Combo with "Windows 7 Configuration" and 11 others

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management. You run Imagex to apply the image to the VHD file

Tun BCDEdit to create a BCD entry pointing to the VHD file

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and connect it on your home network using a wireless connection. You would like to join the Homegroup from your laptop that has already been created on your home network. What should you do?

Turn on Network Discovery.

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and connect it on your home network using a wireless connection. You would like to join the HomeGroup from your laptop that has already been created on your home network. What should you do?

Turn on Network Discovery.

Drag each application compatibility setting on the left and drop it on the corresponding function that the setting performs.

Turns off automatic resizing of applications when using large-scale fonts > Disable display scaling on high DPI settings. Disables Aero features > Disable desktop composition. Allows applications with limited color palette to display properly > Run in 256 colors. Resolves display problems with menus and buttons > Disable visual themes. Allows low resolution applications to display properly > Run in 640 x 480 screen resolution.

What type of connector does an unshielded twisted pair (UTP. cable use?

RJ45

What of the following is based on a push technology used with Internet Explorer that notifies you when a Web site is changed?

RSS

Which program is an MMC snap-in?

Local Users and Groups

What layer of the OSI model are the Media Access Control addresses part of?

Data-link

Describe each application compatibility setting * Run in 256 colors * Run in 640 x 480 screen resolution * Disable visual themes * Disable desktop composition * Disable display scaling on high DPI settings

* Run in 256 colors = allows applications with a limited color pallet to display correctly * Run in 640 x 480 screen resolution = allows low resolution applications to display properly. * Disable visual themes = resolves display problems with menus and buttons in some applications. * Disable desktop composition = disables Windows Aero features, such as transparency * Disable display scaling on high DPI settings = turns off automatic resizing of applications when large-scale fonts are being used.

You manage a small network with Windows 7 clients, multiple subnets, and servers. You want your computer to be able to resolve a host name for a server on your network to it IPv4 address. What should you do? (Select two. Each choice is a possible solution.)

- Add an A record on the DNS server. - Edit the Hosts file on the computer.

You are getting ready to install windows 7 Ultimate on a new laptop. You would like to configure the laptop to use BitLocker. The laptop should start up without requiring a PIN or a USB device during startup. What should you do? (Select two. Each choice is a required part of the solution.)

- Create two partitions on the hard disk. Put boot files on the first partition, and operating system files and data on the second partition. - Enable the TPM.

You have two computers: Comp1 is running Windows 7 and comp2 is running Windows XP. Both computers are members of a domain. You need to use PowerShell commands to remotely manage Comp1 from comp2. comp1 has the Windows remote Management (WinRM) service enabled. What should you do? (Select two. Each choice is a required part of the solution.)

- On Comp2, download and install PowerShell 2.0. - On Comp2, use the "icm" command

You have a laptop that runs Windows 7. The hard drive has been encrypted using BitLocker. BitLocker uses a TPM with a PIN and startup key. You have lost the USB device containing the startup key. You also find that you are unable to locate the recovery key. You need to be able to boot the computer. What should you do?

- Reformat the hard drive and reinstall Windows.

You have a small home network with the following computers: * Comp1 runs Windows 7 Home * Comp2 runs Windows 7 Home Premium * Comp3 runs windows 7 Professional You want to create a Home Group for your network. Which of the following should be part of your configuration? (Select the two most correct answers. Each choice is a required configuration step.)

- Set the network location to Home. - Create the HomeGroup on Comp2 or Comp3.

You have a laptop computer running Windows 7 Home Premium. You connect you computer to wired network at work and a wireless network at home. You want to configure you computer to use a different default printer for each network. What should you do first?

-Upgrade you computer to Windows 7 Professional.

You have a laptop running Windows 7 Ultimate. You need to configure your laptop to save as much battery power as possible. What should you do?

-Use the Power Saver power plan

You have several computers running Windows 7. The Computers are members of a domain. Your company uses Remote Assistance to help diagnose user desktop issues. All computers are configured to allow Remote Assistance. One day you receive a Remote Assistance acceptance from someone you don't know from an invitation file you created several weeks ago. You need to prevent this from happening again. What should you do?

- Require a password on invitation files. - Decrease the timeout in invitation files.

You have a computer running Windows 7. The hard drive has been protected using BitLocker. You need to update the BIOS on the computer. What should you do first?

- Run 'manage-bde -pause'

You have a Windows 7 computer. You would like to configure Event Subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a collector initiated subscription. Which of the following will be part of your configuration? (Select two.)

- Run 'winrm qc' - Add the collector computer to the Event Log Readers group.

You manage Windows 7 computers connected to the mydomain.com Active Directory domain. You have decided to implement DirectAccess on your network. you run the setup for DirectAccess on the DA1 server with the following choices: * End-to-end authentication with a smart card required for authentication * Root certificate from 'ca1.mydomain.com' * Security group name of 'DirectAccessGroup' * The network Location service runs on the DirectAccess server You need to configure the client computers for the DirectAccess connection. What should you do?

- Add the computer account for each client computer to the 'DirectAccessGroup' security group.

You have a computer running windows 7 Professional. You use a VPN connection to access resources on a corporate intranet. In addition to accessing the intranet resources, you need to access the Internet while the VPN connection is active; however, you do not want to send Internet traffic through the VPN connection. What should you do?

- Configure the advanced TCP/IP settings of the VPN connection.

