creating a new GPO and linking it to the shared folder.

C

You work as a network administrator at ABC.com. ABC.com currently has its headquarters located in Miami and a branch office located in Detroit. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com has the Detroit office configured to use BranchCache. During the course of the day a network user in the Detroit office using a computer named ABC-WS01 complains about experiencing very slow speed and not loading applications properly. How would you temporarily block all the computers from retrieving cached content from ABCWS01 in order to find out if this is the cause of the problem? A. You should consider stopping the Server service on ABC-WS01. B. You should consider having the File and Printer Sharing setting modified on ABC-WS01. C. You should consider having the Netsh branchcache flush command run at the command prompt of ABC-WS01. D. You should consider having the Windows Firewall configured to Block All Incoming Connections on ABC-WS01.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are preparing to install Windows 7 on a new workstation. Because of your workload, you would like to configure an automatic installation of Windows 7. To achieve this, you have to generate an unattended answer file. Which of the following actions should you take? A. You should consider making use of the bcedit.exe utility or the gpedit.msc utility. B. You should consider making use of the Windows SIM tool in Windows AIK or the gpedit.msc utility. C. You should consider making use of the Windows SIM tool in Windows AIK or Microsoft Notepad. D. You should consider making use of Microsoft Notepad or the gpedit.msc utility. E. You should consider making use of Microsoft Notepad or the bootcfg utility

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com recently deployed a server, named ABC-SR01, and installed a custom network application. ABC-SR01 has two IP addresses, 192.168.45.23 and 192.168.45.24, configured. You want to make sure that only the 192.168.45.23 IP address is used by ABC-WS680 to resolve ABC-SR01.ABC.com.Which of the following actions should you take? A. You should consider having the Hosts file edited on ABC-SR01. B. You should consider having the Lmhosts file edited on ABC-SR01. C. You should consider having the Hosts file edited on ABC-WS680. D. You should consider having the Lmhosts file edited on ABC-WS680. E. You should consider having the ipconfig /registerdns command run on ABC-SR01.

C

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory forest containing a single domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. ABC.com purchases 40 new client computers configured with 32-bit hardware. What can do you in order to ensure an image based deployment from a custom image whilst ensuring the least amount of administration is needed? A. You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and run on a server. B. You should consider having Windows 7 installed on each computer ready for the deployment of the company custom applications. C. You should consider having Microsoft Windows 7 and the company custom applications installed on one client computer. D. You should consider having the Microsoft Assessment and Planning (MAP) toolkit installed and run on a client computer. E. You should consider having WSUS installed on a server.

C

You work as administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed and all workstations have Windows 7 Enterprise installed. You have been instructed to configure a solution that allows events from a workstation, named ABC-WS07, to be collected automatically on a server, namedABC-SR35. You are also informed that the usage of Bandwidth delivery optimization together with the subscription should not form part of the solution. You want to make sure that the necessary collector-initiated subscription is configured. Which of the following actions should you take on ABC-SR35? A. You should consider executing wecutil ds. B. You should consider executing wecutil qc. C. You should consider executing wecutil cs. D. You should consider executing wecutil rs.

C

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and all workstations have Windows 7 Enterprise installed. ABC.com has a server, named ABC-SR07, which has the following configured: •Microsoft Deployment Toolkit (MDT) •Windows Deployment Services (WDS) •Windows Automated Installation Kit (WAIK) You have been instructed to delete data from the virtual disk located on one of ABC.com's workstations. You start by accessing the DiskPart utility. Which of the following DiskPart commands should you make use of NEXT? A. Delete partition. B. Attributes. C. Attach. D. Delete volume. E. Add disk.

C

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. All ABC.com's workstations have been configured with static IP addresses. You are preparing to configure a startup script to alter these IP addresses. Which of the following actions should you take? A. You should consider making the Netstat.exe command part of the startup script. B. You should consider making the Ipconfig.exe command part of the startup script. C. You should consider making the Netsh.exe command part of the startup script. D. You should consider making the Ntsd.exe command part of the startup script.

C

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed. ABC.com has a domain controller, named ABC-DC01. You have been assigned a laptop workstation that has Windows 7 Home Premium installed and resides in the same IP range as ABC-DC01. You want to configure your laptop workstation in such a way that you are able to manage ABCDC01 by connecting to it via Active Directory Users and Computers. Which of the following actions should you take FIRST? A. You should consider downloading and installing Remote Server Administration Tools (RSAT) on ABC-DC01. B. You should consider downloading and installing Remote Server Administration Tools (RSAT) on the laptop workstation. C. You should consider making use of the Windows Anytime Upgrade feature to upgrade the laptop workstation to Windows 7 Professional. D. You should consider making use of the Windows Anytime Upgrade feature to upgrade ABCDC01 to Windows Server 2008 R2.

C

You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstation on ABC.com's network have a 32-bit version of Windows Vista Business installed. You have received instructions to migrate the current operating system to a suitable version ofWindows 7. Which of the following actions should you take? A. You should consider migrating to a 64-bit version of Windows 7 Professional. B. You should consider migrating to a 64-bit version of Windows 7 Enterprise. C. You should consider migrating to a 32-bit version of Windows 7 Professional. D. You should consider migrating to a 32-bit version of Windows 7 Home Basic.

C

Tablet PC Settings applet

Confi gures settings that are specifi c to tablet PCs such as screen menu locations and handwriting recognition.

Taskbar and Start Menu applet

Confi gures the behavior of the taskbar and Start menu, including which toolbars are displayed on the taskbar.

You work as the network Administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network client computers currently make use of Microsoft Windows XP Professional. You receive an instruction from Management to upgrade a client computer named ABC-WS25 to Windows 7. You decide to do the installation using the Windows 7 DVD so you log in to ABCWS25 and insert the DVD. What should you do next? (Choose all that apply. Each answer is a complete solution) A. One option would be to execute run setup.exe to upgrade to Windows 7 and keep all the Windows XP settings. B. One option would be to make use of the autorun feature on the DVD to upgrade to Windows 7 and keep all the Windows XP settings. C. One option would be to run setup.exe from the DVD in order to start a clean Windows 7 installation. D. One option would be to make use of the autorun feature on the DVD in order to start a clean installation. Answer: C,D

CD

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The network contains a data file server named ABCSR03 which contains ABC_Data shared folder and running Windows Server 2008 operation system.. You have been assigned a client computer named ABC-WS680 running Windows 7 operating system. You need to ensure the availability of the files in ABC_Data share and maintain encryption even when ABC-SR03 has been disconnected from the network. How you can accomplish this task? (Each correct answer presents part on the solution. Choose TWO.) A. By copying the files from ABC_Data to the Documents library on ABC-WS680. B. By encrypting the files in the ABC_Data share on ABC-SR03. C. By enabling encryption of offline files on ABC-WS680 D. By enabling BitLocker Drive Encryption on ABC-WS680. E. By making ABC_Data available offline on ABC-WS680. F. By enabling BitLocker Drive Encryption on ABC-SR03. ne.

CE

.CSV

Can save files that are created using Performance monitor and many databases can open it.,

Sound Applet

Confi gures the properties for the audio devices in your system and confi gures a sound scheme.

What are the benefits of Windows 7 Ultimate

Combines all features of Windows 7 home and business operating systems. Available in Retail and OEM versions.,

How is an IPv4-compatible address used?

Communicating between IPv6/IPv4 (dual stack) nodes using IPv6.

How is a 6to4 address used?

Communication between two IPv6/IPv4 nodes over the IPv4 Internet. 2002 + public IPv4 address in hex + SLA ID

What application allows you to make your own shim?

Compatibility Administrator

COM

Component Object Model. A generalized method used by some applications to cross-link to and access each other. This is a broader method than OLE.,

From which Group Policy node can you access BitLocker policies?

Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption

Where can you find BitLocker To Go group policies?

Computer Configuration\Administrative Templates\Windows Components\BitLocker Drive Encryption\Removable Data Drives

From which Group Policy node can you add recovery agent for EFS?

Computer Configuration\ Windows Settings\Security Settings\Public Key Policies\ Encrypting File System

Where can you change Power management policies?

Computer Configuration\ Administrative Templates\System\Power Management

Where are Removable drive policies located?

Computer Configuration\Administrative Templates\ System\Removable Storage Access

Where are BranchCache policies located?

Computer Configuration\Administrative Templates\Network\BranchCache

Where can you configure Group Policies for Offline files?

Computer Configuration\Administrative Templates\Network\Offline Files

Which Group policies need to be configured for DIrect Access clients?

Computer Configuration\Administrative Templates\TCPIP Settings\IPv6 Transition Technologies - 6to4 Relay Name - IP-HTTPS State - Teredo Default Qualified - Teredo Server Name Computer Configuration\Policies\Windows Settings\Name Resolution Policy - Enable DNS settings for Direct Access in this rule

Which Group policy node contains policies for configuring Windows Update?

Computer Configuration\Administrative Templates\Windows Components\Windows Update

Which node of Group Policy allows you to configure UAC?

Computer Configuration\Windows Settings\ Security Settings\Local Policies\Security Options

Where would you find AppLocker Policies?

Computer Configuration\Windows Settings\Security Settings\Application Control Policies

Where can you configure auditing of connections from remote users?

Computer Configuration\Windows Settings\Security Settings\Local Policies\Audit Policy\Audit Logon Events

Where can you create or add a BitLocker DRA?

Computer Configuration\Windows Settings\Security Settings\Public Key Policies\BitLocker Drive Encryption

Where would you find Software Restriction Policies?

Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies

Group Policy node to permit non-administrators to install specified device classes?

Computer configuration\Administrative Templates\System\Device Installation\Device Installation Restrictions

Application Compatibility Group Policies are located in ...

Computer configuration\Administrative Templates\System\Troubleshooting and Diagnostics\Application Compatibility Diagnostics

Speech Recognition Options applet

Confi gures how Windows 7 performs speech recognition, and allows you to train speech recognition for your voice.

Folder Options Applet

Configures the behavior of Windows Explorer, including whether file extensions are hidden for known file types, and whether hidden files are displayed.

You are employed as the network Administrator at ABC.com. The ABC.com network client computers currently make use of Microsoft Windows XP Professional. ABC.com has recently decided to have the client computers upgraded to Microsoft Windows 7 with all the installed applications. You receive an instruction from management to identify the volume types that is not used by Windows 7. A. In Windows 7 exFAT is not a volume type. B. In Windows 7 NTFS is not a volume type. C. In Windows 7 FAT is not a volume type. D. In Windows 7 NFS is not a volume type

D

You are employed as the network Administrator at ABC.com. The ABC.com network client computers currently make use of Microsoft Windows XP Professional. ABC.com has recently decided to have the client computers upgraded to Microsoft Windows 7. You receive a complaint from a ABC.com user named Mia Hamm stating that she is unable to find the games included with Windows 7. How can you proceed to install games on Mia Hamm computer? A. By installing the games by using Add/Remove Windows Components. B. By Installing the games by running Windows Update. C. By installing the games by running the games installer from the Windows 7 DVD. D. By installing the games by going to Control Panel > Programs, then clicking the option Turn Windows features on or off.

D

You are employed as the network Administrator at ABC.com. The ABC.com network is configured as a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. The ABC.com network is configured to make use of IPv6. You are responsible for managing a computer named ABC-WS13. You have been instructed to generate a DNS record that will allow users to link up to ABC-WS13 via a sub domain, called dec.ABC.com. You are, therefore, required to specify the necessary DNS record. Which of the following actions should you take? A. You should consider making use of an NS record. B. You should consider making use of an AFSDB record. C. You should consider making use of an MX record. D. You should consider making use of an AAAA record. E. You should consider making use of an RP record.

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com has numerous Windows XP workstations that need to have Windows 7 installed. You have been informed that the installation should allow for the transference of all users documents and settings, but prevent audio and visual files from being transferred. Which of the following actions should you take? A. You should consider making changes to the app.config file. B. You should consider making changes to the machine.config file. C. You should consider making changes to a custom config.xml file. D. You should consider making changes to the migdocs.xml file.

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com currently makes use of a computer named ABC-WS680 which runs Microsoft Windows 7. ABC-WS680 is currently used by multiple ABC.com network users who log on to the computer. You have received instruction to deny a ABC.com user named Mia Hamm access to removable devices on ABC-WS680. However, all other users who log on to ABC-WS680 must retain access to removable devices. What should you do? A. You should consider configuring NTFS permissions in Disk Management on ABC-WS680. B. You should consider altering the Disk Encryption settings on ABC-WS680. C. You should consider running the Dism.exe utility on ABC-WS680. D. You should consider accessing the local Group Policy on ABC-WS680 to altering a removable storage access policy.

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on the ABC.com network run Microsoft Windows 7. ABC.com issues a new usage policy that prevents ABC.com users from installing removable disk devices on their computers. You need to ensure that the policy is implemented. What should you do? A. You should remove all users from the local administrators groups on each computer. B. You should enable the block unsigned drivers setting on each computer. C. You should enable the User Account Control setting on each computer D. You should enable the 'Prevent installation of removable devices' group policy setting.

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All client computers on theABC.com network run Windows 7. A ABC.com user named Amy Walsh has been assigned a mobile computer named ABC-WS680. Amy Walsh needs to travel extensively in the execution of her duties and has configured ABCWS621 to use the Power saver power plan. However, Amy Walsh reports that ABC-WS680 does not shut down completely when she clicks the Power button icon on the Start menu as the same programs that were opened when she tried to shut down the computer are still open when she restarts the computer. You now need to configure ABC-WS680 to have it turn off completely without saving Amy Wilson's desktop session when she clicks the Power button icon on the Start menu. What should you do? A. You should disable the Wake-on-LAN feature. B. You should disable the screensaver. C. You should open 'Advanced Settings' for the current power plan from 'Power Options' and change the 'On battery' setting in the 'Sleep after' category to 'Never'. D. You should open 'Advanced Settings' for the current power plan from 'Power Options' and change the 'Start menu power button' setting to 'Shut down'.

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. ABC.com has a workstation, named ABC-WS36, which has a third party application installed. You have been instructed to make sure that ABC-WS36 has a certain edition of the application installed. You then acquire the digital signature of the vendor for the application. Which of the following actions should you take? A. You should consider configuring a certificate rule via Application Control Policies. B. You should consider configuring a certificate rule via User Access Control Panel. C. You should consider configuring a certificate rule via Security Control Manager D. You should consider configuring a certificate rule via Software Restriction policies

D

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. You have been instructed to create a DirectAccess link for a ABC.com remote workstation. Which of the following statements are TRUE with regards to this scenario? A. You should start by configuring a dynamic IPv4 address. B. You should start by configuring a dynamic IPv6 address. C. You should start by configuring a static IPv4 address. D. You should start by configuring a static IPv6 address.

D

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. You are working on an application and receiving error messages. You need to perform the following tasks. Creating screenshots of the actions performed on the computer Ensuring that the mouse actions are tracked too. How can you achieve this? A. By running Netmon.exe and starting a capture. B. By running paint.exe and pressing the Printscreen key. C. By running Windows Media Player. D. By running the Psr.exe command and clicking Start Record.

D

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the workstations run Microsoft Windows 7. You have been instructed to create a native Virtual Hard Disk, named KingSystem, in a folder KingWindows. The KingWindows folder is hosted by external hard disk that has the H: drive letter assigned. You are also informed that the maximum size of the VHD should be 60-GB. Which of the following actions should you take? A. You should consider making use of the diskpart file=h:\kingwindows\kingsystem.vhd maximum=60 command. B. You should consider making use of the diskpart file=h:\kingwindows\kingsystem maximum=60 command. C. You should consider making use of the create vhd file= h:\kingwindows\kingsystem.vhd maximum=60000 command. D. You should consider making use of the create vdisk file=h:\kingwindows\kingsystem.vhd maximum=60000 command.

D

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. ABC.com has a workstation, named ABC-WS13, which is configured to host a shared folder. ABC.com has instructed you to make sure that you and your fellow administrators are the only users who are allowed to shut ABC-WS13 down. To achieve this, you are required to make changes to the User Rights Assignment. What action should you take? A. You should consider accessing the global computer policy B. You should consider accessing the local user policy C. You should consider accessing the global computer policy D. You should consider accessing the local computer policy

D

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have been assigned to manage a workstation, named ABC-WS07. You have noticed that the Internet Explorer on ABC-WS07 has ActiveX controls enabled. You are informed that ActiveX controls should not be allowed to run in ABC-WS07's Internet Explorer. Which of the following actions should you take? A. You should consider accessing Internet Options, and making changes on the General Tab. B. You should consider accessing Internet Options, and making changes on the Connections Tab. C. You should consider accessing Programs Options, and making changes on the General Tab. D. You should consider accessing Internet Options, and making changes on the Security Tab.

D

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed, and workstations have Windows 7 installed. You have received instructions to migrate the user state on a workstation, named ABC-WS13, via the User State Migration Tool (USMT) 4.0. You are preparing to execute the Scanstate.exe command. You are required to make use of the appropriate parameters for specifying the user files that will be included in the migration. Which of the following actions should you take? A. You should consider making use of the /genconfig parameter. B. You should consider making use of the /genconfig parameter. C. You should consider making use of the /auto parameter. D. You should consider making use of /genmigxml parameter.

D

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 R2 installed,and workstations have Windows 7 installed. ABC.com has a workstation, named ABC-WS07, from which users are currently uninstalling applications freely. ABC.com has released a new written policy that requires all users to enter their credentials for uninstalling applications from ABC-WS07. You have been tasked with enforcing the new policy. Which of the following actions should you take? A. You should consider configuring the Behavior of the elevation prompt for administrator's option in the Admin Approval Mode setting of the Computer Account Control. B. You should consider configuring the Behavior of the elevation prompt for administrator's option in the Admin Approval Mode setting of the Application Control. C. You should consider configuring the Behavior of the elevation prompt for administrator's option in the Admin Approval Mode setting of the Group Control. D. You should consider configuring the Behavior of the elevation prompt for administrator's option in the Admin Approval Mode setting of the User Account Control.

D

Which monitoring bottlenecks exist on a computer?

Hard Drive, Memory, CPU, Networking

You work as an administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has a workstation, named ABC-WS15, which must be configured to host Windows XP on a newly configured partition. Subsequent to the Windows XP installation, the Windows 7 operating system encounters boot problems. You want make sure that Windows 7 is up and running on ABC-WS15 as soon as possible. Which of the following actions should you take? A. You should consider making use of a System Restore. B. You should consider rebooting ABC-WS15 with the Last Known Good Configuration option. C. You should consider rebooting ABC-WS15 with the Safe Mode option. D. You should consider starting ABC-WS15 and running Startup Repair from the Windows 7 installation DVD.

D

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All workstations on the ABC.com network have Windows 7 installed. The ABC.com network contains several File servers. You want to make sure that when your workstation, named ABC-WS680, is connected to a private network it can only connect to ABC.com's File servers. Which of the following actions should you take? A. You should consider changing the software restriction policies via the local Group Policy on ABC-WS680. B. You should consider creating a path rule on ABC-WS680. C. You should consider modifying the Advanced settings in Internet Explorer on ABC-WS680. D. You should consider creating a new rule via the Windows Firewall with Advanced Security Policy on ABC-WS680.

D

You work as the Desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You have been instructed to deploy Microsoft Windows 7 on all of the ABC.com workstations. You have installed Windows Automated Installation Kit (Windows AIK) on a reference workstation. You then created an answer file for a Windows 7 unattended installation. You now need to validate the answer file before deploying Windows 7 to the ABC.com workstations. Which of the following actions should you take? A. You should consider making use of the Setup Manager. B. You should consider making use of the Sysprep.exe utility. C. You should consider making use of the Office Customization Tool (OCT). D. You should consider making use of the Windows System Image Manager tool.

D

Certificate

Digital information that describes the identity of a user or computer. A user or computer can inspect the certificate and decide if its validity can be trusted. Certificates are issued by special servers called Certification Authorities (CA). If a user or computer trusts a CA, then they typically trust the certifi cates issued by the CA.

Certificate

Digital information that describes the identity of a user or computer. A user or computer can inspect the certificate and decide if its validity can be trusted. Certificates are issued by special servers called Certification Authorities (CA). If a user or computer trusts a CA, then they typically trust the certificates issued by the CA.

Windows Flip

Displays a live thumbnail of each open Window as you use ALT-Tab to select a window.

What are the good and bad features of CHAP?

Doesn't authenticate the server, only authenticates the user. Challenges the computer to confirm that it is the same computer. Fast, compressed, and encrypted.

Cached Credentials

Domain credentials that are stored in Windows 7 after a user has logged on to a domain. Cached credentials can be used to log on when a domain controller cannot be contacted.

Aero Snap

Dragging a window to the top maximizes a window, and dragging a window to the left or right of the screen will size the window to take up the left or right of the screen.

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a Windows 7 client computer named ABC-WS680. ABC-WS680 also runs a third party accounting application named accapp.exe. Accapp.exe is started during the boot process. You have received instructions to ensure that accapp.exe is only started manually and not started during the boot process. How can you stop accapp.exe starting during the boot process? A. By modifying the permissions on accapp.exe. B. By using the System Configuration tool and using the Boot tab. C. By setting a software restriction policy. D. By creating a path rule to accapp.exe. E. By using the System Configuration tool and setting the Startup applications.

E

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are working on a client computer named ABC-WS680 that is running Windows 7. System Protection is enabled on ABC-WS680. You have identified a problem with System Protection and you only want to keep the most recent System Protection snapshot. How do you delete all of the previous snapshots? A. By compressing the disk drive. B. By enabling disk quotas. C. By disabling the System Restore from the System Protection Restore settings. D. By deleting the contents of the %systemroot%\Temp folder. E. By running Disk Cleanup for System Restore and Shadow Copies.

E

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. All servers on the network have Microsoft Windows Server 2008 installed and all workstations have Microsoft Windows 7 installed. ABC.com has recently deployed two workstations, named ABC-WS01 and ABC-WS02, which are configured with the fe80::32cd:4da5%11 and fe80::26bc:2ae5%13 IPv6 addresses respectively.During the course of the day you receive instruction from ABC.com to test the IPv6 address connection from ABC-WS01 to ABC-WS02. Which of the following actions should you take? A. You should consider executing the ping -t fe80::32cd:4da5%11 command. B. You should consider executing the ping -t fe80::26bc:2ae5%13 command. C. You should consider executing the ping -r fe80::26bc:2ae5%13 command. D. You should consider executing the ping -6 fe80::32cd:4da5%11 command. E. You should consider executing the ping -6 fe80::26bc:2ae5%13 command.

E

You work as a network administrator at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The servers on the network run Microsoft Windows Server 2008 and the client computers run Microsoft Windows 7. During the course of the day you receive instruction from ABC.com to find out which computer policy setting can be used in order to deny the network users execute, write and read access for a removable hard drive along with any other types of storage devices for security reasons. Which of the following is the easiest way to achieve this? A. You should consider making use of a path rule. B. You should consider making use of the Removable Disks: Deny Write Access computer policy setting. C. You should consider making use of Windows Explorer to change the permissions on the drives on each client computer D. You should create a Software Restriction policy. E. You should consider making use of the All Removable Storage Classes: Deny All Access computer policy setting.

E

EAP

Extensible Authentication Protocol. A modular standard for defining authentication protocols that can be used to validate a computer or user. A product developer can introduce a custom authentication protocol for their product if it is not already included with Windows 7. EAP is available as an authentication standard with dial-up, VPN, and wireless connections.

Which file systems exist that Windows 7 supports? When did each one appear?

Fat12, Fat16, Fat32, vFAT, exFAT, NTFS, CIFS, NFS, UDF, CDF

B. Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install.

Federated Search connectors are installed using what method? A. Purchase the Federated Search Installation Tool Pack online and buying individual search connectors from websites. B. Download an .osdx file from a valid source. Double click on the downloaded file and choose Add to install. C. Go to Microsoft's website. Only vendors who have signed up with the Microsoft Federated Search Tool Writers Guild can participate. D. Go to Amazon.com and download the Shared Resource Kit for Federated Searches.

Diagnostics Tab

For the remote access utility, sets up a log for dialing connections.

Access Control List (ACL)

For those file systems that support ACLs for files and folders, such as NTFS, the ACL is a property of every fi le and folder in that file system. It holds a collection (that is, list) of ACE items that explicitly defi nes what actions are allowed to be taken on the fi le or folder to which it is attached.

What are the benefits of Windows 7 Home Premium

Full Aero interface. Multiple Monitor support, Support for up to 2 physical CPUs, 32 & 64 bit versions, 64 bit version supports up to 16GB RAM, Support for tablet PCs and MultiTouch controls, Display personalization, Desktop enhancements, Windows Media Center capabilities, Creation and use of HomeGroups, Windows Mobility Center, Network printing, Internet Connection Sharing, Fast User Switching, Games.

GPT

GUID Partition Table. A disk partitioning style that allows more partitions and advanced partition informaiton when compared to older MBR style disk partition scheme. Desktop computer only use GPT in specialized and limited cases due to its limited applicability.,

GDI

Graphics Device Interface. The format used for displaying screen content in pre-Windows Vista versions of Windows.,

GPO

Group Policy Object. A collection of Group Policy settings that can be applied to client computers.,

Which parameters are specified by Trusted Publishers policy in Software restriction policies?

Groups of users allowed to manage Trusted publishers Additional verification of certificate

Built-in Local groups

Groups that are automatically created for each Windows 7 computer and stored in the SAM database.

Where can you change paths which Win7 searches for driver packages?

HKLM/Software/Microsoft/Windows/CurrentVersion/DevicePath

NTFS permissions can be easily circumvented when you have physical access to a computer.

If a person is able to install the HDD from another computer that does not recognize NTFS permissions, they can access all of the data on it, regardless of permission.

Under what circumstances can you undo a system restore?

If you boot Windows 7 normally or from Last Known Good Configuration (Advanced).