You have a Windows 7 computer. You would like to configure Event subscriptions for that computer to forward events to a network server. You need to configure your computer as a source computer for a source initiated subscription. Which of the following will be part of your configuration? (Select two.)

- Configure the local security policy to identify the FQDN of the collector computer. - Run 'winrm qc -q'

You have ten reginal sales people who travel extensively and use laptops to access company resources. a Windows 2008 R2 server named Server1 contains a shared folder named 'Data'. The server is located in the main office. You want the files in the 'Data' share to be cached automatically when opened by one of the laptops. You also want the laptop to cache any executable files that it uses from the 'Data' share. Select the setting(s) you would choose to meet these requirements.

- All files and programs that users open from the shared folder are automatically available offline. - Optimize performance

You have a Windows 7 laptop that has offline files enabled. You regularly access a file in a share called 'Data' on the company server where manual caching is configure. Select the option you should choose to make a cached version of the 'Info.txt' file available when you are disconnect from the office network.

- Always available offline

You have a laptop running Windows 7 Professional. You configured a power plan which is optimized for this laptop, and then you set it as the active plan. You need to migrate the settings to other laptops running windows 7. Before you migrate the plan, you need to validate the power plan. What should you do? (Select two. Each answer is a required part of the solution.)

- At a command prompt, run 'powercfg /energy' - At a command prompt, run 'powercfg /export'

You have a computer running Windows 7 Professional. To protect your system and data, you use the Backup and Restore console to create a system image backup. While working with a file, you accidentally delete some of the data. You need to restore the older version of the file, but you cannot find any previous versions of the file. What should you do? (Select two. Each choice is a required part of the solution.)

- Attach the .vhd file created form the Backup and Restore console. - Use Windows Explorer to browse to and then copy the file.

You have two computers running Windows 7: comp1 and Comp2. You need to use the command-line to remotely manage comp1 from Comp2. What should you do? (Select two. Each choice is a required part of the solution.)

- Authenticate Comp2 to Comp1. - On Comp1, run "winrm qc"

You have a laptop running Windows 7 Enterprise. You would like the laptop to Sleep when the battery level becomes critically low. Select the area you would use to configure this setting.

- Battery

You have a laptop that runs Windows 7 Ultimate. You want to protect all of the files on the hard drie to prevent unauthorized access. you want to prevent access to any file on the hard drive, even if the hard drive is moved to another computer. Which feature should you implement.?

- BitLocker

You have just been put in charge of installing Windows 7 on 30 new workstations. You decide to use Windows Deployment Services (WDS) to help automate the installation. You need to create a custom install image from a reference computer that you have configured. What should you do? (Select two. Each choice is a possible solution.)

- Boot the reference computer using a capture image. - Run ImageX

You need to install Windows 7 Enterprise on multiple new computers. You decide to use Windows Deployment Services (WDS) to help automate the installation. You have installed and configured Windows 7 on the reference computer. You need to create an install image using the reference computer. What should you do?(Select two. Each choice is a complete solution.)

- Boot the reference computer using a capture image. - Run imagex.exe

On your Windows 7 computer, you share the D:\Promo folder using a sharename of Promo. The share has been assigned the following permissions: User/Group Permission ---------------------------------------- Telesales group = Allow Read Training group = Deny Full Control Managers group = Allow Change Mary user = Allow Change The Mary user account is a member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do? (Choose two. each choice is a possible solution.)

- Change the 'Training' group permission to allow Read. - Remove the 'Mary' user account from the 'Training' group.

You have a laptop that runs Windows 7. The computer is a member of a domain. You want to use BitLocker on the laptop. Your implementation should meet the following requirements: *The computer should start up automatically without user intervention. * To meet security requirements, USB support must be disabled on the laptop. * You want to automatically generate recovery keys and store those keys in a central location. You need to implement a solution to meet the stated requirements. What should you do? (Select two. Each choice is a required part of the solution.)

- Configure Group Policy to store recovery keys in Active Directory. - Implement BitLocker with a TPM

You have several computers running Windows 7 Ultimate. The computers are members of a workgroup. you need to create many custom firewall rules on each computer. The rules must be specific for the Private network profile. You should complete the task with the least amount of effort as possible. What should you do? (Select two. Each answer is a complete solution.)

- Configure one computer with the Windows Firewall with Advanced Security MMC snap-in. Then use the same tool to export the settings and import settings on the remaining machines. - Configure one computer. Use "Netsh advfirewall" to export the firewall settings. Import the settings on the remaining machines.

You have a computer that runs Windows 7 Ultimate. You want to configure the computer so that write access to removable storage devices is only allowed on drives protected with BitLocker To Go. What should you do?

- Configure the local security policy.

You have a laptop that runs Windows 7. You want to use the laptop to connect to your corporate intranet while you are at home or traveling. Your solution should meet the following requirements: * The computer should connect automatically to the intranet without user initiation. * All communications between your laptop and the intranet should be encrypted. * The connection should allow for remote management of the computer from corporate intranet. * Internet traffic should be directed to Internet servers without going through servers at the corporate network. * The solution should work through firewalls where only HTTP and HTTPS are permitted. Which feature should you implement?

- DirectAccess

You have a laptop running Windows 7 Ultimate. You want to be able to stop work on your laptop, save battery power, and resume as quickly as possible. You also want to protect yourself from data loss should the battery fail. What should you do?

- Enable Hybrid Sleep

You have a computer running windows 7 Professional. The computer has the following two volumes: * The C: drive is the system drive with user profiles and individual user files * The D: drive holds data files common to all users You take the following actions: * You create a system image backup that includes both the C: and D: drives. * You schedule regular backups to back up all user libraries. The scheduled backup includes a system image. * You use System Restore to take a snapshot. You edit and save a file on the D: drive. You decide that you don't like the changes and want to revert to a previous version of the file. You go to the 'Previous Versions' tab of the file and see nothing listed. To avoid this situation in the future, you must ensure that you can revert files on the D: drive to earlier versions of the file from the 'Previous Versions' tab. What should you do? (Select two. Each answer is a possible solution.)

- Enable System Protection for the D: drive. - Modify the backup settings in Backup and Restore to include the D: drive.

You have a laptop running Windows 7 Ultimate. You are on an airplane and are being instructed to turn off your laptop completely and immediately. You have several open windows with critical data that you cannot lose. What should you do?

- Enable hibernation.

You manage several laptops running Windows 7 Ultimate. The computers are members of a domain. Laptop computers are located at a branch office and access files across a WAN link stored on a serer in the main office. all files are in a network shared named 'Data' on the server. You want to reduce the amount of traffic across the WAN link for file reads from the 'Data' share. you want the laptops to save copies of the files locally, and use their local copies if the files on the server have not been modified. Files should not be available ont he client computers when the WAN link is down. What should you do?

- Enable transparent caching.

You are a the desktop administrator for you company. You manage 20 Windows 7 computers. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). What should you do? (Select two. Each choice is a possible solution.)

- Establish a remote Desktop connection to each computer. - Open Computer Management and connect to each remote computer.

You have a laptop computer that runs windows 7. The computer is a member of a domain. You want to use DirectAccess to access application servers on your corporate intranet. Application servers run Windows Server 2003 and Windows Server 2008. You want to configure a single access method for all servers and clients. Which connection method should you use?

- Full enterprise network access (end-to-edge)

You have a computer that runs windows 7. You would like to configure windows update to download updates that Microsoft suggests, but does not mark as important. You would also like to ensure that updates are installed on the computer without the intervention of an Administrative user. Select the settings that you should enable on the computer.

- Give me recommended updates the same way I receive important updates. - Allow all users to install updates on this computer.

You have a laptop running Windows 7 Ultimate. You keep the laptop plugged in most of the time and would like to use the full CPU power for a video project you are working on. Select the power plan you would use to provide full CPU power?

- High Performance

You have a laptop that runs Windows 7. The computer is a member of a domain. You would like to protect the data on your laptop to meet the following requirements. * All operating system and user data should be encrypted. * All user data should be inaccessible (unreadable) if the hard disk is removed and connected to a different computer. * The computer should not boot unless a special key is found on a USB drive. * The computer should not boot if a change ids detected in the boot files. You need to implement a solution to meet the stated requirements. What should you do?

- Implement BitLocker with a TPM

you have a computer that runs Windows 7. You need to manually check for updates form Windows Update. What should you do? (Select two. Both answers are complete solutions.)

- Run 'wuauclt.exe /detectnow' - Click the 'Check for updates' button in Windows Update.

You have several laptops running Windows 7. The laptops are members of a domain. Several employees in your company use the laptop computers to connect to the company network. Because they often use these laptops while traveling or to help them do their jobs, you can't prevent them from connecting to the network. However, you are concerned that many of these laptops don't have the latest security patches installed. You want to implement a solution so that laptops are checked for the latest security updates as they connect to the network. If the required updates are missing, you want to prevent these computers from having full access to the private network. What should you do?

- Implement Network Access Protection (NAP) with a quarantine network.

You manage a computer that runs Windows 7. You want to prevent users from running any file with a .bat or .vbs extension unless the file is digitally signed by your organization. What should you do?

- In application control policies, create a script rule with a publisher condition.

You have a computer running windows 7. You want to save some files on a USB thumb drive and protect the drive using BitLocker To Go. you want to be able to read these files on a computer that is running windows XP Professional. You need to implement a solution with the least amount of effort as possible. What should you do? ( Select two. Each choice is a required part of the solution.)

- Include the BitLockerToGo.exe file on the USB drive. - Format the drive using FAT32

You have several computers running Windows 7 Enterprise. The computers are members of a domain. You manage a custom application that is currently installed on the computers in the domain. You receive a new version of the software. Installing the software on a client computer overwrites the existing installation such that both versions cannot be used at the same time on the same computer. You decide to use Remote Desktop Services on a server in the domain to allow clients to run both the new and the old version of the software. Clients should be able to run each version using an icon on their desktops. What should you do? (Select two. Each choice is a required part of the solution.)

- Install the new version of the application on the server. - Configure RemoteApp on the server.

You have a new laptop that you want to configure with Windows 7. You would like to use BitLocker on the laptop to protect the volume used for the operating system and all user data. Your laptop does not have a Trusted Platform Module (TPM). You need to configure the computer to use BitLocker. What should you do? (Select two. each choice is a required part of the solution.)

- Install windows 7 Ultimate on the laptop. - Configure BitLocker to use a startup key on a USB drive.

You have purchased a new laptop that runs Windows 7 Professional. You want to use DirectAccess to connect the computer to your corporate intranet. You will use Group Policy to enforce DirectAccess settings on the client. What should you do to configure the laptop for the DirectAccess connection? (Select two.)