B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions.

In Windows 7 you can control when users such as kids can login to Windows 7. Which of the following best describes where to configure this option? A. You cannot choose this feature unless you are connected to a domain. B. Go to the Start, Control Panel, User Accounts and Family Safety, Setup Parental Controls, and then choose Time Restrictions. C. Go to Start, Control Panel. User Profiles, and then Time Restriction Settings. D. Go to the Homegroup settings and choose Offline Time Settings.

A. Windows XP Professional (x64) to Windows 7 Professional (x64) B. Windows Vista Business (x86) to Windows 7 Professional (x64) D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86)

In which of the following scenarios must you perform a migration rather than an upgrade? (Choose three.) A. Windows XP Professional (x64) to Windows 7 Professional (x64) B. Windows Vista Business (x86) to Windows 7 Professional (x64) C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64) D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86)

Metadata

Information or properties for a file or other object. Windows 7 allows you to include tags as additional metadata for files.

What is meant by metadata? How can you use it for greatest effect?

Information or properties for a file or other object. Windows 7 allows you to include tags as additional metadata for files.,

Analog

Information transmitted in a continuously variable form. Phone systems are an example of an information system that uses analog data.

Before you can use a newly added disk, you must first ...

Initialize the disk.

ISDN

Integrated Service Digital Network. A direct, digital dial-up connection to a PSTN that operates at 64 KB per channel over regular twisted-pair cable between a subscriber and the PSTN office.

How is an IPv4-mapped address used?

It represents an IPv4-only node to an IPv6 node. Used only for internal representation. It is never specified as a source or destination address of an IPv6 packet.

QUESTION 416

Kayla is dissatisfied with the configuration of her keyboard and mouse. She wants to reset the keyboard speed and the mouse pointer rate. Which utility should she use to configure the keyboard and mouse properties? A. Control Panel B. Computer Management C. Microsoft Management Console D. Registry Editor Correct Answer: A

A. The Word and Excel files in Don's Documents library B. The Word and Excel files in Kim's Documents library C. The PowerPoint files in Don's Presentation folder D. The digital photographs in Don's Pictures library

Kim Akers has an administrator account on a computer running Windows 7 Enterprise. Don Hall has a standard account on the same computer. Both users have Microsoft Office Word and Microsoft Office Excel files saved in their Documents library. Don stores Microsoft Office PowerPoint presentations in a subfolder of his Documents library named Presentations. He also stores digital photographs in his Pictures library. Don has created a folder called Secret in his Documents library and has encrypted the folder and its contents. He stores confidential files in that folder. When Don last logged on, he deleted some personal files but did not empty his Recycle Bin. Kim is logged on to the computer. She has plugged in a USB flash memory device that holds personal files but has not yet copied any of these files to the computer. She has never formatted the flash memory device. The computer is configured to let Windows decide what files and folders to back up. Kim opens the Backup And Restore console but does not change any settings. She clicks Backup Now. Which files are backed up? (Choose all that apply.) A. The Word and Excel files in Don's Documents library B. The Word and Excel files in Kim's Documents library C. The PowerPoint files in Don's Presentation folder D. The digital photographs in Don's Pictures library E. The files in Don's Secret folder F. The files in Don's Recycle Bin G. The files on Kim's USB flash memory device

L2TP

Layer 2 Tunneling Protocol. A protocol used to carry PPP packets through IP networks.,

Connection (Network Connection)

The clients, services, and protocols that are configured for a network card.

F. Copy the file from a previous version of a folder.

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below. The Disk Management Console The System Properties window The System protection for Local Disk C window You share the Pictures library over a network. You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password. You need to open the image file. What should you do? A. Delete restore points. B. Create a restore point C. Perform a system restore. D. Search for the file in the Recycle Bin. E. Increase disk space used for system protection F. Copy the file from a previous version of a folder. G. Set restore settings Only restore previous version of files. H. Run the cipher /x command from the elevated command prompt. I. Run the vssadmin list volumes command from the elevated command prompt. J. Run the vssadmin list shadows command form the elevated command prompt. K. Run the compact /U <file_name> command form the elevated command prompt.

F. Copy the file from a previous version of a folder.

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below. The Disk Management Console The System Properties window The System protection for Local Disk C window You share your Documents library over a network. You discover that one of the files in the library was replaced with a previous version and then renamed. You need to restore the most recent version of the original file. What should you do? A. Delete restore points. B. Create a restore point C. Perform a system restore. D. Search for the file in the Recycle Bin. E. Increase disk space used for system protection F. Copy the file from a previous version of a folder. G. Set restore settings Only restore previous version of files. H. Run the cipher /x command from the elevated command prompt. I. Run the vssadmin list volumes command from the elevated command prompt. J. Run the vssadmin list shadows command form the elevated command prompt. K. Run the compact /U <file_name> command form the elevated command prompt.

A. Delete restore points.

Note: This question is part of a series of questions that use the same set of answer choices. An Answer choice may be correct for more than one question in the series. You use a desktop computer that has Windows 7 Ultimate SP1. This relevant portions of the computer configuration are shown in the following below. - The Disk Management Console - The System Properties window - The System protection for Local Disk C window You create a password for several Microsoft Office files from your Documents library. You share the Documents library over a network. You need to ensure that network users are unable to access the unprotected version of the files. What should you do? A. Delete restore points. B. Create a restore point C. Perform a system restore. D. Search for the file in the Recycle Bin. E. Increase disk space used for system protection F. Copy the file from a previous version of a folder. G. Set restore settings Only restore previous version of files. H. Run the cipher /x command from the elevated command prompt. I. Run the vssadmin list volumes command from the elevated command prompt. J. Run the vssadmin list shadows command form the elevated command prompt. K. Run the compact /U <file_name> command form the elevated command prompt.

E. the netsh command H. the Group Policy management console

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. The branch office with the client computers has a slow network connection to the office with the file server. Users complain of poor performance when connecting to the file server from their client computers. You need to verify that the client computers are configured to be BranchCache clients. Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Device Manager B. Local Users and Groups C. share permissions D. the folder Properties window E. the netsh command F. the icacls command G. the Services management console H. the Group Policy management console I. the User Account Control Settings Control Panel window

D. Run the netsh branchcache set service mode=DISTRIBUTED command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office Network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. All sales users in the office must download a daily updated 5-GB file that is stored on a file server located in a remote office. You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server. You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers. What should you do? A. Run the netsh branchcache set service mode=HOSTEDCLIENT command. B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. D. Run the netsh branchcache set service mode=DISTRIBUTED command. E. Check permissions. F. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. G. Create a Group Policy that sets Hash Publication for BranchCache as disabled. H. Create a Group policy object and configure the Set percentage of disk space used for client computer cache option. I. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.

Computer Management

One of the most commonly used Administrative tools. This MMC console contains the snap-ins to manage most Windows 7 components.,

Device Identification String

One or more identifiers included in a hardware device that is used by Windows 7 to locate and install an appropriate driver for a hardware device.

What VPN authentication methods are available in Win 7?

PAP CHAP MS-CHAPv2 PEAP/PEAP-TLS EAP-MS-CHAPv2/PEAP-MS-CHAPv2 Smart Card or Other Certificate

G. Run the Dism command with the /Mount-Wim option.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) an a Windows 7 client computer. You capture an image of the client computer. A new driver is released for the network card that ist installed in the client computer. You need to update the image with the new driver for the network card. What should you do first? A. Add a boot image in WDS. B. Create a capture image in WDS. C. Run the BCDedit command. D. Run the PEImg /prep command. E. .Run the Start /w ecsetup command. F. Run the Dism command with the /add-driver option. G. Run the Dism command with the /Mount-Wim option. H. Run the Dism command with the /add-Package option. I. Run the ImageX command with the /mount paramater. J. Run the DiskPart command and the Attach command option. K. Use Syprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True. L. Use Syprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. M. Use Syprep with an answer file and set the UpdateInstalledDrivers option in the answer file set to Yes. N. Use Syprep with an answer file and set the UpdateInstalledDrivers option in the answer file set to No.

B. Create a capture image in WDS. G. Add a boot image in WDS.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a new deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK). You need to capture an image of a Windows 7 reference computer. Which two actions should you perform on the server before performing actions on the reference computer? (Each correct answer presents a complete solution. Choose two.) A. Run the Dism command with the /Mount-Wim option. B. Create a capture image in WDS. C. Run the BCDEdit command. D. Run the Dism command with the /Add-Driver option. E. Run the imageX command with the /Mount parameter. F. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. G. Add a boot image in WDS. H. Run the Start/w ocsetupcommand. I. Run the PEImg /Prep command. J. Run the DiskPart command and the Attach command option. K. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. L. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True. M. Run the Dism command with the /Add-Package option. N. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False.

L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. You are preparing to capture an image of a Windows 7 client computer. You need to ensure that the captured image is generic and does not contain the device drivers from the client computer. What should you do? A. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True. B. Run the Start /w ocsetup command. C. Run the PEImg /Prep command. D. Run the Dism command with the /Mount-Wimoption. E. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. F. Run the Dism command with the /Add-Driver option. G. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. H. Run the BCDEdit /delete command. I. Run the ImageX command with the /Mount parameter. J. Run the Dism command with the /Add-Package option. K. Add a boot image and create a capture image in WDS. L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. M. Run the DiskPart command and the Attach command option.

L. Run the DiskPart command and the Attach command option.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. You need to remove some files from a virtual hard disk on a client computer. What should you do first? A. use Sysprep with an answer file and set the PersistAHDeviceinstalls option in the answer file to True. B. Run the BCDEdit /delete command. C. Run the Start/w ocsetup command. D. Use Sysprep with an answer file and set the UpdateinstalledDriversoption in the answer file to Yes. E. Run the Dism command with the /Add-Driver option. F. Add a boot image and create a capture image in WDS. G. Run the PEImg /Prepcommand. H. Run the ImageX command with the /Mount parameter. I. Run the Dism command with the /Mount-Wim option. J. Use Sysprep with an answer file and set the UpdateInstalledDriversoption in the answer file to No. K. Run the Dism command with the /Add-Package option. L. Run the DiskPart command and the Attach command option. M. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.

K. Run the Dism command with the /Add-Driver option.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a server running Windows Server2008 R2 with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. A new driver is released for the network cards that are installed in the client computers. You need to update the image with the new driver for the network cards. What should you do to add the driver to the mounted Windows image file? A. Run the Start /w ocsetup command. B. Run the DiskPart command and the Attach command option. C. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True. D. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False. E. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes. F. Run the Dism command with the /Mount-Wim option. G. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No. H. Run the PEImg /Prepcommand. I. Run the ImageX command with the /Mountparameter. J. Add a boot image and create a capture image in WDS. K. Run the Dism command with the /Add-Driver option. L. Run the BCDEdit /delete command. M. Run the Dism command with the /Add-Package option.

Virtual Memory

The combination of physical memory and the paging fi le.

I. Run the BCDEdit /delete command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has a server running Windows Server2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise. You need to remove a virtual hard disk boot option from the Windows startup menu on a client computer. What should you do? A. Run the Start /w ocsetup command. B. Run thePEImg/Prep command. C. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. D. Run the ImageX command with the /Mount parameter. E. Run the DiskPart command and the Attach command option. F. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. G. Run the Dism command with the /Mount-Wimoption. H. Run the Dism command with the /Add-Driver option. I. Run the BCDEdit /delete command. J. Add a boot image and create a capture image in WDS. K. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. L. Run the Dism command with the /Add-Package option. M. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True.

B. the folder Properties window I. the icacls command

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. A user has saved files in a C:\Users\ folder that coworkers must be able to read and edit. However, when coworkers try to edit those files, they get an "Access Denied" error. You need to configure new NTFS permissions for the user's C:\Users\ folder to ensure that the coworkers have access to write to that folder. Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. (Choose two.) A. share permissions B. the folder Properties window C. the User Account Control Settings Control Panel window D. the Group Policy management console E. the Services management console F. Local Users and Groups G. the netsh command H. Device Manager I. the icacls command

I. the folder Properties window

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder. You need to verify that the folder is not encrypted with the Encrypting File System (EFS). What should you use to accomplish this goal? A. Device Manager B. Local Users and Groups C. the User Account Control Settings Control Panel window D. the icacls command E. the Group Policy management console F. share permissions G. the netsh command H. the Services management console I. the folder Properties window

D. the Group Policy management console G. the netsh command

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache. You need to configure the client computers to be BranchCache clients. Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. (Choose two.) A. Device Manager B. Local Users and Groups C. the User Account Control Settings Control Panel window D. the Group Policy management console E. the Services management console F. the folder Properties window G. the netsh command H. the icacls command I. share permissions

D. the Group Policy management console I. the User Account Control Settings Control Panel window

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. Users complain that Windows displays too many notifications when they try to install software or make changes to their computer. You need to decrease the number of notifications that Windows displays when users try to install software or make changes to their computer. Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Local Users and Groups B. the Services management console C. the netsh command D. the Group Policy management console E. share permissions F. the folder Properties window G. Device Manager H. the icacls command I. the User Account Control Settings Control Panel window

A. the group policy management console

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. You need to ensure that only signed and validated executable files are run with elevated privileges. What should you use to accomplish this goal? A. the group policy management console B. the netsh command C. the service management console D. the folder properties window E. share permissions F. the icacls command G. Device Manager H. the User Account Control Settings Control Panel windows I. Local Users and Groups

QUESTION 384

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A company has client computers that run Windows 7 Enterprise. You need to ensure that when Windows runs applications with elevated privileges, it enforces the Public Key Infrastructure (PKI) certification path validation for a given executable file. What should you use to accomplish this goal? A. the User Account Control Settings Control Panel window B. the Services management console C. Device Manager D. Local Users and Groups E. the icacls command F. the Group Policy management console G. the folder Properties window H. share permissions I. the netsh command Correct Answer: F

N. Run the DiskPart command and the Attach command option.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. A virtual hard disk (VHD) contains a Windows 7 Enterprise installation. You need to mount the VHD on a client computer. What should you do? A. Run the Dism command with the /Mount-Wimoption. B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes. C. Run the Dism command with the /Add-Package option. D. Run the PEImg/Prepcommand. E. Add a boot image in WDS. F. Run the Dism command with the /Add-Driver option. G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True. H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No. I. Run the BCDEdit command. J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False. K. Run the Start/w ocsetup command. L. Run the imageX command with the /Mount parameter. M. Create a capture image in WDS. N. Run the DiskPart command and the Attach command option.

C. Run the BCDEdit command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You create a new virtual hard disk (VHD) on a Windows 7 Enterprise computer. Then you install Windows 7 on the VHD. After you reboot the computer, the Windows 7 boot menu shows two different Windows 7 installations titled "Windows 7". You need to ensure that the Windows 7 boot menu differentiates between the two Windows 7 installations. What should you do? A. Add a boot image in WDS. B. Create a capture image in WDS. C. Run the BCDEdit command. D. Run the PEImg /prep command. E. Run the Start /w ecsetup command. F. Run the Dism command with the /add-driver option. G. Run the Dism command with the /mount-wim option. H. Run the Dism command with the /add-Package option. I. Run the ImageX command with the /mount paramater. J. Run the DiskPart command and the Attach command option. K. Use Syprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True. L. Use Syprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False. M. Use Syprep with an answer file and set the UpdateInstalledDrivers option in the answer file set to Yes. N. Use Syprep with an answer file and set the UpdateInstalledDrivers option in the answer file set to No.

B. Run the BCDEdit command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You have a computer running Windows 7. You create a VHD and install Windows 7 in it. You reboot your system and notice that the boot menu now shows two installations of Windows 7. How do you fix it? A. Use Sysprep with an answer file to disable one installation. B. Run the BCDEdit command. C. Run the Start/w ocsetup command. D. Run the Dism command E. Add a boot image and create a capture image in WDS. F. Run the PEImg /Prepcommand. G. Run the ImageX command with the /Mount parameter. H. Run the Dism command with the /Mount-Wim option. I. Run the Dism command with the /Add-Package option. J. Run the DiskPart command and the Attach command option. K. Add a boot image and create a capture image in WDS.

QUESTION 393

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer and discover that one of the processes uses an average of 90 percent of the CPU cores. You need to decrease the usage of the CPU cores by the process. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: D

QUESTION 394

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer to meet the following requirements: - Include the CPU, Memory, and Disk subsystems. - Collect information in a report. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: I

QUESTION 391

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer to meet the following requirements: - Include the CPU, Memory, and Disk subsystems. - Rate the subsystems and find out the lowest-rated component. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: B

Place the protocols from least to most secure: IKEv2, L2TP/IPSec, PPTP, SSTP

PPTP, L2TP/IPSec, SSTP, IKEv2

Web Slices

Small pieces of content from a Web site that notify you in Internet Explorer 8 when there is an update to the web site.,

QUESTION 390

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer to meet the following requirements: - Include the CPU, Memory, and Disk subsystems. - Send events to another computer for predefinded Event IDs. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: C

QUESTION 389

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer to meet the following requirements: - Include the CPU, Memory, and Disk subsystems. - Send notifications to an administrator for predefined thresholds. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: I

QUESTION 392

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU. You need to analyze the performance of the computer to meet the following requirements: - Include the CPU, Memory, and Disk subsystems. Display real-time performance. - Obtain a list of users who have logged on by using the same tool. What should you do? A. Run powercfg.exe. B. Run the Windows Experience Index. C. Configure Event Viewer subscriptions. D. Open Task Manager. E. Open System Properties, and configure performance settings. F. Open System Properties, and configure environment variables. G. Open System Properties, and configure use profiles settings. H. Open System Properties, and configure the page file settings. I. Opern Performance Monitor, and configure a Data Collector Set. J. Opern Performance Monitor, and customize the System Monitor view. Correct Answer: J

F. Run the netsh branchcache set service mode=HOSTEDCLIENT command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The File server has the BranchCache feature installed. All client computers have Windows Firewall along with Advanced Security enabled for all network profiles. You need to ensure that client computers, can access cached files stored on the file server. What should you do? A. Run the Netsh branchcache set service mode=HIDSTEDSERVER clientauthentication=NONE command. B. Create a Group Policy that sets Hash Publication for BranchCahe as disabled. C. Run the netsh branchcache set service mode=DISTRIBUTED command. D. Check permissions. E. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. F. Run the netsh branchcache set service mode=HOSTEDCLIENT command. G. Configure firewall exception rules for inbound and outbound traffic for local TCP pcit 80 and for inbound and outbound traffic for local TCP port 8443. H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. I. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.

F. Check permissions.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file sender has the BranchCache feature installed. You create a shared folder on the server and enable BranchCache on the shared folder. You discover that the users of the client computers are unable to access files in the shared folder. You need to provide access for the users to the shared folder. What should you do? A. Run the Netsh branchcache set service mode= HOSTEDSERVER clientauthentication=NONE command. B. Configure firewall exception rules for rnulticast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. C. Create a Group Policy that sets Hash Publication for BranchCahe as disabled. D. Run the netsh branchcache set service mode=DISTRIBUTED command. E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. F. Check permissions. G. Run the netsh branchcache set service mode=HOSTEDCLIENT command. H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbcund traffic for local TCP port 8441.

Hardware Abstraction Layer (HAL)

Part of the operating system that understands how to talk to the specific computer hardware on which the operating system is installed. This portion of the operating system runs at the lowest level of the application hierarchy in kernel mode.

Attack Surface

Parts of the computer, applications, and operating system components that can be attacked by hackers, viruses, and malware during their attempts to intrude on a computer system.

PAP

Password Authentication Protocol. A simple authentication method that establishes the identity of a remote client with the authentication password sent in the data stream between the client and server. This presents a security risk and therefore this authentication protocol is discouraged unless the risk from communication eavesdropping is considered low.,

G. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. All sales users in the office must download a daily update 5 GB file that is stored on the file server located in a remote office. You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server. You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers. What should you do? A. Check permissions B. Run the netsh branchcache set service mode=distributed command. C. Run the netsh brnachcache set service mode=HOSTEDCLIENT command. D. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command. E. Create a Group Policy that sets Hash Publication for BranchCache as disabled. F. Create a Group Policy object amd enable the Set BranchCache Hosted Cache mode policy. G. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. H. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local port 8443. I. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic local TCP port 80.

E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. The client computers have a third-party firewall application installed. You configure BranchCache on all computers to run in Distributed Cache mode. You need to ensure that the client computers can access all cached files. What should you do? A. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80. B. Check permissions. C. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443. D. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. E. Run the Netsh branchcache set service mode=HOSTEDSERVER clientauthentication=NONE command. F. Run the netsh branchcache set service mode=HOSTEDCLIENT command. G. Run the netsh branchcache set service mode=DISTRIBUTED command. H. Create a Group policy object and configure the Set percetage of disk space used for client computer cache option. I. Create a Group policy that sets Hash Publication for Branchcache as disabled.

I. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.

Note: This question is part of a series of questions that use the same set of answer choices. An answer choice may be correct for more than one question in the series. Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BranchCache feature installed. You add new client computers the network. The computers have Windows 7 installed and are members of a workgroup. You need to ensure that the new client computers are configured to cache and share files. What should you configure on the new client computers? A. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbcund traffic for local TCP port 8443. B. Check permissions. C. Create a Group Policy that sets Hash Publication for BranchCahe as disabled. D. Run the netsh branchcache set service mode=HOSTEDCLIENT command. E. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy. F. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option. G. Run the Netsh branchcache set service mode=HIDSTEIDSERVER clientauthentication=NONE command. H. Run the netsh branchcache set service mode=DISTRIBUTED command. I. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.

Computer Management

One of the most commonly used Administrative tools. This MMC console contains the snap-ins to manage most Windows 7 components.

RRAS

Routing and Remote Access. A service installed and configured on Windows Server 2003 to allow remote clients and networks to connect to network services local to the server. Must be configured to support VPN connections, dial-up connections, and routed IP traffic from routers.

Which S states exist in Windows 7? How do you set them up?

S0 (Working), S3 (Sleep), S4 (Hibernated Sleep), S5 (Soft Off), G3 (Mechanical Off) You can set them up in the Control Panel>System and Security>Power Options>Change Plan Settings.

What advanced system startup options are available in Win 7?

Safe mode Safe mode with Networking Safe mode with Command Prompt Enable Boot Logging Enable Low Resolution Video (640×480) Last Known Good Configuration (advanced) Directory Services Restore mode Debugging Mode Disable automatic restart at system failure Disable Driver signature enforcement

Windows Experience Index

Scores that help you determine which applications your computer can run.

Windows Experience Index

Scores that help you determine which applications your computer can run. Can be used to identify hardware bottlenecks limiting system performance.,

SSTP

Secure Socket Tunneling Protocol. A protocol that allows secure communications between a VPN client and server using the SSL based encryption methods of HTTPS. Connection not likely to be stopped by a firewall because the HTTPS protocol is not commonly blocked.,

SAM

Security Accounts Manager. The database used by Windows 7 to store local user and group information.,

SSID

Security Set Identifier. A unique ID that identifies a wireless access point to the wireless networking clients that send data to it.,

MOBIKE

See IKEv2 Mobility and Multihoming Protocol.

NTFS

See New Technology File System.

Plain Old Telephone System (POTS)

See Public Switched Telephone Network (PSTN).

Standby

See S3 state.

Hibernate

See S4 state.

In Windows 7 how does the user get at the services?

Services Console, Task Manager. All users/user mode application in general have to go through kernel mode to get access to them. They do not get direct access to them.

Software Restriction Policies

Set rules stronger than previous versions of Windows. Can be restricted by path, hash, logorythm, name.

Security Tab

Sets up the behaviour of the dial-up connection. Allows you to set up security or callback.,

Internet Options

Settings to control Internet Explorer, including security settings.

When are Shadow copies of files created?

Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created.

System Applet

Shows basic information about your computer, such as Windows edition, performance rating, and activation status. Links are provided to confi gure system properties.

Web Slices

Small pieces of content from a Web site that notify you in Internet Explorer 8 when there is an update.

Environmental Subsystems

Support systems designed for specific types of applications, such as Win32 applications. The environment hides the details of how the application must communicate with lower-level operating system components such as the Executive services. Environment subsystems operate on a user-mode basis but have awareness of kernel mode services hosted through Executive Services.

How is the default profile configured?

Sysprep, Regedit (Click HKEY_USERS, File>Load Hive>C:\Users\Default, type ntuser.dat>typeDefaultUser)

Which transport protocol and port is used by SSTP?

TCP/443

Every object in Windows 7 has audit events related to it.

TRUE,

BranchCache

Technology that allows user data from the corporate data center to be buffered on branch servers or workstations for local client use. Local clients can access cached data instead of retieving it over the WAN again.

Windows Management Instrumentation (WMI)

The Windows Management Interface is a standard for accessing operating system operational status and confi guration controls through remote management utilities.

Domain Partition

The Active Directory partition that holds domain-specific information, such as user and computer accounts, that is replicated only between domain controllers within the domain.

Configuration Partition

The Active Directory partition that holds general information about the Active Directory forest and application configuration information. It is replicated to all domain controllers in the Active Directory forest.

Configuration Partition

The Active Directory partition that holds general information about the Active Directory forest and application configuration information. It is replicated to all domain controllers in the Active Directory forest.,

System Configuration

The Administrative Tool that gives you access to control the boot confi guration, service startup, application startup, and system tools.

A. A display adapter compatible with WDDM is installed. D. The Windows Experience Index is 3 or greater.

The Aero Shake feature will work if which of the following conditions are met? (Choose Two.) A. A display adapter compatible with WDDM is installed. B. Aero features are downloaded from Microsoft. C. The windows experience index is at least 2. D. The Windows Experience Index is 3 or greater.

Which firewall rules are required when using Hosted Cache mode of BranchCache?

The BranchCache - Content Retrieval (Uses HTTP) predefined rule (inbound and outbound traffic on TCP port 80). The BranchCache - Hosted Cache Client (HTTPS-Out) predefined rule (outbound traffic on TCP port 443).

Master Boot Record (MBR)

The Master Boot Record exists at the very first sector of an IBM-formatted hard disk. It contains code to start the load process for an operating system from a partition or volume on the disk, a partition table to indicate what space has been reserved as partitions, and a signature sequence of bytes used to identify the disk to the operating system. When the disk is used as a basic disk, the partition table is used to identify primary, extended, and logical partition types. When the disk is used as a dynamic disk, the partition table is filled with placeholder values and the volume information is actually held in a 1 MB dynamic volume database at the end of the drive.

Network Location Awareness

The ability for Windows 7 to detect when it is connected to a different network and perform actions based on that change (like turn off network discovery).,

Network Location Awareness

The ability for Windows 7to detect when it is connected to a different network and perform actions based on the change.

Initial Account

The account with administrative privileges created during the installation of Windows 7.

Initial Account

The account with administrative privileges created during the installation of Windows 7.,

Quantum

The amount of time allocated to a program running in a preemptive multitasking environment. Once a program's quantum has expired, it must wait for the next available quantum.

Administrator Account

The built-in account that is created during installation and which has full rights to the system. This account cannot be deleted or removed by the Administrators group.

Administrator Account

The built-in account that is created during installation and which has full rights to the system. This account cannot be deleted or removed from the Administrators group.,

Client for Microsoft Networks

The client that allows Windows 7 to access files and printers shared on other Windows computers by using the SMB protocol.

WindowsPE Configuration pass

The fi rst confi guration pass performed during setup, which can be used to perform tasks such as disk partitioning and entering the product key.

NTUSER.DAT

The file containing user-specifi c registry entries in a user profile.

NTUSER.DAT

The file containing user-specific registry entries in a user profile.,

OobeSystem Configuration Pass

The final configuration pass before installation is complete. This configuration pass is typically used in conjunction with Sysprep and ImageX.

Forest Root Domain

The first domain created in an Active Directory forest.

Address Prefix

The first portion of an IP address that allows the identification of that addresses type and therefore purpose.

Address prefix

The first portion of an IP address that allows the identification of that address type and therefore purpose.,

How does Transparent Caching work?

The first time a user opens a file in a shared folder, Windows 7 reads the file from the server computer and then stores it in a local cache. The second and subsequent times Windows 7 retrieves it from disk. Windows 7 always contacts the server computer to ensure the cached copy is up-to-date. The cache is never accessed if the server computer is unavailable, and updates to the file are always written directly to the server computer.

Graphics Device Interface (GDI)

The format used for displaying screen content in pre-Windows Vista versions of Windows.

Enhanced Metafile Format (EMF)

The format used for spool files in pre-Windows Vista versions of Windows.

What is meant by the term Scope when talking about migrations?

The groups that are upgraded at one time, within a larger upgrading scheme. What is the upgrading trying to accomplish, and then get goals from that.

Help and Support

The help system built into windows to help you trouble shoot the operating system and programs.,

Home Network

The location type that is used for highly trusted networks where security is minimal and convenient sharing with other computers is a priority.

Private Network

The location type that is used for trusted networks where limited security is required, for example, a small office.

Public Network

The location type that is used for untrusted networks where high security is required, for example, a public wireless hotspot.

Domain Network

The location type that is used when a computer joined to a domain is on the domain network, for example, a corporate office.

Color Depth

The number of bits that are used to store the color information for each pixel in the display.

Screen Resolution

The number of pixels that are displayed on your display.

Hard Faults

The number of times per second that the OS looks for informaiton in memory and finds that it is not there.,

Kernel

The operating system software that runs in kernel mode on the computer's processor and which provides low-level intelligence for the operating system.

System Partition

The partition or volume used to initiate the boot sequence for a computer from a hard disk. The system partition is processed before the boot partition, which loads the remainder of the operating system. The system partition can be the same partition as the boot partition.

Boot Partition

The partition or volume used to load the operating system from a hard disk. The system partition is processed before the boot partition. The boot partition can be the same partition as the system partition.

Counters

The performance indicators that can be recorded in Performance Monitor.,

How to determine a unicast 6to4 address?

The prefix for link-local addresses is 2002::/16.

How to determine a unicast link-local address?

The prefix for link-local addresses is FE80::/64.

How to determine a unicast site-local address?

The prefix for site-local addresses is FEC0::/48.

Performance Tuning

The process for collecting system performance data, analyzing system performance data, and implementing system performance improvements.

Performance tuning

The process for collecting system performance data, analyzing system performance data, and implementing system performance improvements. Looking for and reducing the effects of performance bottlenecks.

Defragmentation

The process of ordering data on the hard disk in a contiguous fashion to minimize the delays in reading or writing data. This attempts to minimize the mechanical delay caused by having to move read/write mechanisms from one region of the disk to another.

Default Profile

The profile that is copied when new user profiles are created.

Default Profile

The profile that is copied when new user profiles are created.,

Link Layer Topology Discovery Mapper I/O Driver

The protocol responsible for discovering network devices on the network and determining network speed.

Link Layer Topology Discovery Responder

The protocol responsible for responding to discovery requests from other computers.

Link Layer Topology Discovery Responder

The protocol responsible for responding to discovery requests from other computers.,

Server Message Block (SMB)

The protocol used for Windows-based fi le and printer sharing. Windows 7 includes SMB version 2.1.

Subscores

The rating of individual subsystems in your computer.

What is the most critical effect of malware?

The reduction of the level of security on a system, and a reduction of its performance.

OfflineServicing Configuration Pass

The second configuration pass that is performed after the Windows image has been copied to the local hard drive. This configuration pass applies packages such as security updates and service packs before Windows 7 is started.

What is OfflineServicing?

The second configuration pass that is performed after the Windows image has been copied to the local hard drive. This configuration pass applies packages such as security updates and service packs before Windows 7 is started.,

Auditing

The security process that records the occurence of specific operating system events in the Security log.,

Auditing

The security process that records the occurrence of specific operating system events in the Security log.

Remote Installation Services (RIS)

The server-based system available in Windows Server 2003 SP2 and later versions for deploying desktop operating systems automatically over the network.

Group Policy service

The service responsible for retrieving and applying GPOs for a Windows 7 computer.

File and Printer Sharing for Microsoft Networks

The service that allows Windows 7 to share files and printers by using the SMB protocol.

Audit Policy

The settings that define which operating system events are audited.

Internet Protocol Version 4 (TCP/IPv4)

The standard protocol used on corporate networks and the Internet.

Configuration Set

The subset of files from a distribution share that are required for a particular answer file. A configuration set is more compact than a distribution share.

Configuration Set

The subset of files from a distribution share that are required for a particular answer file. Is more compact than a distribution share.,

QUESTION 415

The system administrator of your network wants to edit the Registry, including setting security on the Registry keys. What primary utility or utilities that support full editing of the Windows 7 Registry should the system administrator use? (Choose Two) A. REGEDIT B. REDIT C. REGEDT32 D. REGEDITOR Correct Answer: AC

IP address

The unique address used by computers on an IPv4 or IPv6 network. An IPv4 address is commonly displayed in dotted decimal notation. For example, 10.10.0.50.

AuditUser Configuration Pass

This Configuration Pass is performed after user logon when Sysprep triggers Windows 7 into audit mode.

AuditSystem Configuration Pass

This configuration pass is performed before user logon when Sysprep triggers Windows 7 into audit mode.

Generalize Configuration Pass

This configuration pass is performed when Sysprep is run to generalize Windows 7.

Replicator

This group is used by special user accounts to perform file replication between computers. This group has no members by default.,

How do you back up the Registry?

Through Regedit.exe, or system state.

Compact

To compress a folder so that it's contents take up less space on the hard disk. Command-line utility for file compression.,

B. Windows 7 Ultimate (x86)

To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)? A. Windows 7 Home Professional (x86) B. Windows 7 Ultimate (x86) C. Windows 7 Ultimate (x64) D. Windows 7 Enterprise (x64)

Routers

Traditionally , a network device that moves packets from one network to another. The routers sold in retail stores are used to share an Internet connection by performing NAT.

Router

Traditionally, a network device that moves packets from one network to another. The routers sold in retail stores are used to share an Internet connection by performing NAT.

QUESTION 383 see exhibit/ make chart?

Twenty client computers run Windows XP. The computers are joined to a domain. You plan to perform a clean installation of Windows 7 on all the computers. You need to transfer all users documents and settings. You must exclude music and video files. You must achieve this goal by using the minimum amount of administrative effort. Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

RAID 1

Two disks are used to store a single copy of file data in a fault-tolerant fashion. An exact copy of the data is written to each disk. If one disk fails, the other copy allows continued operation. Performance is similar to a single disk where reads are generally faster and writes can be slower. Both disks can be on a single controller, which introduces a common point of failure. If the hardware used to control each disk is fully duplicated into independent channels, the system is referred to as a duplexed mirror.

What is a spanned dynamic volume?

Two or more regions of free space on 2-32 disks linked into a single volume. Can be extended. Cannot be mirrored.

File Extension

Typically a three-character name at the end of a file name that is used to indicate the type of data contained in the file. Common ones include DOC for document, and EXE for executable programs.

Which transport protocol and port is used by IKEv2?

UDP/500

Windows Driver Foundation

WDF. A standard for writing device drivers that interact with Windows 7. This standard replaces WDM and adds new features such as support for user mode device drivers.,

Which migration store type allows you to view the migrated data with Windows Explorer?

Uncompressed

UEFI

Unified Extensible Firmware Interface. An open standard that builds on the proprietary EFI standard started by Intel to replace the legacy BIOS firmware design.,

UDF

Universal Disk Format. A third-party standard that defines how data is stored on removeable media such as DVD disks.,

Password

Use strong ones, can be enforced using local security policy.

Data Sources (ODBC)

Used to configure data sources for applications that require access to a database.

Region and Language Options applet

Used to configure display and input options to support different languages and regions. Settings include time, date, and number formats.

Ntuser.ini

Used to set up the user roaming profile components that are not copied to the server.,

How is the Internet both useful and harmful for a technician?

Useful for getting troubleshooting information. Harmful because there is also bad information out there.,

UAC

User Access Control. A feature in Windows 7 that elevates user privileges only when required.,

Where can you find RD Gateway policies?

User Configuration\Administrative Templates\Windows Components\Remote Desktop Services\RD Gateway

USMT

User State Migration Tool. A set of scriptable command-line utilities that are used to migrate user settings and files from a source computer to a destination computer. Scanstate copies files from local computer to server; Loadstate applies files from server to local computer.

User Account

User accounts are used for authentication to prove the identity of a person logging on to Windows 7.

Remote Assistance

User generates an invitation, and sends the invitation to the expert. The expert can view the user's desktop and take control of it if the user permits.

What is the most basic level of security in Windows 7?

Username & Password.,

Who can alter disk settings?

Users with Administrative privileges.,

VDM

Virtual DOS Machine. A Win32 aplication that emulates a DOS environment for use by DOS and Win16 applications.,

Libraries

Virtual folders in Windows Explorer that combine content from multiple locations to simplify file access.

Libraries

Virtual folders in Windows Explroer that combine content from multiple locations to simplify file access.,

QUESTION 312 see exhibit

You administer a computer that has Windows 7 Enterprise installed. The computer has an application that must run by using administrative permissions. A user who has a standard user account connect to the computer by using a Remote Desktop Connection. The user right-clicks the application shortcut, but the Run as administrator option is unavailable. You need to ensure that the user is able to run the application by using administrative permissions. What service should you configure? (To answer, select the appropriate option or options in the answer area.) Hot Area: Correct Answer:

A. From programs and features in the control panel, uninstall the toolbar.

You administer a computer that has Windows 7 and Internet Explorer 8 installed. You discover that two users have installed a new toolbar into their browsers. The toolbar is using an unapproved search engine. You need to prevent the users from using the unapproved search engine. What should you do? A. From programs and features in the control panel, uninstall the toolbar. B. From Internet Explorer, delete the browsing history and locally stored files. C. Start Internet Explorer in an InPrivate Browsing session. D. From an elevated command prompt , run %systemdrive%\program files\Internet explorer\iecleanup. exe.

QUESTION 397

You administer client computers that have Windows 7 Enterprise installed for the marketing department of your company. The client computers are members of a single Active Directory domain. All regular client computer user accounts are members of the domain security group named Marketing. You install a new printer on one of the client computers. You remove the Everyone group from the access control list (ACL) for the printer, and then share the printer. You need to achieve the following goals: - Prevent members of the Marketing group from modifying the print jobs of other users. - Ensure that members of the Marketing group can modify the print jobs that they submit. What should you do? A. Modify local Group Policy on the desktops and disable the Point and Print Restrictions user right to the Marketing group. B. Modify local Group Policy on the desktops and assign the Take ownership of files or other objects user right to the Marketing group. C. From the printer properties, assign the Manage Documents permission to the Marketing group. D. From the printer properties, assign the Print permission to the Marketing group. Correct Answer: D

A. From an elevated command prompt, run mstsc.exe /v:Server1:10876.

You administer client computers that have Windows 7 Enterprise installed. A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876. You need to connect to the server from a client computer by using Remote Desktop. What should you do? A. From an elevated command prompt, run mstsc.exe /v:Server1:10876. B. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876. C. From an elevated command prompt, run mstsc.exe Server1 port:10876. D. From the Advanced tab of your Remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server.

A. Enable the Code signing for device drivers in a domain Group Policy.

You administer client computers that have windows 7 Professional SP1 64-bit installed. All the computers are members of a single Active Directory domain. You need to prevent users from installing non-trusted device drivers. What should you do? A. Enable the Code signing for device drivers in a domain Group Policy. B. Disable the Code signing for device drivers in a domain Group Policy. C. Add each user to a Domain Admins group. D. Run the sigverif.exe command on each computer.

C. Run scanstate /vsc

You administer desktops computers that have Windows XP Professional SP3 64-bit installed. The computers have the Volume Shadow Copy Service (VSS) enabled on all drives. You want to migrate user profiles to Windows 7 using the User State Migration Tool (USMT) 4.0. You also plan to migrate files from the user profiles even if the files are locked by applications. You need to capture user profiles and locked files. What should you do on the Windows XP computers? A. Stop the VSS before running scanstate.exe B. Stop the VSS before running loadstate.exe C. Run scanstate /vsc D. Run scanstate /hardlink

B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop. E. Create a system repair disk on a Windows 7 Enterprise 32-bit desktop.

You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C. You need to be able to restore Windows boot files on any of The desktops if the boot files become corrupted. Which two actions should you perform? (Each correct answer presents a part of the solution. (Choose two.) A. A. Create a system image of a Windows 7 Enterprise 64-bit desktop B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop. C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Driver Signature Enforcement option from the Advanced Boot Options menu. D. Enable system protection on the recovery partition on 64-bit desktops. E. Create a system repair disk on a Windows 7 Enterprise 32-bit desktop. F. Create a system image of a Windows 7 Enterprise 32-bit desktop. G. Enable system protection on the recovery partition on 32-bit desktops.

QUESTION 220 see exhibit

You administer portable computers that have Windows 7 installed. The computers connect to a wireless network that uses WPA2- Enterprise Security. The company's security policy requires multifactor authentication for the portable computers. You need to manually configure each portable computer to meet the following requirements: - Users must provide multifactor authentication. - The Server Certificate held on the portable computers must match the certificate held on the server. What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.) Hot Area: Correct Answer:

D. You need to permit ICMPv4 traffic through the firewalls of both computers.

You are configuring static IPv4 addresses for two computers, Perth and Brisbane, on an isolated private wired subnet. You configure Perth with the IPv4 address 172.16.10. 140 and the subnet mask 255.255.255.0. You configure Brisbane with the IPv4 address 172.16.10. 210 and the subnet mask 255.255.255.0. You enter ping 172.16.10.140 on Brisbane, but the command times out. Similarly, entering ping 172.16.10.210 on Perth fails to locate the Brisbane computer's IPv4 address. What is the likely reason for this lack of connectivity? A. DNS service is not available on the subnet. B. The computers should have different subnet masks. C. You have not specified a default gateway. D. You need to permit ICMPv4 traffic through the firewalls of both computers.

A. The Windows SIM tool in Windows AIK B. Microsoft Notepad

You are creating an unattend answer file for automatic Windows 7 installation. What can you use to do this? (Choose two.) A. The Windows SIM tool in Windows AIK B. Microsoft Notepad C. The Deployment Workbench MDT tool D. Sysprep.exe

A. Your second internal hard disk, formatted with NTFS E. A mounted VHD created on your second internal hard disk

You are deciding on which storage devices you want to configure system protection. System protection is enabled by default on your C: drive, which holds your system files. No other storage device on your computer has system protection enabled. On which of the following storage devices can you enable system protection? (Choose all that apply.) A. Your second internal hard disk, formatted with NTFS B. An external USB hard disk formatted with FAT C. A USB flash drive D. Your optical drive E. A mounted VHD created on your second internal hard disk

C. Configure and format the hard disk drive.

You are deploying a custom Windows 7 system image to a new computer. You perform the following tasks: - Start the new computer by using the Windows preinstallation Environment (WPE). - Connect to a shared network location that contains the Windows 7 image file. You need to apply the Windows 7 image to the computer. What should you do before you apply the image? A. Mount the image. B. Configure Windows Firewall. C. Configure and format the hard disk drive. D. Initializal the Boot Configuration data (BCD) store.

A. Hard disk

You are evaluating the purchase a notebook computer that has the following hardware: - 1.6 GHz 32-bit processor - 1024 MB RAM - 1 video card that uses shared memory - 4 GB solid state drive You need to ensure that you can install Windows 7 Enterprise on the notebook computer. Which hardware component should you change? A. Hard disk B. Processor C. RAM D. Video card

QUESTION 226 see exhibit A. On Computer1, nable the Allow connections from computers running any version of Remote Desktop setting.

You are in charge of two computers that are respectively named Computer1 and Computer2. Computer1 runs Windows 7 and Computer2 runs Windows XP Professional. On Computer1, you enable Remote Desktop as shown in the Remote Desktop exhibit. Later you log on to Computer2 and try to connect to Computer1 by using Remote Desktop. The connection fails and you receive the error message shown in the Remote Desktop Disconnected exhibit. You need to ensure, that you can connect to Computer1 by using Remote Desktop. What action should you perform? Remote Desktop: Remote Desktop Disconnected: A. On Computer1, nable the Allow connections from computers running any version of Remote Desktop setting. B. On Computer2, assign the Client (Respond Only) IPSec policy. C. On Computer1, add your user account to the Remote Desktop Users group. D. On Computer2, create a firewall exception for the Remote Desktop Protocol (RDP).

A. Run setup.exe from the DVD to start the Windows 7 installation. B. Use the autorun feature on the DVD to start the installation. C. Perform a full installation of Windows 7.

You are installing Windows 7 on from the desktop of a Windows XP Professional PC. Which of the following can be performed from the Windows 7 DVD? (Choose three.) A. Run setup.exe from the DVD to start the Windows 7 installation. B. Use the autorun feature on the DVD to start the installation. C. Perform a full installation of Windows 7. D. Perform and upgrade of Windows 7 keeping all the Windows XP settings.

B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED).

You are installing a 64-bit edition of Windows 7. During the installation, you receive an error message when you attempt to add mass storage driver. You need to complete the installation of Windows 7. You start the computer from the Windows 7 installation media. What should you do next? A. From the Install Windows dialog box, click RESCAN. B. From the Install Windows dialog box, click DRIVE OPTIONS (ADVANCED). C. From the Advanced Boot options menu, select SAFE MODE. D. From the Advanced Boot options menu, select DISABLE DRIVER SIGNATURE ENFORCEMENT.

D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced).

You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer? A. No. You can undo a system restore only if you initiate it from the System Recovery tools. B. No. You can undo a system restore only if you carry it out after booting normally. C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore. D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced).

B. Run Dism.exe and specify the /add-driver parameter.

You are preparing a custom Windows 7 image for deployment. You need to install a third-party network interface card (NIC) driver in the image. What should you do? A. Run Pkgmgr.exe and specify the /ip parameter. B. Run Dism.exe and specify the /add-driver parameter. C. Create a new answer file by using Windows System Image Manager (Windows SIM). Run Pkgmgr.exe and specify the /n parameter. D. Create a new answer file by using Windows System Image Manager (Windows SIM). Run Dism.exe and specify the /apply-unattend parameter.

QUESTION 211 see exhibit

You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life. The computer enters sleep mode when the portable computer is closed. You need to change a setting so that when you close the portable computer, nothing happens. Which setting should you change? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer: see exhibit

QUESTION 213 see exhibit

You are running windows 7 on a portable computer. A custom power plan named "On The Move" is optimized for battery life. The computer remains running when the portable computer is closed. You need to change a setting so that when you close the portable computer, it enters sleep mode. Which setting should you change? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

QUESTION 421

You are setting up a machine for a home user who does not know much about computers. You do not want to make the user a local administrator but you do want to give this user the right to change Windows Updates manually. How can you configure this? A. Modify the LGPO for Windows Update to allow the user to make changes manually. B. Explain to the user how to log on as the Administrator account. C. Set Windows Update modifications to anyone. D. This can`t be done. Only administrators can change Windows Update. Correct Answer: A

A. Safe Mode C. Enable Low Resolution Video D. Last Known Good Configuration (Advanced)

You are testing unsigned device drivers on a computer on an isolated test network. You install a display driver and find that the computer boots to a blank screen. You restart the computer and press F8. What Advanced Boot Options could you choose to help remedy the situation? (Choose all that apply.) A. Safe Mode B. Enable Boot Logging C. Enable Low Resolution Video D. Last Known Good Configuration (Advanced) E. Disable Driver Signal Enforcement

QUESTION 422

You are the administrator for a large organization with multiple Windows Server 2008 domain controllers and multiple domains. You have a Windows 7 machine that is set up for all users to access. You have an application called StellApp.exe that everyone on this Windows 7 computer can use except for the sales group. How do you stop the sales group from accessing this one application? A. Deny the Everyone group the rights to the application. B. Create an executable rule from the Application Control Policy. C. Create a security role from the Application Control Policy. D. Give the Everyone group full control of the application. Correct Answer: B

A. At a command prompt, run Cipher.exe.

You are the administrator of a computer named Computer1 that runs Windows 7. Several users share Computer1. The users plan to encrypt files on the computer. You need to ensure that you can access all encrypted files on the computer. What should you do first? A. At a command prompt, run Cipher.exe. B. At a command prompt, run Certutil.exe. C. From the local comput er policy, modify the User Rights Assignment. D. From User Accounts, run the Manage your file encryption certificates wizard.

QUESTION 412

You are the network administrator for a large company that has decided to use EFS. You have two Windows 7 machines, named machine1 and machine2. Both of these Windows 7 machines are part of a Windows Server 2008 domain. From machine1 you can recover all EFS encrypted files for all users in the entire domain. You need to be able to do the same from machine2. How do you accomplish this task? A. From machine1, export the data recovery agent certificate and import that certificate onto machine2. B. On a domain controller, add machine1 as the master EFS machine. C. From machine1, export the data recovery agent certificate and import that certificate onto the EFS server. D. On a domain controller, add machine2 as the EFS recovery agent machine. Correct Answer: A

QUESTION 423

You are the network administrator for a large organization that has decided to implement DirectAccess. What are some of the requirements needed to install DirectAccess? (Choose Three) A. Windows Server 2008 R2 running the DirectAccess feature B. Windows certificate authority server C. DNS D. WINS Correct Answer: ABC

QUESTION 409

You are the network administrator for a large organization. You are in charge of developing a plan to install 200 Windows 7 computers in your company`s data center. You decide to use WDS. You are using a Windows Server 2008 domain and have verified that your network meets the requirements for using WDS services. What command-line utility should you use to configure the WDS server? A. ImageX B. WDSUTIL C. Setup.exe D. The WDS icon in Control Panel Correct Answer: B

QUESTION 419

You are the network administrator for a large organization. You are in charge of implementing company policies. One company policy states that you have to prevent Internet Explorer from saving any data during a user`s browsing session. How do you accomplish this? A. Set the Internet Security setting to disabled. B. Run the browsers in the InPrivate session. C. InPrivate sessions should be disabled. D. Private sessions should be enabled. Correct Answer: B

QUESTION 405

You are the network administrator for a mid-size organization that wants to start looking at migrating their computer systems to Windows 7. They have asked you to explain the new features of Windows 7 to all the department heads. Which of the following are new features to Windows 7? (Choose all that apply.) A. Windows 7 Taskbar B. Jump List C. Windows XP Mode D. Windows Touch Correct Answer: ABCD

QUESTION 424

You are the network administrator for a midsize company that uses Windows Server 2008 R2 and Windows 7. All Windows 7 machines receive their IP address from DHCP. You have a Windows 7 machine and need to identify its IPv6 address. How can you accomplish this task? (Choose Two) A. Click Details from the network connection status. B. Type ipconfig/all at the command prompt. C. Type ipconfig/view at the command prompt. D. Choose properties of My Computer. Answer Correct: AB

QUESTION 406

You are the network administrator for a small company that has just switched its machines from Windows XP to Windows Vista and Windows 7. One of the users who has Windows Vista asks you why there is a vertical sidebar on the screen. What feature of Windows Vista is this? A. Parental controls B. Jump List C. Windows Sidebar D. Windows Firewall Correct Answer: C

QUESTION 417

You are the network administrator for your organization. You have been asked by the owner of the company to verify that all drivers installed on the Windows 7 machines are signed drivers. How do you accomplish this task? A. Run Verify.exe at the command prompt. B. Run a scan in Device manager. C. Run Sigverif.exe at the command prompt. D. Run Drivers.exe at the command prompt. Correct Answer: C

QUESTION 408

You are the network administrator of a large corporation. Your company has decided to use WDS to install 100 client computers. You have set up the WDS server and now want to test a single WDS client to make sure the installation will go smoothly. Which of the following services are required to use WDS? (Choose Three) A. DNS B. WINS C. DHCP D. Active Directory Correct Answer: ACD

QUESTION 414

You are the system administrator for your company. You are configuring the services on a Windows 7 computer. You want to ensure that if a service fails to load, it will attempt to restart. Which tab of the service`s Properties dialog box should you use? A. General B. Log On C. Recovery D. Dependencies Correct Answer: C

A. Windows Memory Diagnostic

You are troubleshooting instability problems on a computer running Windows 7 Ultimate and suspect that they might be related to hardware faults in RAM. You access the System Recovery options. Which option is most likely to help you diagnose the problem? A. Windows Memory Diagnostic B. Startup Repair C. System Restore D. System Image Recovery

D. From Devices and Printers, right-click the device and click troubleshoot.

You attach a mobile device that runs Windows Mobile Professional 6.1 to a computer. You discover that windows is unable to install the necessary device drivers for the mobile device. You need to ensure that you can synchronize file to the mobile device. What should you do? A. From Windows Mobility Center, click Sync settings. B. From Sync Center, click set up new sync partnerships. C. From Device Manager, click scan for hardware changes. D. From Devices and Printers, right-click the device and click troubleshoot.