- Join the computer to a domain. - Upgrade the computer to Windows 7 Ultimate or Enterprise.

You have a computer that runs windows 7. The computer has two hard drives. The C: drive is the system drive, and the D: drive holds data files. You perform a system image backup using the Backup and Restore console that includes both drives. Your computer takes regular restore point snapshots. one day you find the D:\finances folder has been deleted. You check the previous versions for the drive, but find nothing listed. You need to restore the folder and its contents as quickly as possible. What should you do?

- Mount the .vhd file in the backup, then copy the folder to the drive.

You have two computers that run Windows 7: Computer 1 and Computer 2. Both computers are configured with BitLocker. Both computers have TPM installed. Because of a hardware failure, Computer 1 will not boot. You need to access the data on the drive where BitLocker was enabled as quickly as possible. What should you do?

- Move the hard disk from Computer 1 to Computer 2. Use the recovery key from the Computer 1 to gain access to the encrypted volume.

You would like to implement Directaccess on your corporate network. Which of the following is not an infrastructure requirement for using Directaccess?

- Network access for files server role

You have purchased a new laptop that runs Windows 7 Ultimate. You want to use DirectAccess to connect the computer to your corporate intranet from home. Your home network is connected to the Internet with a single public IP address and NAT. Firewalls between your network and the intranet allow only HTTP and HTTPS traffic. What should you do to configure the laptop for the DirectAccess connection.?

- Obtain a computer certificate for the laptop.

you use a laptop named M400 which runs windows 7 Ultimate. m400 is a member of a domain and id located in a branch office. A Windows 2008 R2 server named Server1 contains a shared folder named Data. The server is located in the main office. You need to configure M400 to cache the files from the 'Data' share so they can be used when M400 is not connected to the network. You want the files in the 'Data' share to automatically synchronize each time M400 connects to the network. The files must be protected by encryption; other files on M400 do not need encryption. What should you do?

- On M400, make the 'Data' share available offline and enable encryption of offline files.

You have a computer named comp1 that runs Windows 7. The computer is located in a branch office. A server running windows Server 2008 R2 named Srv1 is located in the main office. You share a folder named 'Data' using the default caching settings. You use Offline Files in the branch office to make the files in the 'Data' share available when the WAN link is down. You want to prevent all files with the .iso and .mp3 extensions from being cached. What should you do?

- On Srv1, edit the local security policy

You have a computer named comp1 that runs Windows 7. The computer is located in a branch office. A server running Windows Server 2008 R2 named Srv1 is located in the main office. The server has multiple shared folders. You use Offline Files in the branch office to make the files on the server available when the WAN link is down. You want to prevent all files in the 'Data' share from being cached. Files in other shared folders should still be available. What should you do?

- On Srv1, edit the properties for the 'Data' folder.

You have a computer running windows 7. The computer is a member of a domain. Your domain contains a DHCP server that runs Windows Server 2008 R2. The server is configured as a Network Access Protection (NAP) enforcement point. You need to configure the computer as a NAP client. What should you do? (Select two. Each answer is a required part of the solution.)

- On the client, start the Network Access Protection Agent service. Configure the service to auto-start. - On the client, enable the enforcement client for DHCP.

You manage three Windows 7 computers that are part of a workgroup. You would like to configure event subscriptions so that you can view all events from those computers on your laptop (which also runs Windows 7). You need to configure the three source computers and one collector computer. The subscription will be a source initiated subscription. What should you do? (Select two. Each choice is a required part of the solution.)

- On the collector computer, configure the subscription. - On all four computers, run 'winrm qc -q'. On the collector computer, run 'wecutil qc /q'.

You have a laptop running windows 7 Enterprise. The laptop is a member of a domain with a server running Windows Server 2008 R2. You need to use a VPN connection to access company resources from your home. You configure a new VPN connection using the IKEv2 security protocol, and then test the connection while at work. The connection is successful. When you test the VPN connection from your home, you find that the connection cannot be made. What should you do?

- Open UDP ports 500 and 4500 and protocol 50 on your home router.

You have a computer named comp1 that runs Windows 7. The computer is located in a branch office. A server running windows Server 2008 R2 named Srv1 is located in the main office. You share a folder named 'Data' using the default caching settings. You use Offline Files in the branch office to make the files in the 'Data' share available when the WAN link is down. On Comp1, you want to see your synchronization partners, see the results of the latest synchronization, and view and resolve any conflicts. What should you do?

- Open the Sync Center in the Control Panel.

You have a folder on your Windows 7 computer that you would like memb3ers of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.)

- Place the files on an NTFS partition. - Configure both share and NTFS permissions.

You have a laptop running Windows 7 Ultimate. You are about to give a presentation and would like to minimize interruptions to your presentation. Select the option you should choose.

- Presentation Settings (Turn on)

You have previously installed Windows 7 on two new computers and configured both computers with BitLocker. Both computers have a TPM installed. Because of a hardware failure , one of the computers will not boot. You replace the failed hardware, but now BitLocker is preventing the system from starting because it has failed the startup system integrity checks. Which of the following would you use to reconfigure BitLocker so the system will start?

- Recovery key

You have a laptop computer that runs Windows 7 Ultimate. The computer is a member of a domain. You want to use DirectAccess to access application servers on your corporate intranet. Application servers run Windows Server 2003. You need to implement a solution that does the following: * All communications sent to the private network over the Internet are encrypted. * Client computers authenticate with application servers on the intranet. * Following authentication, traffic on the intranet is not encrypted. What should you do? (Select two. Each choice is a required part of the solution.)