What can you do to reduce the use of virtual memory?

You can add more physical memory to the computer, reduce the number of running applications, processes and services.

C. Slmgr.vbs and specify the dli parameter

You deploy a Windows 7 Enterprise image to a computer on the network. You need to display the detailed activation and license status of the computer. What should you run? A. Msconfig.exe B. Slui.exe C. Slmgr.vbs and specify the dli parameter D. Winrm.vbs and specify the id parameter

D. Mount the image. Run Dism.exe and specify /image and /enable-feature:TelnetClient switches. Commit the changes and unmount the image.

You deploy a custom image to a computer and discover that the Telnet Client feature is disabled. You need to ensure that the Telnet Client feature is enabled when you deploy the image. You must achieve this goal in the minimum amount of time. What should you do? A. Enable the Telnet Client feature on the computer. Generalize the computer and capture the image. B. Create an unattended file that enables Telnet Client. Generalize the computer and specify the unattended file. Capture the image. C. Mount the image. Run Ocsetup.exe TelnetClient. Commit the changes and unmount the image. D. Mount the image. Run Dism.exe and specify /image and /enable-feature:TelnetClient switches. Commit the changes and unmount the image.

C. Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option.

You download a Windows PowerShell snap-in. You need to ensure that the snap-in is automatically imported when you open a new PowerShell session. What should you do? A. Modify the PowerShell execution policy. B. Create a new PowerShell manifest file. Update the PowerShell shortcut and specify the file option. C. Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option. D. Create a new PowerShell formatting and type file. Copy the file to the %SystemRoot%\system32\Windows PowerShell\v1.0 folder.

QUESTION 381

You have 100 computers that run Windows XP. Each computer has the following features: - Contains a single hard disk drive. - Contains a single partition. - Supports USB devices during startup. You are planning a clean installation of Windows 7 Ultimate. You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition. What should you do? A. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the partition by using manage-bde.exe. B. Verify that the computers have Trusted Platform Modules (TPM) version 1.2 security devices. C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Encrypt a USB drive by using the BitLocker-to-Go-Feature. D. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bdehdcfg.exe to configure the partition. Correct Answer: D

QUESTION 403

You have 15 computers that run Windows 7. You need to implement a monitoring solution that meets the following requirements: - Sends an e-mail notification when an application error is logged in the event log. - Runs a script to restart the computer if an application error occurs between 17:00 and 07:00. - Minimizes the administrative effort required to monitor applications. What should you do? A. On all the computers, configure a custom view. Configure a custom task for the application error events. B. On a computer, configure a custom view to display the application errors. Configure a custom task for the application error events. C. On a central computer, configure an event subscription. On all of the computers, configure a custom task in the Forwarded Events log. D. On all the computers, configure an event subscription to a central computer. On the central computer, configure a custom task in the Forwarded Events log. Correct Answer: D

D. Run Bcdedit.exe and modify the Windows Boot Manager settings.

You have a Virtual Hard Disk (VHD) and a computer that runs Windows 7. The VHD has Windows 7 installed. You need to start the computer from the VHD. What should you do? A. From Diskpart.exe, run Select vdisk. B. From Disk Management, modify the active partition. C. Run Bootcfg.exe and specify the /default parameter. D. Run Bcdedit.exe and modify the Windows Boot Manager settings.

A. Run Dism.exe and specify /get drivers parameter.

You have a Windows 7 Windows image (WIM) that is mounted. You need to view the list of third party drivers installed in the image. What should you do? A. Run Dism.exe and specify /get drivers parameter. B. Run Driverquery.exe and specify the /si parameter. C. From Device Manager, view all hidden devices. D. From Windows Explorer, open the \Windows\System32\Drivers folder from the mount folder.

B. Application control policy

You have a Windows 7 computer that is a member of a workgroup. You need to prevent members of a local group from starting a specific application. You must achieve this goal by using the minimum amount of administrative effort. What should you create? A. Administrative template B. Application control policy C. IPSec policy D. Software restriction policy

A. Run Imagex.exe and specify the /split parameter.

You have a Windows image (WIM) file that contains an image of Windows 7. The WIM file is 2 GB. You need to ensure that you can copy the image to CD. What should you do? A. Run Imagex.exe and specify the /split parameter. B. From the properties of the WIM file, enable compression. C. Run Dism.exe and specify the /cleanup-wim parameter. D. Right-click the WIM file, point to Send To and then click Compressed (zipped) Folder.

A. From the Advanced tab, click Reset.

You have a computer named Computer1 that runs Windows 7 and Windows Internet Explorer 8. A user reports that Computer1 has a number of Internet Explorer configuration issues that cause instability when browsing the Internet. You need to configure Internet Explorer to use all default settings. What should you do from Internet Options? A. From the Advanced tab, click Reset. B. From the Programs tab, click Set programs. C. From the Advanced tab, click Restore advanced settings. D. From the Security tab, click Reset all zones to default level.

C. Assign User1 the Deny log on through Remote Desktop Services user right.

You have a computer named Computer1 that runs Windows 7. Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1. A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1. A user named User1 is a member of HRUsers. You need to configure the computer to meet the following requirements: - Allow User1 to print to Printer1. - Prevent User1 from establishing Remote Desktop sessions to Computer1. - Allow other members of HRUsers to connect to Computer1 by using Remote Desktop. What should you do? A. Remove User1 from the HRUsers group. B. Remove HRUsers from the Remote Desktop Users group. C. Assign User1 the Deny log on through Remote Desktop Services user right. D. Assign User1 the Deny access to this computer from the network user right. Assign HRUsers the Allow log on locally user right.

D. From the local computer policy, modify the User Rights Assignment.

You have a computer named Computer1 that runs Windows 7. Computer1 has a shared printer. You need to configure Computer1 so that only Administrators are authorized to shut down the computer. What should you do? A. From User Accounts, modify the user profiles settings. B. From User Accounts, modify the User Account Control (UAC) settings. C. From the local comput er policy, modify the Security Options. D. From the local computer policy, modify the User Rights Assignment.

D. Modify the properties of the File and Printer Sharing firewall exceptions.

You have a computer named Computer1 that runs Windows 7. Computer1 is a member of an Active Directory domain. Remote Desktop is enabled on the computer. You share a folder on Computer1. You need to configure Computer1 to meet the following requirements: - Allow computers in the local subnet to access the shared folder. - Prevent computers in remote subnets from accessing the shared folder. - Allow all computers to connect to Computer1 by using Remote Desktop. What should you do? A. Modify the subnet mask. B. Modify the Public folder sharing settings. C. Disable network discovery on all computers located in remote subnets. D. Modify the properties of the File and Printer Sharing firewall exceptions.

A. Open Computer and modify the properties of the USB drive.

You have a computer named Computer1 that runs Windows 7. Computer1 uses an NTFS-formatted USB drive that has ReadyBoost enabled. You need to modify the amount of space that ReadyBoost reserves on the USB drive. What should you do? A. Open Computer and modify the properties of the USB drive. B. Open Performance Information and Tools and run disk cleanup. C. Open Devices and Printers and modify the properties of the USB drive. D. Open Device Manager and modify the properties of the USB device.

C. From Credential Manager, select Add a Windows credential.

You have a computer named Computer1 that runs Windows 7. The computer is a member of an Active Directory domain. The network contains a file server named Server1 that runs Windows Server 2008. You log on to the computer by using an account named User1. You need to ensure that when you connect to Server1, you authenticate by using an account named Admin1. What should you do on Computer1? A. From User Accounts, select Link online IDs. B. From Windows CardSpace, select Add a card. C. From Credential Manager, select Add a Windows credential. D. From Local Security Policy, modify the Access this computer from the network user right.

A. Run Ping Server1 -6.

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Computer1 and Server1 have IPv4 and IPv6 installed. You need to identify whether you can connect to Server1 by using IPv6. What should you do? A. Run Ping Server1 -6. B. Run Ping Server1 -n 6. C. Run Net view \\Server1. D. Open \\server1 from the Run dialog box.

QUESTION 182 see exhibit A. Client for Microsoft Networks

You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1. The network configuration for Computer1 is shown in the exhibit. You attempt to connect to \\Server1\Share1 and receive the following error message: "Windows cannot access \\Server1\Share1." From Computer1, you successfully ping Server1. You need to connect to \\Server1\Share1. What should you enable on Computer1? A. Client for Microsoft Networks B. File and Printer Sharing for Microsoft Networks C. Link-Layer Topology Discovery Mapper I/O Driver D. Link-Layer Topology Discovery Responder

A. Wecutil.exe qc

You have a computer named Computer1 that runs Windows 7. You need to configure Computer1 to support the collection of Windows system events from other computers. Which command should you run? A. Wecutil.exe qc B. Winrm.exe quickconfig C. Winrs r:Computer1 D. Wmic /aggregate

A. From Windows Firewall with Advanced Security, create a new rule.

You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do? A. From Windows Firewall with Advanced Security, create a new rule. B. From the local Group Policy, modify the application control policies. C. From Windows Firewall, modify the Allowed Programs and Features list. D. From Network and Sharing Center, modify the Advanced Sharing settings.

D. Run Scanstate.exe and use the /genmigxml option.

You have a computer named Computer1 that runs Windows 7. You plan to migrate the user state on Computer1 by using User State Migration Tool (USMT) 4.0. You need to identify which user documents will be included in the migration. What should you do? A. Run Usmtutils.exe and use the /ec option. B. Run Sysprep.exe and use the /audit option. C. Run Loadstate.exe and use the /v:12 option. D. Run Scanstate.exe and use the /genmigxml option.

B. On Computer1 run Scanstate c:\store /nocompress /p.

You have a computer named Computer1 that runs Windows Vista and a computer named Computer2 that runs Windows 7. You plan to migrate all profiles and user files from Computer1 to Computer2. You need to identify how much space is required to complete the migration. What should you do? A. On Computer1 run Loadstate c:\store /nocompress. B. On Computer1 run Scanstate c:\store /nocompress /p. C. On Computer2 run Loadstate \\computer1\store /nocompress. D. On Computer2 run Scanstate \\computer1\store /nocompress /p.

QUESTION 214 see exhibit

You have a computer running Windows 7 Enterprise. You need to set up a VPN connection using PPP protocol over SSL (Secure Socket Layer) using HTTPS channel. What type of VPN connection would you need? (To answer, select the appropriate setting or settings in the work area.) Hot Area: Correct Answer:

A. From the BIOS, modify the startup order.

You have a computer that contains a DVD drive and a single 350-GB hard disk drive. You attempt to install Windows 7 on the computer by using the DVD installation media and receive the following error message: "Reboot and Select proper Boot device or Insert Boot Media in selected Boot device." You need to ensure that you can install Windows 7 on the computer by using the DVD installation media. What should you do? A. From the BIOS, modify the startup order. B. From the BIOS, enable Pre-Boot Execution Environment (PXE). C. Create an answer file named oobe.xml and place the file on the hard disk drive. D. Create an answer file named autounattend.xml and place the file on the hard disk drive.

QUESTION 164 make chart B. From the Previous Versions tab of the User1 folder, click Copy.

You have a computer that contains the folders shows in the following table: You accidentally delete the Data1 folder. You need to restore the contents of the Data1 folder. The solution must not overwrite any changes to the Data2 folder. What should you do? A. From Recovery, restore a system restore point. B. From the Previous Versions tab of the User1 folder, click Copy. C. From the Sharing tab of the User1 folder, modify the Caching settings. D. Start the computer and then press F8. Restore the Last Known Good Configuration.

B. Enable hardware virtualization.

You have a computer that has the following configurations: - Operating system: Windows 7 Professional - Processor: 2.2 gigahertz (GHz) (x86) - RAM: 2 GB - Hardware virtualization: Disabled - TPM chip: Disabled You need to ensure that you can run Windows XP Mode on the computer. What should you do? A. Upgrade to a 64-bit processor. B. Enable hardware virtualization. C. Enable the Trusted Platform Module (TPM) chip. D. Upgrade the operating system to Windows 7 Ultimate.

A. Windows 7 Enterprise (64-bit)

You have a computer that has the following hardware configuration: - 1.6 GHz processor (64-bit) - 8 GB RAM - 500 GB hard disk - Graphics card that has 128 MB RAM You need to select an edition of Window 7 to meet the following requirements: - Support DirectAccess. - Support Windows XP Mode. - Use all of the installed memory. - Support joining an Active Directory domain. Which edition should you choose? A. Windows 7 Enterprise (64-bit) B. Windows 7 Enterprise (x86) C. Windows 7 Professional (64-bit) D. Windows 7 Ultimate (x86)

B. Create an autounattend.xml file on a removable drive. Start the computer from the Windows 7 installation media.

You have a computer that is certified for Windows 7. You need to install Windows 7 on the computer. The installation method must prevent you from being prompted for information during the installation. What should you do? A. Create an unattend.txt file on a removable drive. Start the computer from the Windows 7 installation media. B. Create an autounattend.xml file on a removable drive. Start the computer from the Windows 7 installation media. C. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /m parameter. D. Start the computer from the Windows 7 installation media. At the command prompt, run Setup.exe and specify the /tempdrive.

B. From the Virtual PC, add a shortcut to the Start menu.

You have a computer that run Windows 7. Windows XP mode and Windows Virtual PC are installed on the computer. When running Windows XP Mode with Windows Virtual PC, you install a 16-bit application named App1. exe You need to ensure that you can start App1.exe by using a shortcut on the Windows 7 Start Menu. What should you do? A. From Windows 7, add a shortcut to the Start menu. B. From the Virtual PC, add a shortcut to the Start menu. C. From Windows 7, run Start app1.exe /separate. D. From the Virtual PC, run Start app1.exe /separate.

A. Perform a Windows Anytime Upgrade.

You have a computer that runs Windows 7 Home Premium. You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. What should you do? A. Perform a Windows Anytime Upgrade. B. Download and run the Windows 7 Upgrade Advisor. C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.

B. Upgrade the computer to Windows 7 Enterprise.

You have a computer that runs Windows 7 Professional. A USB disk is attached to the computer. You need to ensure that you can enable BitLocker To Go on the USB disk. What should you do? A. Enable Encrypting File System (EFS). B. Upgrade the computer to Windows 7 Enterprise. C. Initialize the Trusted Platform Module (TPM) hardware. D. Obtain a client certificate from an enterprise certification authority (CA).

B. Run Windows Anytime Upgrade.

You have a computer that runs Windows 7 Professional. You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time. What should you do? A. Run Windows Update. B. Run Windows Anytime Upgrade. C. From the Windows 7 installation media, run Setup.exe. D. From the Windows 7 installation media, run Migwiz.exe.

A. Content Advisor

You have a computer that runs Windows 7 and Windows Internet Explorer 8. A user named User1 attempts to access a Web page. User1 fails to access the Web page and receives an error message stating that the page does not have a rating. You need to configure Internet Explorer to allow User1 to access Web pages that do not have a rating. Which settings should you modify? A. Content Advisor B. InPrivate Filtering C. Parental Controls D. Restricted Sites

C. Enable InPrivate Filtering and select the Choose content to block or allow option.

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do? A. Enable InPrivate Filtering and click Automatically block. B. Add the Web site for the content provider to the Restricted sites zone. C. Enable InPrivate Filtering and select the Choose content to block or allow option. D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option.

D. From the Tools menu, open Manage Add-ons and modify the add-on settings.

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You have a thirdparty Internet Explorer toolbar installed on the computer. You need to temporarily disable the toolbar. The solution must not affect any other installed toolbars. What should you do? A. Start an Inprivate Browsing session. B. Run Msconfig.exe and enable Selective Startup. C. From the Tools menu, select Compatibility View Settings. D. From the Tools menu, open Manage Add-ons and modify the add-on settings.

C. Enable Compatibility View.

You have a computer that runs Windows 7 and Windows Internet Explorer 8. You open Internet Explorer and access a Web site. The Web site displays a page that has misaligned text and graphic image. You verify that the Web page displays correctly in previous versions of Internet Explorer. You need to view the Web page correctly. What should you do? A. Modify the text size. B. Enable Caret Browsing. C. Enable Compatibility View. D. Disable the SmartScreen Filter.

A. From the printer's properties, assign the Print permission to the Sales group.

You have a computer that runs Windows 7. A printer is installed on the computer. You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer. You need to ensure that members of the Sales group can modify all the print jobs that they submit. You must prevent Sales group members from modifying the print jobs of other users. What should you do? A. From the printer's properties, assign the Print permission to the Sales group. B. From the printer's properties, assign the Manage Documents permission to the Sales group. C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group. D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.

C. From Control Panel, modify the Set your default programs settings.

You have a computer that runs Windows 7. A user installs a third-party media player on the computer. You discover that all media files automatically open by using the third-party media player. You need to ensure that all media files open automatically by using Windows Media Player. You must achieve this goal by using the minimum amount of administrative effort. What should you do? A. Select a media file. Right-click the file and select Open with. B. Select a media file. Right-click the file and select Restore previous versions. C. From Control Panel, modify the Set your default programs settings. D. From Control Panel, modify the Set program access and computer defaults settings.

QUESTION 151 see exhibit x2 A. From Device Manager, enable the network adapter.

You have a computer that runs Windows 7. A user reports that he is unable to access network resources. You run Ipconfig.exe as shown in the IPConfig exhibit. You open Device Manager as shown in the Device Manager exhibit. You need to ensure that the user can connect to the network. What should you do? IP Configuration: Device Manager: A. From Device Manager, enable the network adapter. B. From Device Manager, update the driver for the network adapter. C. At a command prompt, run Ipconfig /renew. D. At a command prompt, run Netsh ip set address "local area connection" dhcp.

B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission.

You have a computer that runs Windows 7. Four users share the computer. You create a folder named C:\data. The Users group has Full control permission to the folder. You need to configure security on the folder to meet the following requirements: - Allow users to create files. - Allow users to delete files that they create. - Prevent users from deleting files created by other users. What should you do? A. Remove all NTFS permissions from the Users group and assign the CREATOR OWNER group the Full control NTFS permission. B. Remove the Modify NTFS permission from the Users group and assign the CREATOR OWNER group the Modify NTFS permission. C. Deny the Users group the Modify NTFS permission and assign the Authenticated Users group the Read and Write NTFS permissions. D. Deny the Users group the Full control NTFS permission and assign the Authenticated Users group the Read & execute NTFS permission.

A. Delete the default gateway address.

You have a computer that runs Windows 7. IPv6 is disabled on the computer. The computer has the following IPv4 settings: - IP address: 10.1.1.193 - Subnet mask: 255.255.0.0 - Default gateway: 10.1.1.194 - Preferred DNS server: 10.1.1.195 You need to ensure that the computer can only communicate with computers on the local subnet. What should you do? A. Delete the default gateway address. B. Delete the preferred DNS server IP address. C. Configure the subnet mask to use 255.255.255.0. D. Configure the subnet mask to use 255.255.255.192.

B. Enable the Prevent installation of removable devices setting.

You have a computer that runs Windows 7. Multiple users log on to the computer. The computer has five removable devices. You need to ensure that users can only access removable devices that have been previously installed on the computer. What should you modify in the Local Group Policy? A. Enable the Prevent redirection of USB devices setting. B. Enable the Prevent installation of removable devices setting. C. Disable the WPD Devices: Deny read access setting. D. Disable the Allow administrators to override Device Installation Restriction policies setting.

D. From the local Group Policy, modify a removable storage access policy.

You have a computer that runs Windows 7. Multiple users log on to the computer. You need to deny one user access to removable devices on the computer. All other users must have access to the removable drives. What should you do? A. From the local Group Policy, modify an application control policy. B. From Control Panel, modify the BitLocker Drive Encryption settings. C. From Device Manager, modify the settings of all removable devices. D. From the local Group Policy, modify a removable storage access policy.

C. From the local Group Policy, configure the Audit object access setting.

You have a computer that runs Windows 7. Multiple users log on to your computer. You enable auditing on a folder stored on your computer. You need to ensure that each access to the folder is logged. What should you do? A. Start the Problem Steps Recorder. B. From Event Viewer, modify the properties of the Security log. C. From the local Group Policy, configure the Audit object access setting. D. From the local Group Policy, configure the Audit directory service Access setting.

A. Cipher C:\folder1

You have a computer that runs Windows 7. Multiple users share the computer. The computer contains a folder named C:\folder1. You need to identify all of the encrypted files in C:\folder1. Which command should you run? A. Cipher C:\folder1 B. Dir C:\folder1 /OE C. Fsutil C:\folder1 D. Wfs C:\folder1

C. Enable disk quota management on Computer1 and configure a default quota limit.

You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain. You need to prevent the users from using more than 2 GB of disk space on drive C. What should you do? A. From a Group Policy object (GPO), enable the Limit profile size setting. B. Enable System Protection for Local Disk (C) and set the disk space usage. C. Enable disk quota management on Computer1 and configure a default quota limit. D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting.

B. Cipher.exe /k

You have a computer that runs Windows 7. The Encrypting File System (EFS) key is compromised. You need to create a new EFS key. Which command should you run? A. Certutil -getkey B. Cipher.exe /k C. Icacls.exe /r D. Syskey.exe

C. From the network connection status, click Details.

You have a computer that runs Windows 7. The IPv6 address of the computer is configured automatically. You need to identify the IPV6 address of the computer. What should you do? A. At the command prompt, run Netstat. B. At the command prompt run Net config. C. From the network connection status, click Details. D. From network connection properties, select Internet Protocol Version 6 (TCP/IPv6) and click Properties.

D. Configure the advanced TCP/IP settings of the VPN connection.

You have a computer that runs Windows 7. The computer connects to the corporate network by using a VPN connection. You need to ensure that you can access the Internet when the VPN connection is active. The solution must prevent Internet traffic from being routed through the VPN connection. What should you do? A. Configure a static DNS server address. B. Configure a static IP address and default gateway. C. Configure the security settings of the VPN connection. D. Configure the advanced TCP/IP settings of the VPN connection.

C. From the Security settings of the folder, assign the user the Read NTFS permission.

You have a computer that runs Windows 7. The computer contains a folder named C:\data. You use Advanced Sharing to share C:\data by using the default share permissions. When a user tries to access the share over the network, he gets an Access is Denied error message. You need to ensure that the user can access the share. What should you do? A. Allow file and printer sharing through Windows Firewall. B. Change the network location from a Public network to a Home or Work network. C. From the Security settings of the folder, assign the user the Read NTFS permission. D. From the Advanced Sharing settings of the folder, assign the user the Read share permission.

QUESTION 95 make chart D. Convert both disks to dynamic disks and then create two mirrored volumes.

You have a computer that runs Windows 7. The computer contains one hard disk. The hard disk is configured as shown in the following table: You install a new 250-GB hard disk in the computer. You need to ensure that all the files on the computer are available if a single disk fails. What should you do? A. Create a mount point on C and D and then create a striped volume. B. Create a mount point on C and D and then create two striped volumes. C. Convert both disks to dynamic disks and then create a mirrored volume. D. Convert both disks to dynamic disks and then create two mirrored volumes.

D. Create a new library and add the Reports folder to the library.

You have a computer that runs Windows 7. The computer contains two volumes, C and D. You create a new folder called D:\Reports. You need to ensure that all files stored in the Reports folder are indexed by Windows Search. What should you do? A. Enable the archive attribute on the folder. B. Modify the Folder Options from Control Panel. C. Modify the properties of the Windows Search service. D. Create a new library and add the Reports folder to the library.

B. Run Disk Cleanup for System Restore and Shadow Copies.

You have a computer that runs Windows 7. The computer has System Protection enabled. You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted. What should you do? A. Run Disk Cleanup for Programs and features. B. Run Disk Cleanup for System Restore and Shadow Copies. C. From the System Protection Restore settings, select Turn off System Restore. D. From the System Protection Restore settings, select Only restore previous versions of files.

D. Start the computer from a Windows Recovery Environment (Windows RE) disk and then restore the system image.

You have a computer that runs Windows 7. The computer has a single volume. You install 15 applications and customize the environment. You complete the following actions: - Create an export by using Windows Easy Transfer. - Create a system image by using Backup and Restore. - Install the User State Migration Tool (USMT) and run Scanstate The disk on the computer fails. - You replace the disk. - You need to restore the environment to the previous state. What should you do? A. Install Windows 7, install USMT, and then run Loadstate. B. Install Windows 7 and then import the Windows Easy Transfer package. C. Start the computer from a Windows Recovery Environment (Windows RE) disk and then run Bcdboot. exe. D. Start the computer from a Windows Recovery Environment (Windows RE) disk and then restore the system image.

A. From Backup and Restore, click Restore all users files.

You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime. What should you do? A. From Backup and Restore, click Restore all users files. B. From the properties of drive D, restore all previous versions. C. Open System Restore and apply the latest restore point. D. Start the computer from a system repair disc and restore a system image.

QUESTION 14 see exhibit C. Turn on System Protection for volume D.

You have a computer that runs Windows 7. The computer has two volumes named volume C and volume D. You create a document on volume D. You manually create a restore point and modify the document. You view the properties of the document as shown in the exhibit. You need to ensure that you can restore the current version of the document if the document is modified. What should you do first? Properties: Eigenschaften: A. Run Disk Cleanup on volume D. B. Enable auditing on the document. C. Turn on System Protection for volume D. D. Start the Volume Shadow Copy Service (VSS).

C. Assign User1 Write NTFS permission on the D:\data folder.

You have a computer that runs Windows 7. The computer is a member of a domain. You share D:\data as Data. You assign Everyone Full control share permissions to the folder. No other share permissions are assigned to the folder. From another computer, you attempt to create a file in the Data share by using a domain account named User1. You receive the following error message: "Destination Folder Access Denied." You need to ensure that you can create files in the Data share by using the User1 account. What should you do? A. Create a local user named User1. B. Add User1 to the local Power Users group. C. Assign User1 Write NTFS permission on the D:\data folder. D. Assign User1 Full control share permissions to the Data share.

D. Assign the Manage Documents permission to CREATOR OWNER.

You have a computer that runs Windows 7. The computer is a member of an Active Directory domain and has a shared printer. Users report that they can print to the shared printer, but they cannot delete their print jobs. You need to ensure that users can delete their own print jobs. What should you do? A. Restart the Print Spooler service. B. Stop sharing the local printer and then share it again. C. Assign the Manage Documents permission to SYSTEM. D. Assign the Manage Documents permission to CREATOR OWNER.

B. From Windows Update, select Get updates for other Microsoft products.

You have a computer that runs Windows 7. The computer is configured to automatically download and install updates. You install Microsoft Office 2007. You need to ensure that service packs for Office are automatically installed. What should you do? A. From Windows Update, select Restore hidden updates. B. From Windows Update, select Get updates for other Microsoft products. C. Create a folder named Updates in C:\Program Files\Microsoft Office. Install the Office Update Inventory Tool into the Updates folder. D. Download and install the Office 2007 administrative template and disable the Block updates from the Office Update Site from applying policy.

D. Review the contents of the C:\windows\windowsupdate.log file.

You have a computer that runs Windows 7. The computer is configured to use an intranet Microsoft update service location. You need to view the name of the intranet service location. What should you do? A. At a command prompt, run Wusa.exe. B. Open Event Viewer and examine the Application log. C. Open Windows Update and click View update history. D. Review the contents of the C:\windows\windowsupdate.log file.

B. From User Accounts, select Create a password reset disk. C. From User Accounts, select Manage your file encryption certificates.

You have a computer that runs Windows 7. The computer is in a workgroup. You need to ensure that you can decrypt Encrypting File System (EFS) files on the computer if you forget your password. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. From Credential Manager, select Back up vault. B. From User Accounts, select Create a password reset disk. C. From User Accounts, select Manage your file encryption certificates. D. From Authorization Manager, modify the Authorization Manager options.

B. Enable Prevent installation of devices not described by other policy settings. D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.

You have a computer that runs Windows 7. The computer is joined to a domain. You need to ensure that only approved USB drives can be used on the computer. Which two policy settings should you configure? (Each correct answer presents a part of the solution. (Choose two.) A. Enable Prevent installation of removable devices. B. Enable Prevent installation of devices not described by other policy settings. C. Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the approved USB drives. D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.

QUESTION 65 see exhibit A. Back up and delete volume D.

You have a computer that runs Windows 7. The computer's disk is configured as shown in the exhibit. You need to extend volume C. What should you do first? A. Back up and delete volume D. B. Convert disk 0 to a dynamic disk. C. Remove the crash dump from volume C. D. Move the paging file from volume C to volume E.

QUESTION 358 make chart C. Use the Backup and Restore tool to create a system image on an external hard disk.

You have a computer that runs Windows 7. The computer's hard disks are configured as shown in the following table: You need to ensure that you can recover the operating system and all the files on the computer if hard disk experiences hardware failure. What should you do? A. Create an Easy Transfer file on an external hard disk. B. Create an Easy Transfer file on a network location. C. Use the Backup and Restore tool to create a system image on an external hard disk. D. Use the Backup and Restore tool to back up data files for all users.

QUESTION 94 make chart A. Create a system image. D. Connect an external hard disk to the computer.

You have a computer that runs Windows 7. The computer's hard disks are configured as shown in the following table: You need to ensure that you can recover the operating system and all the files on the computer if both hard disks fail. Which two actions should you perform? (Each correct answer presents a part of the solution. Choose two.) A. Create a system image. B. Create a system repair disc. C. Shrink C and then create a new partition. D. Connect an external hard disk to the computer.

QUESTION 97 see exhibit x 2 A. Enable TCP/IPv4.

You have a computer that runs Windows 7. The network connection details are shown in the exhibit. You need to manually assign an IP address of 192.168.1.50 to the computer. What should you do first? Network Connection Details: Netzwerkverbindungsdetails: A. Enable TCP/IPv4. B. Disable TCP/IPv6. C. Run Ipconfig and specify the /renew parameter. D. Run Netsh and specify the Interface ipv4 add address command.

A. From Backup and Restore, select Change settings.

You have a computer that runs Windows 7. Windows Backup is configured to store backups on an external drive. You create a new NTFS volume on the computer. You need to configure Windows Backup to include the files on the new volume as part of regularly scheduled backups. What should you do? A. From Backup and Restore, select Change settings. B. From Backup and Restore, select Create a system image. C. From the System Protection tab, create a restore point. D. From the System Protection tab, enable system protection for the new volume.

QUESTION 196 see exhibit A. Select Allow all users to install updates on this computer.

You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. You discover that standard users are never notified when updates are available. You need to ensure that standard users are notified when updates are available. What should you do? A. Select Allow all users to install updates on this computer. B. Specify an intranet Microsoft update service location in Group Policy. C. Change the Startup Type for the Windows Update service to Automatic. D. Select Give me recommended updates the same way I receive important updates.

B. From System Properties, configure the System Protection settings.

You have a computer that runs Windows 7. You add a new hard disk drive to the computer and create a new NTFS partition. You need to ensure that you can use the Previous Versions feature on the new drive. What should you do? A. From Disk Management, convert the new disk to a dynamic disk. B. From System Properties, configure the System Protection settings. C. From System and Security, enable BitLocker Drive Encryption (BitLocker). D. From the properties of the new drive, create a share and modify the caching settings.

D. Modify the permissions of the %programfiles%\app1 folder.

You have a computer that runs Windows 7. You attempt to add files to %programfiles%\app1 and receive a prompt to elevate your privileges. You need to ensure that you can add files to %programfiles%\app1 without receiving a prompt for elevated privileges. The solution must prevent harmful applications from making unwanted changed to the system. What should you do? A. Enable the built-in administrator account. B. Modify the User Account Control (UAC) settings. C. Add your user account to the local Power Users group. D. Modify the permissions of the %programfiles%\app1 folder.

D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

You have a computer that runs Windows 7. You connect to your company's network by using a VPN connection. You discover that when you establish the VPN connection, you are unable to access Internet Web sites. When you disconnect the VPN connection, you can access Internet Web sites. You need to access Internet Web sites while you are connected to the VPN. What should you do? A. Configure the VPN connection to use only PPTP. B. Configure the VPN connection to use only L2TP/IPSec. C. From the Internet Protocol Version 4 (TCP/IPv4) properties of the local area connection, disable the Automatic metric setting. D. From the Internet Protocol Version 4 (TCP/IPv4) properties of the VPN connection, disable the Use default gateway on remote network setting.

C. Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks.

You have a computer that runs Windows 7. You create a HomeGroup. You need to secure the HomeGroup to meet the following requirements: - Allow access to the HomeGroup when you are connected to private networks. - Block access to the HomeGroup when you are connected to public networks. What should you do? A. From Network and Sharing Center, modify the advanced sharing settings. B. From the HomeGroup settings in Control Panel, modify the advanced sharing settings. C. Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks. D. Configure the File and Printer Sharing exception in Windows Firewall to include Home or work (private) networks and block Public networks.

C. From the local computer policy, add a data recovery agent.

You have a computer that runs Windows 7. You create an Encrypting File System (EFS) recovery key and certificate. You need to ensure that your user account can decrypt all EFS files on the computer. What should you do? A. From Credential Manager, add a Windows credential. B. From Credential Manager, add a certificate-based credential. C. From the local computer policy, add a data recovery agent. D. From the local computer policy, modify the Restore files and directories setting.

A. Run Sdbinst.exe.

You have a computer that runs Windows 7. You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT). You need to ensure that the application shim is applied the next time you run the application. What should you do first? A. Run Sdbinst.exe. B. Run Msiexec.exe. C. Right-click the application executable file and modify the compatibility settings. D. Right-click the application executable file and modify the advanced security settings.

D. From the System Configuration tool, modify the Startup applications.

You have a computer that runs Windows 7. You discover that an application named App1 runs during the startup process. You need to prevent only App1 from running during startup. Users must be allowed to run App1 manually. What should you do? A. From the local Group Policy, modify the application control policy. B. From the local Group Policy, modify the software restriction policy. C. From the System Configuration tool, select Diagnostic Startup. D. From the System Configuration tool, modify the Startup applications.

B. Start the computer and select Last Known Good Configuration from the advanced startup options.

You have a computer that runs Windows 7. You have a system image backup of the computer. You install a new application that is configured to run as a service. You restart the computer and receive a STOP error message. You need to successfully start Windows 7 in the minimum amount of time. What should you do? A. Start the computer from the Windows 7 installation media and select Startup Repair. B. Start the computer and select Last Known Good Configuration from the advanced startup options. C. Start the computer and select Safe Mode from the advanced startup options. Restore a restore point. D. Start the computer and select Safe Mode from the advanced startup options. Restore the system image.

QUESTION 178 see exhibit x2 A. Set the Application Identity service Startup Type to Automatic and start the service.

You have a computer that runs Windows 7. You have an application control policy on the computer. You discover that the policy is not enforced on the computer. You open the Services snap-in as shown in the exhibit. You need to enforce the application control policy on the computer. What should you do? Services: Dienste: A. Set the Application Identity service Startup Type to Automatic and start the service. B. Set the Application Information service Startup Type to Automatic and start the service. C. Set the Application Management service Startup Type to Automatic and start the service. D. Set the Application Experience service Startup Type to Automatic and start the service.

C. Modify the authentication methods of the default Web site. D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder

You have a computer that runs Windows 7. You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site. Which two configuration changes should you perform? (Each correct answer presents a part of the solution, Choose two.) A. Modify the properties of Group1. B. Assign an SSL certificate to the default Web site. C. Modify the authentication methods of the default Web site. D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder

D. Start the computer from the Windows 7 installation media and run Startup Repair.

You have a computer that runs Windows 7. You install Windows XP in a new partition on the computer and discover that you can no longer start Windows 7. You need to start Windows 7 in the minimum amount of time. What should you do? A. From Windows XP, modify the default path in the boot.ini file. B. From Windows XP Recovery Console, run the Fixboot command. C. Start the computer from the Windows 7 installation media and select Install now. D. Start the computer from the Windows 7 installation media and run Startup Repair.

A. Create a NTFS partition.

You have a computer that runs Windows 7. You install a second internal hard disk drive in the computer. You attempt to create a system image and discover that the new disk is not listed as a backup destination. You need to ensure that you can use the new disk as a backup destination for system images. What should you do? A. Create a NTFS partition. B. Create a mirrored volume. C. Create a system repair disc. D. Log on to the computer by using a different account.

C. Open the Programs tab and click Make default.

You have a computer that runs Windows 7. You install a third-party Web browser. You discover that HTML files are no longer associated with Windows Internet Explorer. You need to ensure that Internet Explorer starts whenever a HTML file is opened. What should you do from Internet Options? A. Open the Connections tab and click Setup. B. Open the General tab and click Use default. C. Open the Programs tab and click Make default. D. Open the Programs tab and click Manage add-ons.

D. From the properties of the file, select Previous Versions.

You have a computer that runs Windows 7. You manually create a system restore point. You need to restore a copy of a file stored on a drive C from two days ago. You must act with minimum administrative effort. What should you do? A. From recovery, select System Restore. B. From Backup and restore, select Rrestore my files. C. From the command prompt, run Wbadmin get items. D. From the properties of the file, select Previous Versions.

A. Open Sync Center and review the status.

You have a computer that runs Windows 7. You mark a folder as Always available offline. You need to verify that an offline copy of the folder has been created on the computer. What should you do? A. Open Sync Center and review the status. B. Open Action Center and review any messages or issues. C. Open Windows Mobile Device Center and review the status. D. Open Network and Sharing Center and review the status for the local area connection.

D. Start the computer by using Windows Preinstallation Environment (Windows PE).

You have a computer that runs Windows 7. You need to capture the operating system and all the computer configurations to a Windows image (WIM) file. What should you do before you capture the image? A. Run Oscdimg.exe. B. Run Windows System Image Manager (Windows SIM). C. Open a command prompt that has elevated privileges. D. Start the computer by using Windows Preinstallation Environment (Windows PE).

A. ::1

You have a computer that runs Windows 7. You need to configure an application to connect to the computer by using the IPV6 loopback address. Which address should you specify? A. ::1 B. 12::1 C. 127.0.0.1 D. fe80::f56f:56cb:a136:4184

A. External hard disk drive

You have a computer that runs Windows 7. You need to configure system image backups to meet the following requirements: - Automatically create a system image every day without user intervention. - Retain multiple copies of the system image. Which type of backup destination should you use? A. External hard disk drive B. Network location C. USB flash drive D. Writeable DVD

B. From the local Group Policy, modify the Windows Update settings.

You have a computer that runs Windows 7. You need to configure the computer to download updates from a local Windows Server Update Services (WSUS) server. What should you do? A. From Windows Update, modify the Windows Update settings. B. From the local Group Policy, modify the Windows Update settings. C. From the System settings, modify the System Protection settings. D. From the local Group Policy, modify the Location and Sensors settings.

A. Run Sysprep.exe /oobe /generalize.

You have a computer that runs Windows 7. You need to configure the computer to meet the following requirements: - Generate a new security ID (SID) when the computer starts. - Ensure that the Welcome screen appears when the computer starts. What should you do? A. Run Sysprep.exe /oobe /generalize. B. Run Sysprep.exe /audit /generalize. C. Run Msconfig.exe and select Selective startup. D. Run Msconfig.exe and select Diagnostic startup.

B. At a command prompt, run Sigverif.exe.

You have a computer that runs Windows 7. You need to confirm that all device drivers installed on the computer are digitally signed. What should you do? A. At a command prompt, run Verify. B. At a command prompt, run Sigverif.exe. C. From Device Manager, click Scan for hardware changes. D. From Device Manager, select the Devices by connection view.

B. Run Netproj.exe and provide the path to the projector.

You have a computer that runs Windows 7. You need to connect to a network projector from the computer. What should you do? A. Run Displayswitch.exe and select Projector only. B. Run Netproj.exe and provide the path to the projector. C. From Device Manager, click Add legacy hardware. D. From Network and Sharing Center, create an ad hoc network and run Displayswitch.exe.

C. Run Diskpart.exe and then run the Select and Attach commands.

You have a computer that runs Windows 7. You need to copy files to a virtual hard disk (VHD) file. What should you do first? A. Run Dism.exe and specify the /image and /online parameters. B. Open Windows Explorer, right-click the VHD file and select Open. C. Run Diskpart.exe and then run the Select and Attach commands. D. Run Imagex.exe and specify the /mountrw and /append parameters.

D. Modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting.

You have a computer that runs Windows 7. You need to ensure that all users are required to enter a username and password when uninstalling applications from the computer. What should you do from Local Group Policy Editor? A. Configure a software restriction policy. B. Modify the Add or Remove Programs settings. C. Configure an AppLocker Windows Installer rule. D. Modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting.

C. From System, view the System Protection settings.

You have a computer that runs Windows 7. You need to identify how much disk space is occupied by previous versions. What should you do? A. At a command prompt, run Diskpart. B. At a command prompt, run Vaultcmd. C. From System, view the System Protection settings. D. From the properties of drive C, view the previous versions settings.

D. Resource Monitor

You have a computer that runs Windows 7. You need to identify the disk, memory, CPU, and network resources that an application is currently using. Which tool should you use? A. Component Services B. Performance Information and Tools C. Reliability Monitor D. Resource Monitor

B. From Reliability Monitor, review the informational events.

You have a computer that runs Windows 7. You need to identify which applications were installed during the last week. What should you do? A. From Performance Monitor, run the System Performance Data Collector Set. B. From Reliability Monitor, review the informational events. C. From System Information, review the Software Environment. D. From Performance Monitor, review the System Diagnostics Report.

A. CD/DVD burner

You have a computer that runs Windows 7. You need to identify which hardware is required to create a system repair disc. What hardware should you identify? A. CD/DVD burner B. Floppy disk C. Tape drive D. USB disk

QUESTION 364

You have a computer that runs Windows 7. You need to identify which unsigned drivers have been installed. Which command should you run? A. Cipher.exe /s B. Driverquery.exe /si C. Msinfo32.exe /q D. Pnputil.exe -i Correct Answer: B

B. From Control Panel, open Default Programs and then click Set Associations.

You have a computer that runs Windows 7. You need to modify the file extensions that are associated to Internet Explorer. What should you do? A. From Internet Explorer, click Tools and then click Manage Add-ons. B. From Control Panel, open Default Programs and then click Set Associations. C. From the local Group Policy, expand Computer Configuration and then click Software Settings. D. From Window Explorer, right-click %programfiles%\Internet Explorer\iexplore.exe and then click Properties.

D. Security

You have a computer that runs Windows 7. You need to prevent ActiveX controls from running in Windows Internet Explorer. Which Internet Explorer settings should you modify? A. Content B. Encoding C. Safety D. Security

C. Open an InPrivate Browsing session.

You have a computer that runs Windows 7. You need to prevent Internet Explorer from saving any data during a browsing session. What should you do? A. Disable the BranchCache service. B. Modify the InPrivate Blocking list. C. Open an InPrivate Browsing session. D. Modify the security settings for the Internet zone.

D. From a local Group Policy, modify the BitLocker Drive Encryption settings.

You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do? A. From a local Group Policy, modify the Trusted Platform Module (TPM) settings. B. From the Trusted Platform Module (TPM) snap-in, initialize TPM. C. From Control Panel, modify the BitLocker Drive Encryption settings. D. From a local Group Policy, modify the BitLocker Drive Encryption settings.

A. From Device Manager, identify the device class GUID.

You have a computer that runs Windows 7. You need to prevent users from installing a specific removable drive on the computer. You connect the removable drive to the computer. What should you do before you create a Group Policy? A. From Device Manager, identify the device class GUID. B. From Device Manager, identify the device location information. C. From System Information, identify the device INF file. D. From System Information, identify the device driver file name.

C. Driver installation settings for the computer

You have a computer that runs Windows 7. You need to provide standard users the ability to update the drivers for display adapters. What should you modify from the Local Group Policy? A. Driver installation settings for the user B. Device installation settings for the computer C. Driver installation settings for the computer D. Display settings for the user

C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful connections.

You have a computer that runs Windows 7. You need to record when an incoming connection is allowed through Windows firewall. What should you do? A. In Local Group Policy, modify the audit policy. B. In Local Group Policy, modify the system audit policy. C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful connections. D. From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode) IPSec settings to Advanced.

A. Open Resource Monitor and click the Network tab.

You have a computer that runs Windows 7. You need to view the processes that currently generate network activity. What should you do? A. Open Resource Monitor and click the Network tab. B. Open Windows Task Manager and click the Networking tab. C. Open Event Viewer and examine the NetworkProfile Operational log. D. Open Performance Monitor and add all the counters for network interface.

QUESTION 198 see exhibit x2 B. Convert all disks to dynamic disks.

You have a computer that runs Windows 7. Your computer s disk configuration is shown in the exhibit. You need to ensure that you can create a striped volume on the computer. What should you do? Disk Management: Computerverwaltung: A. Add an additional hard disk. B. Convert all disks to dynamic disks. C. Install a digitally-signed disk driver. D. Set the Startup Type of the Virtual Disk Service (VDS) to Automatic.

QUESTION 317 see exhibit

You use a computer that has Windows 7 Enterprise installed. The computer has a single 500 GB hard disk. You install two new 1 terabyte hard disks. You need to configure the new disks in a fault tolerant configuration. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

B. From Services, set the Network Access Protection Agent service Startup Type to Automatic. D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.

You have a computer that runs Windows 7. Your network contains a DHCP server that runs Windows Server 2008 R2. The server is configured as a Network Access Protection (NAP) enforcement point. You need to configure the computer as a NAP client. Which two actions should you perform? (Each correct answer presents a part of the solution. Choose two.) A. From Services, set the Netlogon service Startup Type to Automatic. B. From Services, set the Network Access Protection Agent service Startup Type to Automatic. C. From the NAP Client Configuration console, configure the user interface settings. D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.

B. L2TP

You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server 2008 R2. The server requires the use of a pre-shared key. You need to create a VPN connection to connect to the network. Which type of VPN connection should you create? A. IKEv2 B. L2TP C. PPTP D. SSTP

B. EAP

You have a computer that runs Windows 7. Your network contains a VPN server that runs Windows Server 2008. You need to authenticate to the VPN server by using a smart card. Which authentication setting should you choose? A. CHAP B. EAP C. MS-CHAP v2 D. PAP

D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store.

You have a computer that runs Windows 7. Your network has a SSTP VPN server that uses a self signed certificate. When you connect to the VPN server, you receive the following error message: "Your computer does not trust the issuing certification authority (CA) of the SSTP VPN servers certificate". You need to prevent the error message from appearing when you connect to the VPN server. What should you do? A. From the properties of the VPN connection, modify the dialing options. B. From the properties of the VPN connection, modify the data encryption settings. C. From Certificate Manager, import the servers certificate into the Personal store. D. From Certificate Manager, import the server's certificate into the Trusted Root Certification Authorities store.

D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Custom (advanced) option.

You have a computer that runs Windows Vista (x86). You need to perform a clean installation of Windows 7 (64-bit). What should you do? A. From the Windows 7 installation media, run Rollback.exe. B. From the Windows 7 installation media, run Migsetup.exe. C. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option. D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Custom (advanced) option.

C. From Windows Vista, run Setup.exe from the Windows 7 installation media and select the Upgrade option.

You have a computer that runs Windows Vista Service Pack 2 (SP2). You need to upgrade the computer to Windows 7. What should you do? A. Start the computer from the Windows 7 installation media and select the Upgrade option. B. Start the computer from the Windows 7 installation media and select the Custom (advanced) option. C. From Windows Vista, run Setup.exe from the Windows 7 installation media and select the Upgrade option. D. From Windows Vista, run Setup.exe from the Windows 7 installation media and select the Custom option.

D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

You have a computer that runs Windows Vista. The computer contains a custom application. You need to export the user state and the settings of the custom application. What should you do? A. Run Loadstate.exe and specify the /config parameter. B. Run Scanstate.exe and specify the /genconfig parameter. C. Modify the miguser.xml file. Run Loadstate.exe and specify the /ui parameter. D. Modify the migapp.xml file. Run Scanstate.exe and specify the /i parameter.

QUESTION 98 see exhibit D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.

You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. You need to install Windows 7 in a dual-boot configuration. What should you do? A. From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1. B. From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1. C. Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1. D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.

C. Run Bcdedit.exe and specify the /default parameter.

You have a computer that runs Windows Vista. You install Windows 7 on a new partition on the computer. You need to ensure that the computer always starts Windows Vista by default. What should you do? A. Create a boot.ini file in the root of the Windows 7 partition. B. Create a boot.ini file in the root of the Windows Vista partition. C. Run Bcdedit.exe and specify the /default parameter. D. Run Bcdedit.exe and specify the /bootems parameter.

C. Windows 7 Upgrade Advisor

You have a computer that runs Windows Vista. You need to identify whether the computer can be upgraded to Windows 7. Which tool should you use? A. Windows Anytime Upgrade for Windows 7 B. Windows Anytime Upgrade for Windows Vista C. Windows 7 Upgrade Advisor D. Windows Vista Upgrade Advisor

A. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Upgrade option.

You have a computer that runs Windows XP Service Pack 2 (SP2). You need to upgrade the operating system to Windows 7. You must achieve this goal in the minimum amount of time. What should you do? A. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Upgrade option. B. Upgrade to Windows Vista SP2. From the Windows 7 installation media, run Setup.exe and select the Custom (advanced) option. C. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Upgrade option. D. Install Windows XP Service Pack 3 (SP3). Run Setup.exe from the Windows 7 installation media and select the Custom (advanced) option.

A. Install a computer certificate.

Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections. What should you do? A. Install a computer certificate. B. Create a new network connection. C. Enable the Network Discovery firewall exception. D. Add the computer account to the Network Configuration Operators group.

C. Run Windows Easy Transfer, install Windows 7, and then run Windows Easy Transfer again.

You have a computer that runs Windows XP Service Pack 3 (SP3). The computer is a member of an Active Directory domain. Several domain users log on to the computer. You plan to install Windows 7 on the computer. You need to ensure that all user settings are preserved after the installation. What should you do? A. Run Loadstate.exe, install Windows 7, and then run Scanstate.exe. B. Run Sysprep.exe /audit, install Windows 7, and then run Sysprep.exe /oobe. C. Run Windows Easy Transfer, install Windows 7, and then run Windows Easy Transfer again. D. Create a backup of %systemdrive%\documents and settings, install Windows 7, and then restore the backup.