- Upgrade application servers to Windows Server 2008 R2 - Configure selected server access (modified end-to-edge).

You have a computer running windows 7. You have configured a USB thumb drive with BitLocker To Go that has been formatted with FAT32. You use a password to protect the drive. You want to be able to read and write files to the drive from a computer that is running windows XP Professional. You need to implement a solution with the least amount of effort as possible. What should you do?

- Upgrade the Windows XP computer to Windows 7 Ultimate or Enterprise.

You have a laptop that runs Windows 7 Professional. You want to protect the hard drive using BitLocker and a startup key saved to a USB device. What should you do first?

- Upgrade the computer to Windows 7 Ultimate or Enterprise.

You have a computer that runs Windows 7. The computer is a member of a domain. Your domain contains a VPN server that runs Windows Server 2008 R2. You will use a smart card for authentication to the VPN server. What should you do?

- Use EAP as the authentication protocol.

You have several laptops running Windows 7 Enterprise. The laptops are members of a domain with a server running Windows Server 2008 R2. You have been put in charge of providing a VPN solution for your company. you want the VPN connection to automatically reconnect if the VPN connection is lost or disconnected. You decide to use VPN Reconnect, but you need to ensure each laptop will make the correct VPN connection to the server. What should you do?

- Use Internet Key Exchange version 2 (IKEv2) as the VPN protocol.

You have a computer running Windows 7 Ultimate. You take a regular file backup every Friday night, which also includes a system image backup. System Protection has been enabled for all drives on the system. On Wednesday you receive a new version of a graphic editing application that you use regularly. You install the new application, but find that the application does not work properly. When you try to run the original application, you find that the upgrade has deleted it from your system. You also find that some of the graphics files you had been working on yesterday have been deleted. You need to get things back to normal as quickly as possible. What should you do? ( Select two. Each choice is a required part of the solution.)

- Use Previous Versions to restore the missing files. - Use system Restore to revert to a restore point before you installed the application.

You have several laptops running Windows 7. The laptops are members of a domain. You have been put in charge of providing a VPN solution for all members of the Sales team. Salesmen complain that with the previous VPN solution, there were many times that they were unable to establish the VPN solution because the hotel or airport firewalls blocked the necessary VPN ports. You need to come up with a solution that will work in most instances. What should you do?

- Use Secure Socket Tunneling Protocol (SSTP) as the VPN protocol.

You have two computers: Comp1 is running Windows XP Professional and Comp2 is running windows 7 Professional. After moving EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data. You need to open the EFS-encrypted files on comp1. What should you do? (Select two. Each answer is a complete solution.)

- Use USMT to transfer the encryption certificates. - Use Cipher.exe to transfer the encryption certificates.

You have a laptop running Windows 7 Ultimate. You are about to give a presentation. You connect your laptop to an external display device. You want to make sure that your desktop icons and the Start Menu does not show up on the external display while you are presenting. What should you do? (Choose two. Each answer is a complete solution.)

- Use the Mobility Center to extend your desktop on the external display. - In Display properties, select Extend these displays.

You have a computer running windows 7 Professional. To protect your data form loss or corruption, you enable System Protection on all the drives in your computer. You also schedule regular backups of the system drive and all other drives using the Backup and Restore console. After working with a file, you notice that you accidentally deleted most of the data. You need to restore the file to the point in time before you modified it. What should you do? (Select two. Each answer is an independent solution.)

- Use the file properties to restore a previous version of the file. - Use Windows Explorer to browse the 'Backup Set' folder and then copy the file.

You have a small network with three subnets as shown in the graphic. IP addresses for each router interface are also indicated. You need to connect Wrk1_A to SubnetA and Wrk5_c to SubnetC. Which IP addresses should you use? (Select two.)

- Wrk1_A = 192.168.111.62 - Wrk5_C = 10.155.64.97

When you initially installed your Windows 8.1 system, you created a Microsoft online account and received the default allocation of OneDrive storage space. You've used your OneDrive account heavily to transfer files between your desktop system in your office and your notebook system while traveling and are nearly out of space. You need to add more capacity to your account. You've selected the One Drive option in PC Settings, as shown in the exhibit. What should you do?

-Access http://onedrive.live.com. -Click File storage.

You share the D:\Apps folder on your Windows system using a share name of Apps. You need to configure permissions to share as follows: -Members of the Appusers group should be able to open and view files in the shared folder. -User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configure on the computer. You need to complete the task using the least amount of effort possible.

-Assign Allow Read permission to Appusers, And assign Deny Read permission to JohnS.

Your Windows system provides a shared printer named Printer1. You want to allow user Chad to pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer.

-Assign Chad the Allow Manage Documents permission to the printer.

You manage a Windows system with a printer that is used by Sales department. The sales manager has asked you to restrict access to printer as follows: -Sally needs to connect to a printer, print documents, and pause and resume her own print jobs. -Damien needs to pause and resume documents for all users, but does not need to change printer properties. You want to assign the most restrictive permission that meet the sale manager's requirements. What should you do?

-Assign Damien the Manage Documents permission. -Assign Sally the Print permission.

You have a laptop with Windows 7 installed. You connect your laptop to the network at work to allow an associate to copy files from your computer. Other computer on the network are not able to discover your computer, and your computer is not able to build an accurate network map in the Network and sharing Center. You open the Network and Sharing Center and see the information shown in the image. What should you do?

-Change the network type to Home.

You have a new notebook computer running Windows. You need to connect your computer to wired network at work and a wireless network at home. While connected to the wired network, you set the default printer. You also want to configure a different default printer to use when connected to you wireless network at home. In Devices and Printers, you click Manage default printers. Your home wireless network does not appear in the list of available networks. What should you do?

-Connect to the wireless network.

You have a small home network with the following computers: -Comp1 runs Windows RT -Comp2 runs Windows 8 -Comp3 runs Windows 8 professional. You want to create a HomeGroup for you network. Which of the following should be part of your configuration? (Select the two most correct answers. Each choice is a required configuration step)

-Create the HomeGroup on Comp2 or Comp3 -Set the network location to private.

You have a Windows system that you use at home. You have a small network set up, with each member of family having their own computer. You would like to share files such as pictures, videos, and music on your computer with other members of your family. Your mother should be able to modify any of these file, while everyone else should only have read-only access. You want to use the simplest method to make these files available while providing the level of access specified. What should you do?

-Enable file and printer sharing in the Network and Sharing Center. Share specific folder and configure the necessary permissions.

You have a new notebook computer running Windows. You need to connect your computer to a wired network at work and a wireless network at home. While connected to you work network, you set the default printer. You want to configure a different default printer to use when connected to you home network. What should you do?

-In Devices and Printers, click Manage default printers.

You have a new notebook computer running Windows. You need to connect your computer to a wired network at work and a wireless network at work and a wireless at home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. What should you do?

-In Devices and Printers, click Manage default printers.

You manage a Windows system with a printer connected to it that is shared with the name of Printer1. You need to modify the permissions that apply to the share printer for network users. What should you do?

-In Devices and Printers, right-click the printer and select Printer properties. Edit the Advanced settings.

You have a folder on your Windows system that would like members of your development team access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the file in the folder. What should you do?

-Place the files on an NTFS partition. -Configure both share and NTFS permissions.

You manage a Windows system with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users who are not members of this group can print to the printer. You want only member of the Sales group to print to Printer1. What should you do?

-Remove Everyone from the printer's access control list.

On your Windows computer, you share the D:\Promo folder using a sharename of promo. The share has been assigned the following permissions: User/Group Permission Telesales group ---- Allow Read Training group---- Deny Full Control Managers group---- Allow Change Mary user------ Allow Change The Mary user account is member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do?

-Remove the Mary user account from the Training group. -Change the training group permission to allow Read.

Your Windows system has a folder named D:\SalesDocs. The folder has been shared with the share name of SalesDocs. The D: drive is formatted with NTFS. The following permissions have been configured for the folder: NTFS permission Share permissions Users group = Allow-Read Users group = Allow-Read Sales group = Allow-Modify Sales group=Allow-Change Sally is a member of both the Users and Sales groups. She needs to be able to read and modify all file in the Sales Docs shared folder except for the StyleGuide.doc file. Sally should be able to read StyleGuide.doc, but not modify it. What should you do?

-Set Sally's NTFS permissions for StyleGuide.doc to Deny Write.

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You travel to a branch office in your company. The branch office has 5 computers running Windows 7 Ultimate edition. Computers in the branch office are not domain members. All computers use a HomeGroup for file sharing. You want to join the HomeGroup in the branch office. What should you do?

-Set the network location for the connection to home.

Your Windows system has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows: -Members of the Sales group should have read-only access to the content in the folder. -Members of the SalesAdmin group should be able to open, edit, and add new file to the folder. -No other users should have access. Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permission as possible. What should you do?

-Share the SalesDept folder. Grant Read permission to the Sales group and Change Permission to the Sales Admin group. Remove Everyone from the access control list.

You have a Windows notebook system that is member of the mydomain.local Active Directory domain. You take your notebook home and connect it on your home network using a wireless connection. You would like to join the HomeGroup from your notebook that has already been created on your home network.

-Turn on Network Discovery.

To add drivers to an image using DISM.EXE, what file must you include?

.inf file

Command line options for the Scanstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.

/0 > Allow overwriting existing data /ue > Specify user(s) to omit from migration /ui > Specify user(s) to be migrated /offlineWinOld > Path to the offline Windows.old folder /p/nocompress > Generates a space estimate

If you have an IPv4 address of 123.54.34.77 with a subnet mask of 255.255.240.0, what is the CIDR notation?

/20

Command line options for the Scanstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.

/o > Allow overwriting existing data. /ue > Specify user(s) to omit from migration /ui Specify user(s) to be migrated. /offlineWinOld > Path to the offline Windows.old folder. /p /nocompress > Generate a space estimate.

Drag each command line option for the Sysprep utility listed on the left to the correct description of it function on the right.

/oobe - Starts the computer in the Windows Welcome mode /unattend: answerfile - Applies settings in an answer file /reboot - restarts the computer when Sysprep completes /generalize - Removes machine-specific information from the installation /audit - Allows you to add additional drivers or applications and test your image

Drag each command line for the Sysprep utility listed on the left to the correct description of its function on the right.

/oobe > Starts the computer in the Windows Welcome mode. /unattend: answerfile >Applies settings in an answer file. /reboot > Restarts the computer when Sysprep completes. /generalize > Removes machine-specific information from the installation. /audit > Allows you to add additional drivers or applications and test your image.