B. From a computer that runs Windows 7, disable BitLocker To Go for the USB drive.

You have a computer that runs Windows XP and a USB drive that is protected by using BitLocker To Go. You need to ensure that you can copy files from the computer to the USB drive. The solution must retain the existing files on the USB drive. What should you do? A. From a computer that runs Windows 7, change the file system of the USB drive. B. From a computer that runs Windows 7, disable BitLocker To Go for the USB drive. C. Log on to Windows XP as member of the Administrators group. D. Log on to Windows XP by using a user account that has an Encrypting File System (EFS) certificate.

B. Shrink the primary partition.

You have a computer that runs Windows XP. The computer has one basic disk that contains a single partition. The partition has 30 GB of free space. The hard disk has 5 GB of unallocated space. You need to install Windows 7 in a dual-boot configuration. Windows 7 must not be installed in a virtual hard disk (VHD). What should you do first? A. Create a second partition. B. Shrink the primary partition. C. Convert the hard disk to a GPT disk. D. Convert the hard disk to a dynamic disk.

QUESTION 380 see exhibit

You have a computer that runs WindowsXP. The computer has one partition. You install Windows 7 on the computer. You need to migrate a user profile from the Windows XP installation to Windows 7 installation. What should you do first? (To answer, drag the appropriate command from the list of command to the correct location or locations in the work area.) Select and Place: Correct Answer:

A. Upgrade the computer to Windows 7 Enterprise.

You have a computer that runs windows 7 professional. A removable drive is attached to the computer. You need to protect data on the removable drive by using Bitlocker To Go. What should you do first? A. Upgrade the computer to Windows 7 Enterprise. B. Install all Windows Updates for Windows 7 Professional. C. Issue a digital certificate for the Encryption File System (EFS). D. Select the Encrypt contents to secure data checkbox from the properties on the removable drive.

QUESTION 80 make chart C. Create a mount point.

You have a computer that runs windows 7. The computer is configured as shown in the following table: You plan to install a new application that requires 40 GB of space. The application will be installed to C:\app1. You need to provide 40 GB of free space for the application. What should you do? A. Create a shortcut. B. Create hard link. C. Create a mount point. D. Change the quota settings.

B. In windows update, examine the update history.

You have a computer that runs windows 7. You configure the computer to automatically install all updates. You need to verify whether a specific update is installed. What should you do? A. In event viewer, examine the application log. B. In windows update, examine the update history. C. At the command prompt, run Wusa.exe and specify the /kb parameter. D. At the command prompt, run Verifier.exe and specify the /query parameter.

A. From Disk Management, select Attach VHD.

You have a computer that runs windows 7. You have a system image of the computer. You need to restore a single file from the system image. You must achieve the goal using minimum administrative effort. What should you do? A. From Disk Management, select Attach VHD. B. From the Backup and Restore, select Restore my files. C. Restart the computer and run system restore. D. Restart the computer and run system image recovery.

B. From Application Control Policies, configure a publisher rule.

You have a computer that runs windows 7. You have a third party application. You need to ensure that only a specific version of the application runs on the computer. You have the application vendor's digital signature. What should you do? A. From Application Control Policies, configure a path rule. B. From Application Control Policies, configure a publisher rule. C. From Software Restriction policies, configure a path rule. D. From Software Restriction policies, configure a certificate rule.

A. Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst.

You have a computer that runs windows 7. You have an application installation package named app1.msi. You need to perform a customized installation of app1.msi. What should you do? A. Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst. B. Create a transform file named app1.mst and then run Msinfo.exe /I app1.msi /t. C. Create a transform file named app1.msp and then run Msiexec.exe /I app1.msi /app1. D. Create a transform file named app1.msp and then run Msinfo32.exe /I app1.msi /.

C. Start Windows Notepad by using elevated privileges.

You have a computer that runs windows 7. You log on to the computer by using a user account that is a member of Administrator Group. From Windows Explorer you open C:\windows\system32\drivers\etc\hosts in notepad. You attempt to save the file and receive the save as dialog box. You need to ensure that you can save changes to c:\windows\system32\drivers\. What should you do? A. Stop the windows search service. B. Remove the inherited permissions from the file. C. Start Windows Notepad by using elevated privileges. D. Change the user account control (UAS) settings to Notify Me Only when programs try to make changes to my computer.

D. From power options, change the current power plan settings.

You have a computer that runs windows 7. You need to configure the monitor on the computer to turn off after 30 minutes of inactive. What should you do? A. From personalization, change the theme. B. From display, change display settings. C. From action center, change the Action Center settings. D. From power options, change the current power plan settings.

D. Install windows Vista Service pack 2 (SP2).

You have a computer that runs windows vista. The computer has one partition and 1 GB of RAM. You need to upgrade the computer to windows 7. What should you do? A. Add 1 GB of RAM. B. Create a second partition. C. Disable User Account Control (UAC). D. Install windows Vista Service pack 2 (SP2).

B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe.

You have a custom image of Windows 7. You discover that the boot configuration data store in the custom image is corrupted. You need to create a new configuration data store within the custom image. What should you do? A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe. B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe. C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set. D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog.

A. From Microsoft Deployment Toolkit (MDT), create a custom task sequence and run the New Media Wizard.

You have a custom image of Windows 7. You plan to deploy the image to computers that are not connected to the corporate network. You need to ensure that a custom application is automatically installed after the image is deployed. What should you do? A. From Microsoft Deployment Toolkit (MDT), create a custom task sequence and run the New Media Wizard. B. From Windows System Image Manager (Windows SIM), open the image and add the applications to Pass 1 windowsPE. C. Create a Group Policy object (GPO) and add a new software installation package. D. Run Dism.exe and specify the /mount-WIM parameter. Add the application installation files to the image. Modify the winrm.cmd file.

A. Dism.exe

You have a customized image of Windows 7 Professional. You mount the image and modify the contents of the image. You need to restore the image to its original state. Which tool should you use? A. Dism.exe B. Ocsetup.exe C. Pkgmgr.exe D. Sysprep.exe

D. From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM).

You have a customized image of Windows 7 Professional. You need to create a new unattended file to automate the deployment of the image. You must achieve this goal by using the minimum amount of administrative effort. What should you do first? A. Run Imagex.exe and specify the /mount parameter. B. Run Dism.exe and specify the /mount-WIM parameter. C. From Microsoft Deployment Toolkit (MDT), add the custom Windows image (WIM). D. From Windows System Image Manager (Windows SIM), open the custom Windows image (WIM).

C. bcdedit.exe

You have a dual boot PC running both Vista and Windows 7 on partitions on the computer. Which file would you edit to force the PC to book Vista by default? A. boot.ini B. ntfsboot.cfg C. bcdedit.exe D. system.cfg

A. Attach an external hard disk.

You have a netbook computer that runs Windows 7. The computer has a single 30 GB partition that has 10 GB of free space. You need to create a system image of the computer by using Windows Backup. You must achieve this goal by using the minimum amount of time. What should you do first? A. Attach an external hard disk. B. Attach an external DVD burner. C. Convert the local hard disk to a GPT disk. D. Create and attach a virtual hard drive (VHD).

A. Diskpart.exe and Bcdboot.exe

You have a new computer that does not have an operating system installed. You have a virtual hard disk (VHD) that contains an installation of Windows 7. You start the computer from the Windows Preinstallation Environment (Windows PE). You create a partition on the computer and copy the VHD to the partition. You need to configure the computer to start from the VHD. Which tools should you use? A. Diskpart.exe and Bcdboot.exe B. Imagex.exe and Bcdedit.exe C. Scanstate.exe and Loadstate.exe D. Wpeutil.exe and Dism.exe

C. On Computer2, modify the properties of Share1.

You have a portable computer named Computer1 and a desktop computer named Computer2. Both computers run windows 7. On computer2, you create a share named Share1 by using Advanced Sharing feature. You need to ensure that when you connect to Share1 from Computer1, the files that you open are automatically cached. What should you do? A. On Computer1, modify the Offline Files settings. B. On Computer1, modify the User Profile settings. C. On Computer2, modify the properties of Share1. D. On Computer2, modify the file sharing connection settings for the HomeGroup.

C. From Windows Explorer, select the file and then view the toolbar.

You have a portable computer that runs Windows 7. The computer is configured to keep an offline version of files located in a network share. You need to identify whether you are working on an offline version of a file. What should you do? A. From Sync Center, click View sync partnerships. B. From Action Center, click View archived messages. C. From Windows Explorer, select the file and then view the toolbar. D. From Windows Mobile Device Center, click the Connection settings.

D. From the local computer policy, modify the local security policy.

You have a portable computer that runs Windows 7. The computer is joined to a domain. Multiple users log on to the computer. You need to prevent the computer from displaying the username of the last user who logged on. What should you do? A. From Control Panel, modify the User Profiles settings. B. From Control Panel, modify the Personalization settings. C. From the local computer policy, add a policy template. D. From the local computer policy, modify the local security policy.

B. From Task Scheduler, modify the Automatic Backup task.

You have a portable computer that runs Windows 7. Windows Backup is configured to run every day at 15:00. You need to prevent backups from automatically running when the computer is running on the battery. What should you do? A. From Backup and Restore, click Change settings. B. From Task Scheduler, modify the Automatic Backup task. C. From Power Options, modify the settings of the current power plan. D. From the local computer policy, modify the power management settings.

A. At a command prompt, run Powercfg energy.

You have a portable computer that runs Windows 7. You configure the computer to enter sleep mode after 10 minutes of inactivity. You do not use the computer for 15 minutes and discover that the computer has not entered sleep mode. You need to identify what is preventing the computer from entering sleep mode. What should you do? A. At a command prompt, run Powercfg energy. B. At a command prompt, run Systeminfo /s localhost. C. From Performance Monitor, review the System Summary. D. From Performance Information and Tools, review the detailed performance and system information.

B. AAAA

Your network consists of an Active Directory domain named contoso.com. You have a computer named computer1.contoso.com. Your network is configured to use only IPv6. You need to request that a DNS record be created to enable users to connect to your computer by using the name dev.contoso.com. Which type of record should you request? A. A B. AAAA C. HINFO D. NAPTR

B. Create a new local Group Policy object (GPO) linked to the User1 account. From User Configuration, set Prohibit Access to Control Panel to Enabled.

You have a public computer that runs Windows 7. On the computer, you create two user accounts named Admin1 and User1. Admin1 is a member of the Administrators group and User1 is a member of the Users group. You need to configure the computer to meet the following requirements: - Allow Admin1 full access to Control Panel. - Prevent User1 from accessing Control Panel. What should you do? A. Create a new local Group Policy object (GPO) linked to the Admin1 account. From User Configuration set Prohibit Access to Control Panel to Disabled. B. Create a new local Group Policy object (GPO) linked to the User1 account. From User Configuration, set Prohibit Access to Control Panel to Enabled. C. From Local Security Policy, set System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Enabled and set User Account Control: Admin Approval Mode for the Built-in Administrator account to Disabled. D. From Local Security Policy, set System objects: Strengthen default permissions of internal system objects (e.g., Symbolic Links) to Disabled and set User Account Control: Admin Approval Mode for the Builtin Administrator account to Enabled.

B. Run the System Preparation tool.

You have a reference computer that runs Windows 7. You plan to create an image of the computer and then deploy the image to 100 computers. You need to prepare the reference computer for imaging. What should you do before you create the image? A. Run Package Manager. B. Run the System Preparation tool. C. Install the User State Migration Tool. D. Install Windows Automated Installation Kit.

D. Sysprep.exe /generalize /oobe /unattend:answer.xml.

You have a reference computer that runs Windows 7. You plan to deploy an image of the computer. You create an answer file named answer.xml. You need to ensure that the installation applies the answer file after you deploy the image. Which command should you run before you capture the image? A. Imagex.exe /append answer.xml /check. B. Imagex.exe /mount answer.xml /verify. C. Sysprep.exe /reboot /audit /unattend:answer.xml. D. Sysprep.exe /generalize /oobe /unattend:answer.xml.

QUESTION 31 D. From Application Control Policies, create an executable rule.

You have a stand-alone computer named Computer1 that runs Windows 7. Several users share Computer1. You need to prevent all users who are members of a group named Group1 from running Windows Media Player. All other users must be allowed to run Windows Media Player. You must achieve this goal by using the least amount of administrative effort. What should you do? A. From Software Restriction Policies, create a path rule. B. From Software Restriction Policies, create a hash rule. C. From Application Control Policies, create the default rules. D. From Application Control Policies, create an executable rule.

QUESTION 227 see exhibit B. From the local Group Policy, modify the Windows Update settings.

You have a stand-alone computer that runs Windows 7. You open Windows Update as shown in the exhibit. You need to ensure that you can manually change the Windows Update settings on the computer. What should you do? Windows Update: Windows Update: A. Log on to Windows 7 as member of the Administrators group. B. From the local Group Policy, modify the Windows Update settings. C. Right-click Windows Update and select Run as administrator. D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe.

C. Run Cipher.exe /r and then add a data recovery agent from the local security policy.

You have a standalone computer that runs Windows 7. Multiple users share the computer. You need to ensure that you can read the content of all encrypted files on the computer. What should you do? A. Run the Certificates Enrollment wizard and then run Certutil.exe -importpfx. B. Run the Certificates Enrollment wizard and then run Certutil.exe -installcert. C. Run Cipher.exe /r and then add a data recovery agent from the local security policy. D. Run Cipher.exe /rekey and then import a security template from the local security policy.

D. From the local computer policy, modify the Microsoft Management Console (MMC) settings.

You have a standalone computer that runs Windows 7. You need to prevent non-administrative users from using Device Manager. Users must be able to access Event Viewer. What should you do? A. From Control Panel, modify the default settings for media and devices. B. From Control Panel, modify the default settings for device installation. C. From the local computer policy, modify the application control policies. D. From the local computer policy, modify the Microsoft Management Console (MMC) settings.

QUESTION 420 make chart

You have a user that has access to the applications folder on your network server. This user belongs to the following groups: When this user logs into the applications folder from their Windows 7 machine, what are their effective permissions? A. Full Control B. Read only C. Change D. Read and Write Correct Answer: C

A. From Disk Management, attach the VHD as read-only.

You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD. What should you do? A. From Disk Management, attach the VHD as read-only. B. From Disk Management, convert the VHD to a GPT disk. C. From Windows Explorer, modify the permissions of the VHD file. D. From Windows Explorer, modify the read-only attribute of the VHD file.

C. WPA2-Enterprise

You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. A pre- shared key is not configured on the wireless access point. You need to connect a computer that runs Windows 7 to the wireless access point. Which security setting should you select for the wireless connection? A. 802.1x B. WPA-Personal C. WPA2-Enterprise D. WPA2-Personal

B. Create a HomeGroup. C. Move the files to a Media Library.

You have a workgroup that contains five computers. The computers run Windows 7. A computer named Computer1 has video and audio files. You need to share Computer1's video and audio files on the network. Which two actions should you perform? (Each correct answer presents part of the solution. (Choose two.) A. Connect a removable drive and enable BitLocker To Go. B. Create a HomeGroup. C. Move the files to a Media Library. D. Enable all BranchCache rules in Windows Firewall.

C. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.

You have an answer file for a Windows 7 installation. You need to perform an unattended installation of Windows 7 by using the answer file. What should you do? A. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD. B. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE). C. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD. D. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).

D. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /apply-unattend parameter.

You have an offline virtual hard disk (VHD) that contains a generalized installation of Windows 7 Ultimate. You need to disable the built-in games in the VHD. You must achieve this goal by using the minimum amount of administrative effort. What should you do? A. Start a computer from the VHD. Run Ocsetup.exe and specify the /uninstall parameter. Recapture the VHD. B. Start a computer from the VHD. From Programs and Features, turn off the Games feature and then recapture the VHD. C. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Pkgmgr.exe and specify the /uu parameter. D. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /apply-unattend parameter.

B. From a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /setedition parameter.

You have an offline virtual hard disk (VHD) that contains an installation of Windows 7 Home Premium. You need to upgrade the installation to Windows 7 Ultimate by using the minimum amount of administrative effort. What should you do? A. From a computer that runs Windows 7, attach the VHD. Run Imagex.exe and specify the /apply parameter. B. From a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /setedition parameter. C. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Dism.exe and specify the /image parameter. D. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Imagex.exe and specify the /capture parameter.

A. The second internal hard disk B. The external hard disk E. The network share

You have recently installed Windows 7 Ultimate on a laptop computer, installed applications such as Office, and downloaded and installed all outstanding updates. The computer has two internal hard disks, both formatted with the NTFS file system. You also have an external USB hard disk that you have plugged into the laptop. You used the convert fs/ntfs command to convert the external hard drive to the NTFS file system. You have an 8 GB USB flash memory device and the laptop contains a DVD-ROM writer. In your workplace, you can plug in to the corporate network and connect to a network share on a file server running Windows Server 2008 R2. On what devices can you create a full System Image backup of the laptop's system volume? (Choose all that apply.) A. The second internal hard disk B. The external hard disk C. The USB flash drive D. Multiple DVD-ROMs E. The network share

A. On Computer2, run Winrs and then run Diskpart.

You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of an Active Directory domain. Windows Remote Management (WinRM) is enabled on both computers. You need to remotely create additional disk volumes on Computer1 from Computer2. What should you do? A. On Computer2, run Winrs and then run Diskpart. B. On Computer2, run Winrs and then run Diskmgmt.msc. C. On Computer1, install the Telnet Client and then run Diskpart from Computer2. D. On Computer1, install the Telnet Client and then use Disk Management from Computer2.

A. Enable all user accounts.

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 has two local user accounts named User1 and User2. On Computer1, you run Scanstate.exe /all \\server1\data\computer1. On Computer2, you run Loadstate.exe /lac:Pa$$w0rd \\server1\data\computer1. You need to ensure that User1 and User2 can log on to Computer2. What should you do on Computer2? A. Enable all user accounts. B. Modify the default password policy. C. Modify the Allow log on locally user right. D. Add User1 and User2 to the local Administrators group.

A. At the command prompt, run Winrs -r:computer2 query.

You have two computers named Computer1 and Computer2 that run Windows 7. Computer1 is used to remotely manage Computer2. From Computer1, you need to verify that the Windows Remote Management (WinRM) service started on Computer2. What should you do? A. At the command prompt, run Winrs -r:computer2 query. B. At the command prompt, run Winrm id -remote:computer2. C. From Windows Powershell, run Get -PSSession Computer2. D. From Windows Powershell, run Get -PSSessionConfiguration Computer2.

QUESTION 180 see exhibit B. On both computers, set the default gateway to 192.168.0.254.

You have two computers named Computer1 and Computer2 that run Windows 7. The network is configured as shown in the exhibit. You need to ensure that both computers can connect to the Internet. What should you do? A. On both computers, set the subnet mask to 255.255.255.255. B. On both computers, set the default gateway to 192.168.0.254. C. On both computers, set the default gateway to 131.107.0.254. D. On the internal interface of the firewall and on both computers, set the subnet mask to 255.255.0.0.

B. From Windows Firewall with Advanced Security, select Export Policy.

You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that Computer2 has exactly the same firewall rules as Computer1. What should you do on Computer1? A. Run Winrm.exe quickconfig. B. From Windows Firewall with Advanced Security, select Export Policy. C. From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List. D. Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.

B. Run Winrm quickconfig on Computer2.

You have two computers named Computer1 and Computer2 that run Windows 7. You need to ensure that you can remotely execute commands on Computer2 from Computer1. What should you do? A. Run Winrm quickconfig on Computer1. B. Run Winrm quickconfig on Computer2. C. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer1. D. Enable Windows Remote Management (WinRM) through Windows Firewall on Computer2.

C. From the Remote Desktop Connection options, modify the Performance setting.

You have two computers named Computer1 and Computer2 that run Windows 7. You use Remote Desktop to connect from Computer1 to Computer2. You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2. What should you do on Computer1? A. From the Personalization options, change the theme. B. From the System properties, modify the Remote settings. C. From the Remote Desktop Connection options, modify the Performance setting. D. From the Remote Desktop Connection options, modify the Display configuration settings.

B. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml.

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. Computer1 has a custom application installed. You create a custom XML file named app1.xml that contains the migration settings for the application. You need to migrate the configuration and application data for the custom application from Computer1 to Computer2. What should you do? A. On Computer1, run Loadstate.exe /l:app1. On Computer2, run Scanstate.exe /l:app1.xml. B. On Computer1, run Scanstate.exe /i:app1.xml. On Computer2, run Loadstate.exe /i:app1.xml. C. On Computer1, run Loadstate.exe /keyfile:app1.xml. On Computer2, run Loadstate.exe /keyfile:app1. xml. D. On Computer1, run Scanstate.exe /genconfig:app1.xml. On Computer2, run Loadstate.exe /config:app1.xml.

B. Add the /efs:copyraw switch to the Scanstate command.

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. You attempt to migrate the user profiles and data from Computer1 to Computer2 by using User State Migration Tool (USMT) 4.0. During the migration, you receive the following error message: "Gather was aborted because of an EFS file." You need to ensure that you can successfully migrate the user state from Computer 1 to Computer 2. What should you do? A. Add the /efs:copyraw switch to the Loadstate command. B. Add the /efs:copyraw switch to the Scanstate command. C. Generate a new Encrypting File System (EFS) certificate on Computer2. D. Export the Encrypting File System (EFS) certificate from Computer1 and import the certificate to Computer2.

A. config.xml

You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7. You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2. You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort. Which file should you modify? A. config.xml B. migapp.xml C. migdocs.xml D. miguser.xml

A. Install Office.

You have two computers named Computer1 and Computer2. You migrate user state data from Computer1 to Computer2. The migrated data contains several Microsoft Office Excel files. You need to ensure that you can open the Excel files by using Excel on Computer2. What should you do? A. Install Office. B. Disable User Account Control (UAC). C. Modify the default program settings. D. Run Loadstate.exe /i:migapp.xml.

A. On Workstation1, Open Remote Desktop Connection and configure the Local devices and resources settings.

You have two computers named Workstation1 and Workstation2 that have Windows 7 SP1 installed. You connect to Workstation2 from Workstation1 by using Remote Desktop. You need to be able to copy files between the computer during Remote Desktop session. What should you do? A. On Workstation1, Open Remote Desktop Connection and configure the Local devices and resources settings. B. On Workstation1, open Remote Desktop connection and configure the Connect from Anywhere settings. C. On Workstation2, type MSTSC /v:Computer1 /f /console. D. On Workstation2, open Remote Desktop Connection and configure the Local devices and resources settings.

B. Set the network location to Home network.

You have two computers that run Windows 7. Both computers are connected to a network and have IP addresses within the 172.16.10.0/24 subnet. You need to ensure that both computers can join a HomeGroup. What should you do? A. Enable network discovery. B. Set the network location to Home network. C. Configure Windows Firewall to allow the Netlogon service. D. Change the IP addresses to be within the 192.168.1.0/24 subnet.

D. From the wireless network properties of Network1, copy the network profile to a USB flash drive.

You have two portable computers named Computer1 and Computer2 that run Windows 7. You configure Computer1 to connect to a wireless network named Network1. You need to configure Computer2 to connect to Network1 by using the same settings as Computer1. What should you do on Computer1? A. At the command prompt, run Wecutil.exe Ces Cgr. B. At the command prompt, run Winrs.exe -environment. C. From Windows Firewall with Advanced Security, export the policy. D. From the wireless network properties of Network1, copy the network profile to a USB flash drive.

QUESTION 215 see exhibit

You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue? (To answer, select the appropriate setting in the work area.) Hot Area: Correct Answer:

B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel. C. Review the informational events from Reliability Monitor.

You manage a computer that runs Windows 7. You are tasked to identify which applications were installed during the last week. What Windows component would you use to find this information? (Choose two.) A. Check the Windows System Change Log in the Control Panel. B. View the events in the Applications Log under Windows Logs in the System and Security component section of the Control Panel. C. Review the informational events from Reliability Monitor. D. Check the Windows System Diagnostics Report under the Performance Monitor MMC.

QUESTION 228 see exhibit B. User02 should be instructed to log on to the computer and encrypt a file.

You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User01 uses Encrypting File System (EFS) to encrypt a file. User01 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. What action should you perform to make sure of this? A. User02 should be instructed to log on to the computer and take ownership of the file. B. User02 should be instructed to log on to the computer and encrypt a file. C. User1 should be instructed to export his certificate to a certificate (.cer) file. D. User01 should be instructed to move the file to a shared folder on the computer.

B. Right-click Device Manager and select Run as administrator.

You manage several computers that run Windows 7. A user wants to roll back a driver. The user opens the device properties in Device Manager and discovers that the Roll Back Driver option is unavailable. You connect to the computer by using Windows Remote Assistance. You need to roll back the driver to its previous version. What should you do first? A. Add the user to the Power Users group. B. Right-click Device Manager and select Run as administrator. C. From System Properties, modify Device Installation Settings. D. From the Local Group Policy, modify Device Installation Restrictions.

A. Run Cipher.exe /x.

You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in the minimum amount of time. What should you do? A. Run Cipher.exe /x. B. Run Ntbackup.exe /p. C. From Backup and Restore, click Back up now. D. From Backup and Restore, click Create a system image.

D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.

You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do? A. From Network and Sharing Center, click Connect to a network. B. From Network and Sharing Center, click Set up a new connection or network. C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule. D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.

D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace.

You need to create a VPN connection. What should you do? A. From Windows Explorer, right-click Computer and then click Map network drive. B. From Windows Explorer, right-click Computer and then click Add a network location. C. From Network and Sharing Center, click Set up a new connection or network and then click Set up a new network. D. From Network and Sharing Center, click Set up a new connection or network and then click Connect to a workplace.