Drag each command line option for the ImageX utility listed on the left to the correct description of its function on the right.

/split > Splits a captured image into multiple files. /capture > Creates an image of a reference computer. /compress > Specifies compression when capturing a system image. /apply > Deploys an image. /verify > Checks for errors and file duplication. /config > Identifies an alternate configuration file name and location.

Command line options for the Loadstate command are listed on the left. Drag each command line option and drop it onto the correct description of the function it performs on the right.

/ui > Specify user(s) to be migrated /hardlink > Restore from a linked migration store. /lae > Enable user accounts /ue > Specify user(s) to omit from migration /lac > Create user accounts

Your Windows system hosts the shared printer shown in the image below. This printer is heavily used by workgroup users in your department. You want to enable client-side rendering to reduce the load on your local system. Click the option you would use in the printer properties dialog to do this.

1-Sharing(tab) 2-And then enabling the Render print jobs on client computers.

You have a single computer without an operating system installed. The computer will eventually store sensitive information and will require the encryption of the operating system partition. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on a network share. You want to manually deploy the image to the computer. What should you do?

1. Boot the new computer using WinPE. 2. Use Diskpart to create a BitLocker partition. 3. Use Diskpart to create a system partition for the Windows 7 image. 4. Use ImageX to apply the image to the local drive.

You want to use Windows Deployment Services (WDS) to deploy a custom version of Windows 7 to multiple new computers. You want to make custom modifications to the installation such as installing applications and modifying desktop settings. You then want to create an image of the installation while retaining the custom changes. What should you do?

1. Create a capture image in WDS 2. Install the operating system on the reference computer. Customize the installation. 3. Run Sysprep on the reference computer. 4. PXE boot the reference computer and select the capture image.

You want to capture a system image to deploy Windows 7 to multiple computers. You want to install Windows 7 on the reference computer using an answer file. You need to create the answer file. What should you do?

1. On a technician computer, insert the Windows 7 product DVD. 2. Run Windows SIM and load a preloaded install image (install.wim) from the DVD. 3. Select and edit the responses to the questions presented during product installation. 4. Validate the file in Windows SIM. 5. Save the answer file.

Which of the following is NOT an IPv4 private address range?

224.0.0.0 through 224.255.255.255

What is the default subnet mask for 198.54.65.3?

255.255.255.0

To configure a printer pool, you enabled printer pooling on the Ports tab under Printer Properties. You have five print devices ready for the printer pool. Of those five, four are in one room. Of the four, three use the same print driver. Of those three, two print devices are identical. How many print devices are in your printer pool?

3

What is the minimum number of physical disks required to create a RAID 5 volume?

3

You need to upgrade a notebook system running 32-bit Windows 7 Home Premium edition to 64-bit Windows 8.1 Professional

32-bit versions of Windows 7 cannot be upgraded to 64-bit versions of Windows 8.1

Which technology is the most common to connect to a wireless network for a corporation that allows a data rate up to 54 MB/sec?

802.11g

The difference between in-place upgrade and a migration is ________.

A migration copies vital information from the existing Server to a clean installation of Windows 2012.

What is Microsoft's directory service called?

AD

What address is assigned to a computer that fails to locate a DHCP server?

APIPA

You want to resize the Windows Parition

ARM systems have a licked boot loader, so you can't implement this configuration

Which add-on enables users to send text or other media that you select in an IE browser window to another application, such as an email client, or an Internet resource, such as a blog?

Accelerators

You decide that the best option is to restore a previous version of this file

Access Control Panel, then select System and Security and click Restore your files with File History

You have a computer running Windows 7 Ultimate. You need to configure Windows Firewall to allow traffic for an application that dynamically opens multiple ports on an as-needed basis. What should you do?

Adda program exception.

You have a computer that runs Windows 7. The computer has a single hard disk with a single partition. Windows is installed on this partition. You decide that you would like to modify the existing volume to make it a RAID-1 volume to add fault tolerance to the volume. You add a new hard disk to the computer. You want to convert the volume to a RAID-1 volume using the least amount of effort possible. What should you do?

Add a mirror to the existing Volume.

You are the network administrator for *westsim.com*. The network consists fo a single Active Directory domain. All the servers run Windows Server 2012 and all the clients run Windows 8. You are responsible for a server named HV1 that has the Hyper-V role installed. HV1 hosts a virtual machine that runs a custom web application that is in use 24 hours a day. The virtual machine has one hard drive that is hosted on a 127 GB expanding virtual hard drive (.vhd). The server is running out of room. Management would like to upload 100 GB of new media files for use in the web application. You need to provide more storage space inside the virtual machine while minimizing the downtime for the custom web application. What should you do?

Add a new virtual hard dive (.vhd) to a SCSI controller.

You have a computer running Windows 7 Ultimate. You need to configure Windows Firewall to allow traffic for an application that dynamically opens multiple ports on an as-needed basis. What should you do?

Add a program exception.

You have a 32-bit computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7 Ultimate

Add more memory

You have a 32-bit computer that runs Windows XP Professional. You would like to upgrade the computer to Windows 7 Ultimate. Your computer has the following specifications: Service pack 2 1 GHz processor 512 MB RAM 256 MB video card 40 GB free disk space DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?