C. Fixed-size disk

You need to create a virtual hard disk (VHD) file that will be used to deploy Windows 7. The solution must minimize the performance impact caused by using a VHD. Which type of VHD should you create? A. Differencing disk B. Dynamically expanding disk C. Fixed-size disk D. Snapshot

A. From Default Programs, modify the AutoPlay settings.

You need to ensure that when you insert a blank DVD into the DVD drive, Windows Explorer opens automatically and enables you to select files to burn to DVD. What should you do? A. From Default Programs, modify the AutoPlay settings. B. From Default Programs, modify the default program settings. C. From Device Manager, modify the properties of the DVD drive. D. From System Configuration Utility, modify the Startup settings.

C. From the Action Center, under Maintenance. Click View reliability history.

You need to identify the hardware failures have occurred on your computer in the past six months. What should you do? A. From the Control Panel, open Performance Information and Tools. B. From the Control Panel, open Troubleshooting. C. From the Action Center, under Maintenance. Click View reliability history. D. From the Action Center, open Recovery.

B. Open Reliability Monitor.

You need to identify the hardware failures that have occurred on your computer in the past six months. What should you do? A. Open Device Manager. B. Open Reliability Monitor. C. Create a User Defined Data Collector Set. D. Create a new Event Trace Sessions Data Collector Set.

C. From System, modify the Advanced system settings.

You need to increase the size of a paging file. What should you do? A. From Disk Management, shrink the boot partition. B. From Disk Management, shrink the system partition. C. From System, modify the Advanced system settings. D. From System, modify the System protection settings.

C. Create an empty folder on a NTFS partition.

You need to modify the contents of an image that is contained in a Windows image (WIM) file. What should you do first? A. Run Diskpart /s. B. Run Peimg.exe /import. C. Create an empty folder on a NTFS partition. D. Create and attach a virtual hard disk (VHD).

D. From Windows Firewall with Advanced Security, create an outbound rule.

You need to prevent a custom application from connecting to the Internet. What should you do? A. From Windows Firewall, add a program. B. From Windows Defender, modify the Allowed items list. C. From Windows Firewall with Advanced Security, create an inbound rule. D. From Windows Firewall with Advanced Security, create an outbound rule.

D. From the Start menu, open Windows Remote Assistance.

You need to provide an administrator the ability to view and interact with your current logon session. What should you do? A. At the command prompt, run Psr.exe. B. At the command prompt, run Winrm.exe quickconfig. C. From the Start menu, open Remote Desktop Connection. D. From the Start menu, open Windows Remote Assistance.

A. Run Disk Cleanup.

You need to reduce the amount of space currently being used to store system restore points. What should you do? A. Run Disk Cleanup. B. Run Msconfig.exe. C. Configure disk quotas. D. Configure Windows Backup.

B. Programs and Features

You need to uninstall a Windows update from a computer that runs Windows 7. Which Control Panel item should you use? A. Administrative Tools B. Programs and Features C. Sync Center D. Troubleshooting

A. Enable hardware-assisted virtualization.

You perform a clean installation of Windows 7 on a computer. You need to ensure that you can run Windows XP Mode in Windows 7. What should you do? A. Enable hardware-assisted virtualization. B. Create a Data Execution Prevention (DEP) exception. C. Install Windows XP in the same partition as Windows 7. D. Install Windows XP in a different partition than Windows 7.

B. Dism.exe

You plan to capture a Windows 7 image by using the Windows Preinstallation Environment (Windows PE). You need to ensure that Windows PE supports the Windows Scripting Host (WSH). Which tool should you use? A. Bcdedit.exe B. Dism.exe C. Imagex.exe D. Oscdimg.exe

B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD.

You plan to deploy Windows 7 by using a virtual hard disk (VHD). You need to ensure that when a computer starts from the VHD, the Windows 7 installation programs will run the out-of-boxexperience (OOBE) portion of the setup. What should you do? A. Copy install.wim from the Windows 7 installation media to the VHD. B. Use ImageX to apply install.wim from the Windows 7 installation media to the VHD. C. Start the computer by using the Windows 7 installation media and then select Install now. D. Start the computer by using the Windows Preinstallation Environment (Windows PE) and then run Diskprep.exe.

A. Imagex.exe

You plan to deploy Windows 7 images. You need ensure that you can deploy images by using the Windows Preinstallation Environment (Windows PE). What should you do add to the Windows PE image? A. Imagex.exe B. Loadstate.exe C. Mighost.exe D. Usmtutils.exe

B. At the command prompt, run the Sysprep command.

You plan to deploy Windows 7 to 100 computers on your corporate network. You install Windows 7 on a computer. You and need to prepare the computer to be imaged. What should you do before you create the image of the computer? A. At the command prompt, run the Dism command. B. At the command prompt, run the Sysprep command. C. Start the computer from the Windows Preinstallation Environment (Windows PE) and then run the Imagex command. D. Start the computer from the Windows Preinstallation Environment (Windows PE) and then run the Wpeutil command.

D. Create an answer file named autounattend.xml. Place the file on a removable drive.

You plan to install Windows 7 by using a Windows 7 DVD. You need to perform an automated installation of Windows 7. What should you do? A. Create an answer file named oobe.xml. Copy the file to a network share. B. Create an answer file named winnt.sif. Place the file on a removable drive. C. Create an answer file named sysprep.inf. Copy the file to a network share. D. Create an answer file named autounattend.xml. Place the file on a removable drive.

C. Start the computer from the Windows installation media. From the Install Windows dialog box, click Load Driver.

You plan to install Windows 7 on a computer that contains a single hard disk drive. The hard disk drive is connected to a RAID controller. During the installation, you discover that the Windows 7 installation media does not include the files required to install the RAID controller. You need ensure that you can install Windows 7 on the hard disk drive. What should you do? A. Insert the Windows installation media and press remove some files during the computer's power-on self test (POST). B. Insert the Windows installation media and press F6 during the computer's power-on self test (POST). C. Start the computer from the Windows installation media. From the Install Windows dialog box, click Load Driver. D. Start the computer from the Windows installation media. From the Install Windows dialog box, click Drive options (advanced).

D. Ultimate

You plan to install Windows 7 on a new notebook computer. The computer will be used by users who speak English, French, and German. You need to select an edition of Windows 7 that enables the users to switch between different graphical user interface (GUI) languages. The solution must minimize costs. Which edition should you choose? A. Home Premium B. Professional C. Starter D. Ultimate

C. Create a RAID-1 volume.

You require fault tolerance for your operating system so that your computer running Windows 7 Home Premium can still boot up if a disk fails. You have two disks and unallocated space on your second disk. What do you do? A. Create a VHD and install an image of your computer on the VHD. Use BCDEdit to make the VHD bootable.256. B. Create a RAID-0 volume. C. Create a RAID-1 volume. D. Create a RAID-5 volume.

B. Run Drvload.exe and specify the device driver path.

You start a computer by using Windows Preinstallation Environment (Windows PE). You need to dynamically load a network adapter device driver in Windows PE. What should you do? A. Run Peimg.exe and specify the device driver path. B. Run Drvload.exe and specify the device driver path. C. Run Winpeshl.exe and specify a custom Winpeshl.ini file. D. Run Wpeutil.exe and specify the InitializeNetwork command.

QUESTION 316 see exhibit

You support Windows 7 client computers used by Marketing department employees. The computers have dual-core CPUs for generating rich media advertisements. The Marketing department employees are reporting CPU performance issues while rendering the rich media advertisements. You need to configure the wmplayer.exe process to use only a single CPU core. What should you do? (To answer, select the appropriate option or options in the answer area.) Hot Area: Correct Answer:

QUESTION 348 see exhibit

You support desktop computers that have Windows 7 Enterprise installed. All computers are configured with system protection on drive C and with a backup task that runs daily at midnight. One of the users reports that in the morning she has installed a new version of a browser. After the installation, a folder that has favorite shortcuts was replaced with new content. You need to restore the most recent version of the folder that contains the user data. What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

D. Assign the Deny log on through Remote Desktop Services user right to User1.

You use a client computer named Accounting that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as Printer1. An Accounting Users group is a member of the local Remote Desktop Users group on the computer. Only the Accounting Users group has access to Printer1. A user named User1 is a member of Accounting Users. You need to configure the computer to meet the following requirements: - Prevent User1 from establishing Remote Desktop sessions to the Accounting computer. - Allow other members of Accounting Users to connect to the Accounting computer by using Remote Desktop. - Ensure that User1 can access Printer1. What should you do? A. Remove the Accounting Users group from the Remote Desktop Users group. B. Remove User' from the Accounting Users group. C. Assign the Deny access to this computer from the network user right to User'. D. Assign the Deny log on through Remote Desktop Services user right to User1.

QUESTION 378 see exhibit

You use a client computer that has Windows 7 Enterprise installed. You need to configure an event subscription that meets the following requirements: - Forwards events securely across the network on port 9999. - Forwards events every 6 hours. What should you do? (To answer, drag and drop the appropriate answer to correct area section.) Select and Place: Correct Answer:

B. On the Boot tab in the msconfig tool, highlight the Windows 7 boot entry and select the Set as default button.

You use a computer that has Windows 7 Enterprise installed. You install Windows Vista Enterprise to a different partition. You discover that the computer boots to Windows Vista by default. You need to ensure that the computer boots to Windows 7 Enterprise by default. What should you do? A. On the General tab in the msconfig tool, select the Selective startup option button, and then select the Use original boot configuration check box. B. On the Boot tab in the msconfig tool, highlight the Windows 7 boot entry and select the Set as default button. C. On the Boot tab in the msconfig tool, highlight the Windows 7 boot entry and select the Advanced options button. D. From an elevated command prompt in Windows Vista, run the bcdedit /default (default) command.

D. From the Advanced Sharing settings of the folder, assign the Read share permission to UserA.

You use a computer that has Windows 7 SP1 installed and has a folder named C:\Data. The active network connection for the computer is configured as Public. You assign UserA to a local group called DataUsers. The group has been granted Read NTFS permissions for the folder. UserA browses to the shared folder across the network and receives the following error message: "Access is Denied." You need to ensure that the user can download files from the shared folder. What should you do? A. Allow file and printer sharing through Windows Firewall. B. Change the network location of the computer from a Public network to a Home or Work network. C. From the Security settings of the C:\Data folder, assign the Full Control NTFS permissions to UserA. D. From the Advanced Sharing settings of the folder, assign the Read share permission to UserA. E. From the Advanced Sharing permissions, enable caching.

QUESTION 385

You use a computer that has Windows 7 SPI installed. The computer has a shared folder named C:\Software. User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder. You need to verify wether User1 can save files to C.\Software. What should you do? A. Download the Sysinternals Suite bundle from the Microsoft site. Run the AccessEnum tool against the C:\Software folder. B. Run the Net Share command. C. Run the Net View command. D. View the Share permissions on C:\Software. Correct Answer: D

QUESTION 402

You use a computer that has Windows 7 and Internet Explorer 8 installed. You need to block all web content providers on the Internet from collecting and sharing your information with other websites. What should you do? A. Enable InPrivate Filtering and select Automatically Block. B. From Internet Options, configure Privacy Settings for third-party cookies. C. Start an InPrivate Browsing session. D. From Manage Add-ons, disable all ActiveX and Java extensions. E. From Internet Options, add the web content provider to Restricted Sites. Correct Answer: A

D. Restart the computer in safe mode.

You use a desktop computer that has Windows 7 SP1 Ultimate installed. You update the driver for the computer's sound card and the computer becomes unresponsive. You need to be able to roll back the sound card driver. What should you do? A. Boot the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image. B. Start the computer, press F8, and then select: Repair Your Computer. C. Start the computer, press F8, and then selec: Debugging Mode. D. Restart the computer in safe mode.

QUESTION 401

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. You need to connect to the projector from your computer. What should you do? A. From PowerShell, run the Net Config command. B. From Display, click Connect to a projector. C. From Accessories, click Connect to a Network Projector. D. Run the Displayswitch.exe command and select Projector only. Correct Answer: C

A. From the command prompt, run the Netproj command.

You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network. You need to connect to the projector from your computer. What should you do? A. From the command prompt, run the Netproj command. B. From Device Manager, click Add Legacy hardware. C. From Display, click Connect to a projector. D. From the Network and Sharing Center, create a temporary network and run Displayswitch.exe.

QUESTION 377 see exhibit

You use a portable computer that has Windows 7 Home Premium installed. The portable computer has a scheduled backup of all libraries to run every day at midnight. Drive C is also configured with system protection. You use an install messaging application that saves chat data to a log file. The log file is stored in My Documents. You install a new version of the application. You discover that the log file has been replaced with an empty file. You need to restore the most recent version of the file that contains data. What should do? (Answer, move the appropriate actions from the last of actions to the answer area and arrange them in the correct order.) Select and Place: Correct Answer:

C. Use System Image Recovery.

You use a portable computer that has Windows 7 SP1 Ultimate installed. As part of a disaster recovery plan, you perform regular data backups and system image backups of the portable computer. The hard disk drive in the computer fails. You replace the hard disk drive and restart the computer using the Windows 7 SPI installation media. You need to recover the computer to its previous state. What should you do? A. Use the command prompt. B. Use Startup Repair. C. Use System Image Recovery. D. Perform a system restore.

D. All your company's client computers

You want to centralize backups by backing up all client computers in your company's production network to a network share on a file server running Windows Server 2008 R2. All your client computers run Windows 7, but because your company has grown through a series of mergers, some run Windows 7 Professional, some run Windows 7 Enterprise, and some run Windows 7 Ultimate. Which computers can you back up to a network share? A. Only the computers running Windows 7 Ultimate B. Only the computers running Windows 7 Enterprise C. Only the computers running either Windows 7 Ultimate or Windows 7 Enterprise D. All your company's client computers

B. create vdisk file=g:\windows7\systemvhd.vhd maximum=20000

You want to create a 20-GB native VHD called Systemvhd in a folder called Windows 7 on an external U hard disk with the drive designation G:. Which command do you use? A. create vdisk file=g:\windows7\systemvhd maximum=20000 B. create vdisk file=g:\windows7\systemvhd.vhd maximum=20000 C. create vdisk file=g:\windows7\systemvhd.vhd maximum=20 D. create vdisk file=g:\windows7\systemvhd maximum=20

C. You should consider installing the MSI package by using the Msiexec command with the /package switch.

You work as the Desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com. You need to create a Windows 7 image that includes the Office 2007. Microsoft Installer Package (MSI) package for the installation. What should you do? A. You should consider installing the MSI package by using the update command with the /slipstream switch. B. You should consider installing the MSI package by using the Msiexec command with the /package /uninstall switches. C. You should consider installing the MSI package by using the Msiexec command with the /package switch. D. You should consider installing the MSI package by using the Install command with the /package switch.

B. You should consider creating more free space on Drive

You work as the desktop support technician at Abc.com. The Abc.com network consists of a single Active Directory domain named Abc.com. All client computers on the Abc.com network run Windows Vista Business. You have been instructed to upgrade a client computer named GB680 to Microsoft Windows 7 Professional. GB680 has the following specifications: - Drive C (system drive) with 12 GB of free space - Drive D (data drive) with 40 GB of free space - Four memory slots with two occupied by 512 MB memory sticks - One 2.0 GHz 32-bit processor You need to ensure that Windows 7 Professional can be installed on GB680. What should you do? A. You should consider installing Windows 7 on Drive D. B. You should consider creating more free space on Drive C. You should consider upgrading the memory. D. You should consider upgrading the processor.

B. You should upgrade the RAM. D. You should upgrade the hard drive.

You work as the desktop support technician. The network consists of a single Active Directory domain named Ensurepass.com. You need to perform a clean installation of Microsoft Windows 7 Professional on the workstations in the Research department. All workstations in the Research department have identical hardware as listed below: - 1.2 GHz Dual-Core processor. - 1024 MB of RAM. - 20 GB hard drive. - DirectX 10 video display card. - Integrated sound card. - 10/100 integrated network adapter. You need to ensure that the workstations are able to support Windows 7 and are able to support Windows XP mode. What should you do? (Each correct answer presents a part of the solution. Choose two.) A. You should upgrade the processor. B. You should upgrade the RAM. C. You should upgrade the video card. D. You should upgrade the hard drive. E. You should upgrade the network adapter.

QUESTION 388

Your Company has an Active Directory domain and several branch locations. A Group Policy Object (GPO) exists for each branch office and for the main office. Computer accounts for computers used by sales employees are located in the Sales-Computers organizational unit (OU). The sales employees use portable computers that have Windows 7 Enterprise installed. Employees report that the documents that must be printed are sent to printers in their home office when they travel to the different branch offices. You need to ensure that documents are printed automatically to the correct printer when the sales employees travel to a branch office. What should you do first? A. Publish all printers to Active Directory. B. From Print Management, select the branch office printer, and select set as default from the Printer menu. C. Link the GPO of the branch offices to the Sales-Computers OU. D. From Devices and Printers, select the Change my default printer when I change networks. E. From the Network and Sharing Center, select Advanced sharing settings, and the select Turn on file and printer sharing. Correct Answer: C

B. From Devices and Printer, configure the Manage Default Printers settings.

Your compagny has a main office and a branch office A portable computer runs Windows 7. On the computer, you configure a printer for each office. You need to configure printing on the computer to meet the following requirements: - When you are located in the main office, all documents must automatically print to the main office printer. - When you are located in the branch office, all documents must automatically print to the branch office printer. What should you do? A. From Location and Other Sensors, configure a default location. B. From Devices and Printer, configure the Manage Default Printers settings. C. From Region and Language, modify the Location settings. D. From Network and sharing Center, configure the network location.

QUESTION 10 see exhibit B. 192.168.2.40

Your company has a main office and a branch office. The relevant portion of the network is configured as shown in the exhibit. In the branch office, you deploy a new computer named Computer1 that runs Windows 7. You need to assign an IP address to Computer1. Which IP address should you use? A. 192.168.2.30 B. 192.168.2.40 C. 192.168.2.63 D. 192.168.2.65

D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter.

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. You have a computer named Computer1 that runs Windows 7. Computer1 is configured to obtain updates from Server1. You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. You need to ensure that Computer1 appears in the WSUS snap-in. What should you do? A. On Server1, open Windows Update then select Check for updates. B. On Server1, run Wsusutil.exe and specify the /import parameter. C. On Computer1, open Windows Update and then select Change settings. D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter.

D. SSTP

Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server. The external firewall has TCP port 80 and TCP port 443 open for remote access connections. You have a home computer that runs Windows 7. You need to establish secure remote access connection from the home computer to the remote access server. Which type of connection should you configure? A. IPSEC B. L2TP C. PPTP D. SSTP

QUESTION 410

Your company has a variety of client computers that are running Windows XP Professional. You want to upgrade these machines to Windows 7 using WDS. What requirement must be met on a client computer to upgrade to Windows 7 from a WDS server? A. The computer must use a PXE-based boot ROM. B. The computer must contain an NTFS partition. C. The computer must use identical hardware configurations as the reference image. D. There is no option to upgrade with WDS. Correct Answer: D

D. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store.

Your company has an internal Web site that requires HTTPS. The Web site's certificate is self-signed. You have a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to the Web site and receive the following warning message. There is a problem with this website's security certificate. You need to prevent the warning message from appearing when you access the Web site. What should you do? A. From Internet Explorer, enable InPrivate Browsing. B. From Internet Explorer, add the Web site to the Trusted sites zone. C. From Certificate Manager, import the Web sites certificate into your Personal store. D. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store.

QUESTION 407

Your company has asked you to implement Network Access Protection(NAP) on the network. You already have Windows Server 2008 installed on your servers but your organization wants to know which client operating systems will support NAP. What operating systems support NAP? (Choose Three.) A. Windows XP with SP2 B. Windows XP with SP3 C. Windows Vista D. Windows 7 Correct Answer: BCD

QUESTION 386 see exhibit

Your company network contains 20 client computers that run Windows 7 Enterprise. The network does not have a DNS server and is using IPv6 only. Users are complaining they are unable to see others's computers on the network. You notice that the settings of the network are configurated as shown in the exhibit. You need to ensure that users can see all computers on the network in Windows Explorer. What should you do on each computer? A. Turn on Public Folder Sharing. B. Run Windows Network Diagnostics. C. From a command promt, run the net view command. D. From a command promt, run the net config command. E. Turn on Network discovery. Correct Answer: E

D. Select the Turn on Bitlocker backup to Active Directory option in local policy on the portable computers.

Your company network has a single-domain Active Directory forest. The forest functional level is set to Windows Server 2008 R2. All computers are members of the domain. You plan to deploy Windows BitLocker Drive Encryption (BitLocker) on portable computers that have Windows 7 Enterprise installed. You need to be able to automatically back up recovery passwords for BitLockerprotected disk volumes on the portable computers. What should you do before you start encrypting the disk volumes with BitLocker? A. Run the cscript Add-TPMSelfWriteACE.vbs script on the poitable computers. B. Run the cscript List-ACEs.vbs script on the portable computers. C. Run the cscript Get-TPMOwnerInfo.vbs script on the client computers. D. Select the Turn on Bitlocker backup to Active Directory option in local policy on the portable computers.

QUESTION 343 see exhibit

Your company network includes a Windows Server 2008 R2 server named Served. You use a client computer named Clientl that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain. You want to automatically forward events from Client1 to Served. You need to configure the required source-Initiated subscription. What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.) Select and Place: Correct Answer:

D. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type.

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. You discover that no events are being collected. You need to ensure that events are forwarded from Client1 to Server1. What should you do? A. On Client1, create an inbound Rule to allow port 5986 for the Public connection type. B. On Server1, create a Windows Event Collector firewall exception for the Domain connection type. C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type. D. On Client1, create an inbound Rule to allow port 5986 for the Domain connection type.

QUESTION 395

Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1. You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. On Client1, you start the Windows Remote Management service. You discover that no events are being collected. You need to ensure that events are forwarded from Client1 to Server1. What should you do? A. On Server1, create a Windows Event Collector firewall exception for the Domain connection type. B. On Client1, create an inbound Rule to allow port 5986 for the Public connection type. C. On Server1, create a Windows Remote Management firewall exception for the Domain connection type. D. On Clien1, create a Windows Remote Management firewall exception for the Domain connection type. Correct Answer: B

D. netstat -an

Your company network includes client computers that have Windows 7 installed. The computers are members of an Active Directory domain and receive Windows Firewall configuration through Group Policy, A user indicates that he is unable to connect to a remote FTP server. You need to view the status of TCP/UDP ports at the user's computer. Which command should you run? A. netstat -o B. nbtstat -a C. ipconfig /all D. netstat -an

C. Change the IP address of the primary DNS to a public DNS.

Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically. The DNS and WINS servers on the company network have been taken offline for upgrades. Users report that they can no longer access the Internet. You need to provide access to the Internet for the computers during the maintenance. What should you do? A. Change the IP address of the primary WINS to a public name server. B. Change the IP address of the default gateway. C. Change the IP address of the primary DNS to a public DNS. D. Change the client IP address and subnet mask.

QUESTION 400

Your company network includes desktop computers that have Windows XP Professional SP1 64-bit installed. The company has purchased new portable computers that have Windows 7 Professional 32-bit installed. You need to be able to migrate user profiles from the desktop computers to the portable computers. What should you do? A. Stop the User Profile Service on the desktop computers. B. Replace all versions of Windows 7 with 64-bit. C. Add each desktop user to the local Administrators on the desktop computers. D. Run scanstate /nocompress on the desktop computers. Correct Answer: B

B. Perform a clean installation over the existing system partition

Your company network includes portables computers that have Windows 7 Ultimate and Windows 7 Professional installed. You want to standardize all portable computers to Windows 7 Professional for Key Management Server (KMS) licensing purpose. You need to install Windows 7 Professional on all Windows 7 Ultimate portable computers. What should you do? A. Launch Windows Update B. Perform a clean installation over the existing system partition C. Perform a clean installation on a non-system partition D. Supply the Windows 7 Professional KMS Key E. Launch Windows Anytime Upgrade

A. From the Windows Deployment Services snap-in, add a new install image.

Your company uses Windows Deployment Services (WDS) to deploy Windows 7. You create a new image of Windows 7. You need to ensure that you can deploy the image by using WDS. What should you do? A. From the Windows Deployment Services snap-in, add a new install image. B. From the Windows Deployment Services snap-in, add a new boot image. C. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot. D. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images.

D. Use the Backup And Restore console to recover the file from a backup set generated six months ago.

Your company's chief accountant consults you with a question about a financial spreadsheet. She needs to recover the version of this particular spreadsheet that existed six months ago because it is needed for a financial audit. Using Restore Previous Versions, you find that the oldest version stored is dated three months ago. How can you recover the required file? A. Edit the System Protection properties for the volume that hosts the file. Use the Max Usage slider to increase the maximum proportion of the hard disk capacity used for system protection to 70 percent. B. Perform a system restore. Select a system restore point that was created six months ago. C. Edit the System Protection properties for the volume that hosts the file. Select the Only Restore Previous Versions Of Files setting. D. Use the Backup And Restore console to recover the file from a backup set generated six months ago.

B. Select Only Restore Previous Versions Of Files. C. Set the Max Usage slider control to 40 percent.

Your computer running Windows 7 Enterprise has two internal hard disks. System protection is configured by default on the C: drive, which holds the operating system and installed applications. The D: drive is a 500 GB hard disk formatted with the NTFS filing system, and you use it to store your personal files. You want to store previous versions going back several months and therefore intend to reserve 200 GB of this disk for system protection. You are not using either of your internal disks for backup; instead, you store your backups on a 1 TB external USB hard disk. How do you configure system protection on your D: drive? (Choose all that apply; each answer forms a part of the complete solution.) A. Select Restore System Settings And Previous Versions Of Files. B. Select Only Restore Previous Versions Of Files. C. Set the Max Usage slider control to 40 percent. D. Set the Max Usage slider control to 4 percent.

C. Create a Remote Desktop Connection and modify the Connect from anywhere settings.

Your corporate network contains a Remote Desktop Gateway (RD Gateway) server named Server1 and a Remote Desktop Session Host (RD Session Host) server named Server2. You have a computer named Computer1 that runs Windows 7. You use Computer1 from home. You need to access Server2 from Computer1. What should you do? A. Run Mstsc.exe /admin /v:server2:443. B. Run Mstsc.exe /console /v:server2:8080. C. Create a Remote Desktop Connection and modify the Connect from anywhere settings. D. Create a Remote Desktop Connection and modify the Server authentication settings.

A. Edit the hosts file.

Your network consists of a single Active Directory domain named contoso.com. You have a server named Server1 that runs a custom network application. Server1 has the following IP addresses: - 192.168.15.10 - 192.168.15.11 You need to ensure that a client computer resolves server1.contoso.com to only the 192.168.15.11 IP address. What should you do from the computer? A. Edit the hosts file. B. Edit the lmhosts file. C. Run Ipconfig.exe /flushdns. D. Run Netsh interface ipv4 reset.

A. On one computer, install Windows 7 and the corporate applications.

Your network consists of a single Active Directory forest. You have 50 portable computers and 50 desktop computers. All computers have 32-bit hardware. You plan to deploy Windows 7 and 10 corporate applications to the computers by using a custom image. You need to prepare for the deployment by using the minimum amount of administrative effort. What should you do first? A. On one computer, install Windows 7 and the corporate applications. B. On one portable computer and one desktop computer, install Windows 7 and the corporate applications. C. On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit. D. On a server, install the Windows Automated Installation Kit (AIK) and run Windows System Image Manager (Windows SIM).

C. Configure a static TCP/IP address.

Your network consists of a single IPv4 subnet. The subnet contains 20 computers that run Windows 7. You add a new computer named Computer1 to the subnet. You discover that Computer1 has an IP address of 169.254.34.12. You cannot connect to other computers on the network. Other computers on the network can connect to each other. You need to ensure that you can connect to all computers on the network. What should you do? A. Turn off Windows Firewall. B. Run Ipconfig.exe /renew. C. Configure a static TCP/IP address. D. Run Netsh.exe interface ipv4 install.

D. Msiexec.exe /i \\server1\share1\app1.msi /quiet

Your network consists of an Active Directory domain and 100 computers that run Windows 7. The domain contains a logon script named logon.cmd. You plan to deploy a new application named app1.msi by using the logon script. App1.msi is stored in \\server1\share1. You need to modify the logon script to deploy the application. What should you include in the logon script? A. Sbdinst.exe -u \\server1\share1\app1.msi -q B. Msinfo32.exe \\server1\share1\app1.msi C. Pkgmgr.exe /ip /m:\\server1\share1\app1.msi D. Msiexec.exe /i \\server1\share1\app1.msi /quiet

B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate.

Your network consists of one Active Directory domain. You have two computers named Computer1 and Computer2 that run Windows 7. Both computers are members of the domain. From Computer1, you can recover all Encrypting File System (EFS) encrypted files for users in the domain. You need to ensure that you can recover all EFS encrypted files from Computer2. What should you do? A. On Computer1, back up %systemroot%\DigitalLocker. On Computer2, restore %systemroot%\DigitalLocker. B. On Computer1, export the data recovery agent certificate. On Computer2, import the data recovery agent certificate. C. On Computer1, run Secedit.exe and specify the /export parameter. On Computer2, run Secedit.exe and specify the /import parameter. D. On Computer1, run Cipher.exe and specify the /removeuser parameter. On Computer2, run Cipher.exe and specify the /adduser parameter.

A. Microsoft Application Compatibility Toolkit (ACT)

Your network contains 100 computers that run Windows XP. You need to identify which applications installed on all of the computers can run on Windows 7. You must achieve this goal by using the minimum amount of administrative effort. What should you install? A. Microsoft Application Compatibility Toolkit (ACT) B. Microsoft Assessment and Planning (MAP) Toolkit C. Microsoft Deployment Toolkit (MDT) D. Windows Automated Installation Kit (AIK)

B. Import the root certificate to the computer's Trusted Root Certification Authorities store.

Your network contains a Network Policy and Access Services server named Server1. All certificates in the organization are issued by an enterprise certification authority (CA) named Server2. You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP. You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider." You need to ensure that you can successfully establish the VPN connection to Server1. What should you do on Computer1? A. Import the root certificate to the user s Trusted Publishers store. B. Import the root certificate to the computer's Trusted Root Certification Authorities store. C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store. D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.

D. Modify the Windows Internet Explorer AutoComplete settings.

Your network contains a public computer that runs Windows 7. Multiple users log on to the computer by using a local user account named User1. Users report that they can log on to some secure Web sites by using credentials that were saved by other users. You need to prevent forms based credentials from being saved on the computer. What should you do? A. Remove all generic credentials from Windows Vault. B. Remove all Windows credentials from Windows Vault. C. Modify the Windows Internet Explorer certificates settings. D. Modify the Windows Internet Explorer AutoComplete settings.

D. From Network and Sharing Center, modify the wireless network connection settings.

Your network contains a wireless access point. You have a computer that runs Windows 7. The computer connects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wireless access point. You discover that you are now unable to connect to the wireless access point from the Windows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do? A. From Credential Manager, modify the generic credentials. B. From Credential Manager, modify the Windows credentials. C. From Network and Sharing Center, turn on Network discovery. D. From Network and Sharing Center, modify the wireless network connection settings.

B. On Computer1, enable transparent caching.

Your network contains an Active Directory domain. All servers run Windows Server 2008 R2 and are members of the domain. All servers are located in the main office. You have a portable computer named Computer1 that runs Windows 7. Computer1 is joined to the domain and is located in a branch office. A file server named Server1 contains a shared folder named Share1. You need to configure Computer1 to meet the following requirements: - Minimize network traffic between the main office and the branch office. - Ensure that Computer1 can only access resources in Share1 while it is connected to the network. What should you do? A. On Computer1, enable offline files. B. On Computer1, enable transparent caching. C. On Server1, configure DirectAccess. D. On Server1, configure Share1 to be available offline.

QUESTION 371 see exhibit D. Start the Internet Protocol Helper (IP Helper) service.

Your network contains an Intrasite Automatic Tunnel Addressing Protocol (ISATAP) router. You run Ipconfig as shown in the exhibit. Other users on the network receive an IPv6 address for ISATAP. You need to ensure that your computer receives an IPv6 address for ISATAP. What should you do? A. Run Ipconfig /renew6. B. Run Ipconfig /setclassid6. C. Start the Net.TCP Port Sharing service. D. Start the Internet Protocol Helper (IP Helper) service.

D. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box. Add the Domain Users group to the Remote Desktop Users group.

Your network contains computers that run Windows 7 and Windows Vista. All computers are members of the same domain. You have a computer named Computer1 that runs Windows 7. You need to ensure that users can remotely log on to Computer1 from any computer on the network. What should you do on Computer1? A. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Power Users group. B. Select the Allow Remote Assistance connections to this computer check box. Add the Domain Users group to the Administrators group. C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box. Add the Domain Computers group to the Remote Desktop Users group. D. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box. Add the Domain Users group to the Remote Desktop Users group.

C. Modify the Additional Drivers settings.

Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain. You install a computer named Computer1 that runs Windows 7 (64-bit). You share a printer named Printer1 on Computer1. You need to ensure that any user can automatically download and install the drivers for Printer1. What should you do from Printer Properties? A. Install a new driver. B. Enable bidirectional support. C. Modify the Additional Drivers settings. D. Assign the Manage this printer permission to the Domain Users group.

QUESTION 19 see exhibit D. Modify the Windows Firewall with Advanced Security rules.

Your network has a main office and a branch office. The branch office has computers that run Windows 7. A network administrator enables BranchCache in the main office. You run Netsh on your computer as shown in the exhibit. You need to ensure that other computers in the branch office can access the cached content on your computer What should you do? A. Turn on Internet Information Services (IIS). B. Configure the computer as a hosted cache client. C. Configure the BranchCache service to start automatically. D. Modify the Windows Firewall with Advanced Security rules.

A. BranchCache - Content Retrieval (Uses HTTP)

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache. You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server. Which firewall rule should you enable on the client computers? A. BranchCache - Content Retrieval (Uses HTTP) B. BranchCache - Hosted Cache Server (Uses HTTPS) C. BranchCache - Peer Discovery (Uses WSD) D. File and Printer Sharing

A. At the command prompt, run Netsh branchcache flush.

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All client computers are configured to use BranchCache. At the branch office, a computer named Computer1 is experiencing performance issues. You need to temporarily prevent all computers from retrieving cached content from Computer1. What should you do on Computer1? A. At the command prompt, run Netsh branchcache flush. B. At the command prompt, run Netsh branchcache dump. C. Modify the Configure BranchCache for network files Group Policy setting. D. Modify the Set percentage of disk space used for client computer cache Group Policy setting.

D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.

Your network has a main office and a branch office. The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled. Users at the branch office report that it takes several minutes to open large files located in the main office. You need to minimize the amount of time it takes for branch office users to open files located in the main office. The solution must also reduce the amount of bandwidth used between the two offices. What should you do? A. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers. B. At the main office, configure the servers to use Background Intelligent Transfer Service (BITS). C. At the branch office, configure the client computers to use BranchCache Hosted Cache mode. D. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.

QUESTION 181 make chart B. From Network and Sharing Center, modify the Manage Wireless Networks settings.

Your office contains the wireless networks shown the following table: You have a portable computer that runs Windows 7. The computer successfully connects to all of the wireless networks. You discover that when you start the computer, it connects to Network2. You need to ensure that the computer connects to Network3 by default. What should you do? A. From Network and Sharing Center, modify the Advanced sharing settings. B. From Network and Sharing Center, modify the Manage Wireless Networks settings. C. From Network Connections, modify the properties of the wireless network adapter. D. From Network Connections, modify the bindings of the wireless network adapter.

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. A ABC.com user named Rory Allen uses of a Microsoft Windows 7 Professional client computer named ABC-WS680. During the course of the day Rory Allen attaches a USB hard drive to ABCWS680. and cannot enable BitLocker To Go on the USB hard drive. How can you allow Rory Allen so that he can execute Bitlocker To Go? A. You should consider upgrading ABC-WS680 to Microsoft Windows 7 Ultimate. B. You should consider initiating the TPM hardware on ABC-WS680. C. You should consider downloading a Microsoft Encryption certificate for ABC-WS680. D. You should consider enabling IPSEC on ABC-WS680.

a

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains 120 workstations. ABC.com is currently in the process of migrating all of its workstations to Windows 7. In preparation of the migration, you have installed Windows 7 on a computer named ABC-WS680 to be used as master image. Before proceeding with the deployment of all the workstations you need to prepare an image of ABC-WS680, which will be used in deployment to all workstations on the ABC.com network. Which tool can be used prior to the creation of image on ABC-WS680? A. You should consider running the System Preparation tool (Sysprep). B. You should consider installing the Remote Installation Services (RIS). C. You should consider disabling the System Protection settings. D. You should consider running the Windows Deployment Services (WDS).

a

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains a client computer named ABC-WS679 with a Virtual Hard Disk. You have installed Windows 7 on the Virtual Hard Disk and want to boot ABC-WS679 from the Virtual Hard Disk. How do you boot ABC-WS679 from a Virtual Hard Disk? A. By running msconfig and setting the boot order. B. By editing the boot.ini file in notepad and setting the boot order. C. By running Bcdedit.exe and setting the Windows Boot Manager settings. D. By running Bootcfg.exe with the /active parameter.

c

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. The ABC.com network contains two client computers named ABC-WS680 and ABC-WS682. Both ABC-WS680 and ABC-WS682 run Microsoft Windows 7. How would you ensure that you can use ABC-WS680 to remotely execute commands on ABCWS682? A. You should run the the Winrm allow command on ABC-WS682. B. You should run the Winrm connect command on ABC-WS682. C. You should run the Winrm quickconfig command on ABC-WS682. D. You should run the Winrm quickconfig command on ABC-WS680.

c

What command would you use to create a EFS Recovry Agent?

cipher /R:filename

What command would you use to decrypt a file or a directory?

cipher /d

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. You are managing a desktop called ABC-WS680. It is running Windows Vista. You are wanting to change the operating system to Windows 7. You have formatted the hard drive and planning to do a clean install with automated installation. How can you proceed with automated installation on ABC-WS680 while booting from Windows 7 DVD? A. By creating an answer file named sysprep.xml and copying it to a shared folder on the network. B. By creating an answer file named winnt.dif and copying it to an external hard disk. C. You should consider creating an answer file named autounattend.sif and copying it to shared folder on the network. D. by creating an answer file named autounattend.xml and copying it to an external hard drive.

d

You work as a desktop support technician at ABC.com. The ABC.com network consists of a single Active Directory domain named ABC.com. ABC.com currently makes use of a stand-alone computer named ABC-WS680 that runs Microsoft Windows 7. ABC-WS680 contains a single partition and is used by two ABC.com users named Rory Allen and Kara Lang. Due to the security requirements of ABC.com Rory Allen is encrypting the files by using Encrypting File System (EFS). Rory allen reports that he has provided access and assigned the encrypted files to Kara Long?During the course of the day Kara Lang needs to access to the encrypted files. However, Kara Lang is unable to access the encrypted files. How should you ensure that Kara Lang is able to access the encrypted files of Rory Allen? A. By having Rory Allen grant Kara Lang Full Control permissions on the files. B. By having Rory Allen grant Kara Lang Take Ownership permissions on the files. C. By disabling EFS on ABC-WS680. D. By having Kara Lang to encrypt the files after logging into ABC-WS680

d

B. Bcdedit /set

ded5a24e-7077-11e0-8ac8-a2d217dce703

osdevice vhd=[f:]\Windows7Pro.vhd C. Bcdboot C:\windows /s e: D. Bcdedit /set

ded5a24e-7077-11e0-8ac8-a2d217dce703

/d "Windows 7 VDH" command. The boot configuration data is enumerated as shown in the exhibit. You need to ensure that the following requirements are met: - Both operating systems are bootable after the Power On Self-Test (POST). - Windows 7 VHD is selected as the default boot entry. Which three commands should you run? (Each correct answer presents a part of the solution. Choose three.) A. Bcdedit /default

ded5a252-7077-11e0-8ac8-a2d217dce703

G. Bcdedit /set

ded5a252-7077-11e0-8ac8-a2d217dce703

What command defragments all local volumes on the computer, consolidates free space and provides a detailed output and statistics?

defrag /c /x /v

What command defragments all volumes on the computer except f:, running at a normal priority instead of default?

defrag /e f: /h

DirectX Diagnostic Testing

dxdiag.exe. The tool can report the current state of the computer configuration and the installed support for DirectX sound, video, and input devices. The drivers reported in the tools should be production-class drivers that are signed with Microsoft digital signatures. The tool will report any problems discovered but will not automatically repair them.

.XML

eXtensible Markup Language. ,

What are the rule collections that exist for AppLocker?

executables, windows installer, scripts, DLLs.

Primary partitions

A reserved region of disk space on a basic disk that is capable of loading an operating system. The first sector of it is also known as a boot sector and stores the code for beginning the operating system load process from that primary partition.,

Distribution Server

A server that holds installation files and images for the deployment of Windows 7 over a network. Can include distribution shares.,

Backup and Restore Centre

A tool included in Windows 7 that alows you to set up backup regiments to back up files, restore files, create a system image, and create a system repair disk.

Applet

A tool or utility in Control Panel that is focused on configuring a particular part of Windows 7.,

Sysprep

A tool that is used to generalize Windows 7 and prepare it for imaging.,

Disk Management

An MMC console snap-in used to administer hard disks in Windows 7.,

What are the benefits of Windows 7 Home Basic

Designed for emerging markets that require a low-cost operating system. Builds on Windows 7 Starter, and adds more functionality like: Partial Aero functionalit, multiple monitor support, Windows Mobility Center, network printing, Internet connection sharing, 64 bit version with 8GB maximum RAM. Does not operate if it detects it is being run outside of the emerging markets it was meant to be sold in.

EFS

Encrypting File System. An encryption technology for individual files and folders that can be enabled by users.,

How do you move desktop settings and applications from one desktop to another?

Image the HDD, User folder and Program Files, User State Migration Tool, Windows Easy Transfer.

How to set up Distribution Shares?

Micrsoft Deployment Toolkit, Windows System Image Manager.

What are the features of the Remote Assistance included with Windows 7

Now a stand-alone application, included with all versions. A user can ask for help over the network using email, file transfer or the Easy Connect service.

What is the windowsPE configuration pass used for?

The first configuration pass performed during setup, which can be used to perform tasks such as disk partitioning and entering the product key.

Striped Volume

A RAID 0 implementation using dynamic disks. Data is written in fixed block size in a sequential fashion to each disk. Used to improve disk Read and Write performance.,

What is in the Control Panel? Which Views exist?

A central location for Windows 7 management utilities. Most system settings are configured here. Category view is the default. Classic view displays all of the applets in one window.,

"What is ImageX and what tasks can be accomplished with it?

A command-line tool for managing WIM images. It can create, modify, and apply images from and to systems.

What is a Gadget? Where can they be placed in Windows 7?

A gadget is a mini-application that will provide information, perform a useful task, or link to enhanced Web services. They can be placed anywhere on the Windows 7 desktop.

x64

A generic term used to refer to Intel and AMD CPU processors capable of 64 bit operations that are compatible with the Windows operating system.,

x86

A generic term used to refer to computers based on Intel CPU processors. These CPUs include 8086, 80286, 80386, 80486, Pentium and compatible processors from other companies such as AMD.

Windows Easy Transfer

A graphical wizard for migrating user fules and settings from Windows 2000, Windows XP, or Windows Vista to a new Windows 7 computer.

Parental Controls

A method for configuring time limits, controlling game playing, and allowing or blocking programs.

Dynamic Disk

A method used to organize disk space into volumes. First introduced with Windows 2000, the dynamic disk method is seen as an improvement over basic disk technology. Not all operating systems support the dynamic disk method of organizing disk space. This may restrict multi-boot configurations. Dynamic disk technology supports simple, spanned, striped, mirrored, and RAID 5 volumes.

TPM Architecture

A motherboard module that is used to store encryption keys and certificates. Supports Bitlocker encryption.,

Windows CardSpace

A part of the .NET Framework API that protects the user's digital identities when communicating them across the network. Keeps track of a user's credentials for one or more security systems.,

What are the main characteristics of the Windows 7 DiskPart utility?

A powerful command-line utility for managing HDD partitions. Gives complete control over the creation, deletion and management of disk partitions. Can be scripted, requires very specific commands and syntax, maintenance and repair functions built within it.

Active Partition

A primary partition that is indicated in the partition table as the partition to use when loading the rest of the operating system. If a basic disk has multiple primary partitions, only one primary partition can be marked as active at a time. The primary partition's boot sector is used to load the rest of the operating system.

Product Activation

A process putin place by Microsoft to reduce piracy. Unique informaiton about your computer is sent to Microsoft to ensure that the package of Windows 7 purchased is installed on only a single computer.,

Simple Volume

A reserved area of space on a single dynamic disk. Can be formatted with a file system. The areas of space reserved for it do not have to be contiguous on the dynamic disk.,

Windows Update

A service that automatically downloads and installs service packs and security updates.

Disk Quotas

A system of tracking owners for file data within an NTFS-formatted aprtition or volume and the total disk space consumed by each owner. Lmits or warning can be established to restrict disk space usage.,

Signing Devices

A system that ensures that a device driver is from a known publisher and that the driver has not been tampered with. With 64 bit versions of Windows, Drivers must be signed.

Teredo

A system to tunnel IPv6 addressed packets over an IPv4 network, even if NAT is used on the IPv4 network.

Boot sector code

A term used to describe a special-purpose block of data on a disk or partition essential to the boot process of an x86 computer. The computer's BIOS will process it (when it processes the MBR) initially to find a partition to continue the boot process. Contains the code responsible for beginning the operating system load process from a partition or volume.,

Multitasking

A term used to describe the appearance of more than one application sharing the CPU of the computer. To the user, the applicaitons all seem to be running at the same time.

Volumes

A term used to refer to a region of disk space reserved to store file data. The term is used to generically refer to both dynamic disk volumes and basic disk partitions.,

Action Centre

A tool that provides you with a single location where you can identify and address any security issues, maintenance requirements, and errors that have arisen.

WindowsPE

A very limited version of Windows that can be used to perform recover tasks and install Windows 7.,

What are the benefits of Windows 7 Professional

All features of Home Premium plus: 64 bit version supports up to 192GB RAM, Multi-user fast switching, Remote Desktop hosting, Support for domain networking, Location aware printing, Dynamic disks, Encryption File System, Windows XP Mode with Windows Virtual PC, Volume Licensing.

What are the benefits of Windows 7 Enterprise

All features of Professional plus: Multiple Language User Interface for companies spanning the globe, UNIX-based application support, BitLocker Drive Encryption, Enhancements to remote corporate data access.

Windows Workflow Foundation

Allows developers to build applications that follow a logical sequence of events. A programming model that allows developers to quickly build workflow-enabled aplications.,

What is User Mode?

An access mode for applications while they are running on the CPU that allows restricted access to all hardware devices and memory in the computer. This mode makes it difficult for the running application to corrupt and crash the operating system. System-level applications may need more access than is allowed and must use kernel mode instead.,

FAT

An older method of organizing files and folders in a hard disk partition. Files are stored in blocks of data that point to each other in a chain-like structure. The blocks that are used in the partition and the link from one to another are stored in a master table called the file allocation table.,

Basic Disk

An older, IBM-originated method used to organize disk space for x86 computers into primary, extended, and logical partitions. Basic disk technology is supported by many legacy oeprating systems and may be required in certain multi-boot configurations.

What is HAL?

Hardware Abstraction Layer. Part of the operating system that understands how to talk to the specific computer hardware on which the operating system is installed. This portion of the operating system runs at the lowest level of the application hierarchy in kernel mode.,

Audit Mode

It allows you to install applications, add device drivers, run scripts, and test the validity of a Windows installation. This is a networked-enabled environment that does not require settings in Windows Welcome to be applied. There is also a Specialized pass for sysprep so you can find out if what you setup works - enables more logging than normally would have.

LFN

Long File Name. Allows a maximum of 255 character file names, excluding the use of special operating system characters such as \ / : * ? "" < > |.

Partitions

Multiple logical storage units, used to treat one physical disk drive as if it were multiple disks.

NTFS

New Technology File System. A file system introduced with Windows NT. NTFS supports advanced features to add reliability, security, and flexibility that the file systems such as FAT and FAT32 do not have. Is the proffered file system for use with Windows 7.

RSS

Really Simple Syndication. A format for distributing content as articles. Internet Explorer 7 is capable of reading RSS feeds.,

What are the benefits of Windows 7 Starter

Reduced feature set and cost to make more attractive to buyers of computers with reduced hardware specifications (like a netbook). This version does NOT include: Aero Glass interface, Support for multiple monitors, DVD playback, Ability to join a corporate domain, Ability to create a HomeGroup network, Ability to personalize the display background, colour scheme, Windows Media Center and media streaming, Windows XP Mode with Windows Virtual PC, 64-bit version, Support for more than two physical CPUs.

RAID

Redundant Array of Independent Disks. A method of combining multiple disk drives into a single logical drive for the purpose of attaining a larger drive size than possible on a single HDD (JBOD), increasing access speed (striping), or increasing HDD fault tolerance (Mirror, Distributed Parity).

Device Drivers

Software that manages the communication between Windows 7 and a particular hardware component.,

/specialize

Specialize configuration pass - The configuration pass that is performed after hardware has been detected. This is the most common configuration pass to apply settings. Also a sysprep extension.,

Windows Presentation Foundation

Standard methods defined for applications drawing to the screen. Unifies the look and feel of the operating system. Developers can eXtensible Markup Language (XML) code. Improved standardized appearance.

Which protocols does Windows 7 support? Which is the most common and why?

TCP/IPv4, TCP/IPv6 IPSec,

What are the benefits of Windows 7 N & K Editions

The N releases are sold in countries that do not allow Microsoft to bundle Windows Media Player and other media software as part of the operating system. The K releases are sold only in South Korea and also have some features such as Windows Media Player removed as well.,

How has the Windows 7 Firewall been improved?

The Windows 7 firewall contains profiles containing seperate settings for three types of networks: Home, Work, and Public.

oobeSystem

The final configuration pass before installation is complete. This configuration pass is typically used in conjunction with Sysprep and ImageX.,

What is the Kernel?

The operating system software that runs in kernel mode on the computer's processor and which provides low-level intelligence for the operating system. Kernel Mode is an access mode for applications while they are running on the CPU that allows full access to all hardware devices and memory in the computer.,

WDS

Windows Deployment Services. A server-based system for deploying desktop operating systems automatically over the network. PXE is used to connect the computers to WDS.,

WHQL

Windows Hardware Quality Labs. A service provided by Microsoft to hardware developers and vendors to test their hardware with different versions of Windows. This testing only validates that a device works with Windows; it does not compare devices.,

What previous versions of Windows can be directly upgraded to Windows 7 and what are some of the requirements for such upgrades?

Windows Vista: 64-bit to 64-bit, 32-bit to 32-bit. You can't downgrade the product path; must go Home Premium to Home Premium, Enterprise to Enterprise, etc.

What can you do in the Folder Options Applet?

You can configure the behaviour of Windows Explorer, including whether file extensions are hidden for known file types, and whether hidden files are displayed.


Set pelajaran terkait

Money & Banking Connect HW Ch. 1-5

View Set

Accounting Test Chapter 11, 13, 14

View Set

BUSINESS FOR LAW CHAPTER 10 QUESTIONS: ILLEGAL AGREEMENTS

View Set