Add more memory

You have a computer running Windows 7 Professional. You have a custom application that will not run on the computer. The application works well on computers running a 32-bit installation of Windows XP Professional. You decide to use Windows XP mod to run the application. Your computer has the following hardware specification: C: drive with 62 GB of free space 1 GB of RAM, one additional socket available One Core 2 duo processor with Intel VT support Video card with 128 MB of memory with WDDM support You need the computer to run Windows XP mode. What should you do?

Add more memory

You have a computer running Windows 7 Professional. You have a custom application that will not run on the computer. The application works well on computers running in 32-bit installation of Windows XP Professional. You decide to use Windows XP mode to run the application. Your computer has the following hardware specifications: C: drive with 62 GB of free space. 1 GB of RAM, one additional socket available. One Core 2 duo processor with Intel VT support. Video card with 128 MB of memory with WDDM support. You need the computer to run Windows XP mode. What should you do?

Add more memory

You need to ensure that the hardware will support Windows 7 Home Premium

Add more memory

You are planning to install Windows 7 Home Premium edition on a new 64-bit computer. The computer has the following hardware specifications: 500 GB hard drive. 1 GB of RAM, one additional socket available. One Pentium 2.8 GHz processor, one additional socket available. Video card with 256 MB of memory. You need to ensure that the hardware will support Windows 7 Home Premium. What should you do?

Add more memory.

You are concerned about system performance while running the application

Add objects and counters in Performance Monitor

You have a computer that runs Windows 7. You have just installed a custom application. The application generates Event Viewer events and logs those events to the default Application and the Security logs in Event Viewer. You are concerned about system performance while running the application. You would like to be able to view the current statistics for processor, memory, and disk reads and writes. You only want to see these statistics and no others, and you want to be able to easily save the configuration so that the same statistics are shown each time. What should you do?

Add objects and counters in Performance Monitor.

On your Windows 7 computer, you share the D:\Reports folder using a sharename of Reports. You need to configure permissions on the shared folder as follows: Members of the Accounting group should be able to view files, but not modify them. Phil, a member of the Accounting group needs to be able to open and edit files in the shared folder. No one else should be allowed access. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Add the Accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission

On your Windows 7 computer, you share the D:\Reports folder using a sharename of Reports. You need to configure permissions on the shared folder as follows: ● Members of the Accounting group should be able to view files, but not modify them. ● Phil, a member of the Accounting group, needs to be able to open and edit files in the shared folder. ● No one else should be allowed access. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Add the Accounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission.

You share the D:\Reports folder on your Windows system using a share name of Reports. You need to configure permissions on the shared folder as follows: -Members of the Accounting group should be able to view files, but not modify them. -Phil, a member of the Accounting group, needs to be able to open and edit files in the shared folder. -No one else should be allowed access. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Add the Acounting group and assign the Read permission. Add the Phil user account and assign Read/Write permission.

You manage several Windows systems. Deskstop users access an in-house application that is hosted on you intranet Web server. When a user clicks a specific option in the application, they receive an error message that the popup was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do?

Add the URL of the Web site to the Local Intranet zone.

You manage several computers running Windows 7. Desktop users have an in-house application that is hosted on your intranet Web server. When a user clicks a specific option int he application, they receive an error message that the popup was blocked. You need to configure the security settings so that users can see the pop-up without compromising overall security. What should you do?

Add the URL of the Web site to the Local Intranet zone.

You would like configure Even Subscriptions on you Windows system to forward events to a network server. You need to configure you computer as a source computer for a collector initiated subscription. Which of the following will be part of your configuration?

Add the collector computer to the Event Log Readers group. Run winrm qc.

You need to configure the client computers for the DirectAccess connection

Add the computer account for each client computer to the DirectAccessGroup security group

desktop users access an in-house application

Add the filter level in pop-up blocker to High

You verify that your user account has permission to access the Web site

Add the internal Web site to the Local intranet zone

You manage several computers running Windows 7. All computers are members of the domain. You use an internal Web site that uses Integrated Windows Authentication. You attempt to connect to the Web site and are prompted for authentication. You verify that your user account has permission to access the Web site. You need to ensure that you are automatically authenticated when you connect to the Web site. What should you do?

Add the internal Web site to the Local intranet zone.

You have a computer that runs Windows 7. The computer has a single hard disk with a single volume that takes up the entire hard disk. You need to create a new volume named 'Video' for storing digital video files that are used as you create music videos. You want the new volume to optimize performance; fault tolerance is not needed. What should you do?

Add two hard disks. Convert both disks to dynamic. Create a new striped volume using both disks.

What RAID levels are supported by Windows Server 2012?

RAID levels 0, 1, and 5

You manage encrypted files or folders using the *Cipher* command. Drag the specific *Cipher* command on the left and drop it on the function performed on the right.

Adds a recovery agent key > *Cipher /u* Generates recovery agent keys > *Cipher /r* Creates a new file encryption key > *Cipher /k* Displays the encryption state > *Cipher* Changes the certificate used to encrypt files > *Cipher /rekey*

Which Intune portal should you use to perform a remote wipe

Admin Portal

Which Intune portal should you use to remote change the password

Admin Portal

Your company uses virtualized servers extensively and has many offline VMs. A role must be added to some offline VHDs. What do you do?

After selecting Add Roles and Features, you can browse for the offline VHD.

You have several Windows 7 computers in a domain network. When you install software on the new computers, you discover that it does not run because User Account control (UAC) causes it to fail. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with UAC. What can you do to get the application to work with UAC? (Choose the best solution.)

Alter the program settings to 'Run this program as an administrator'

You have several Windows 7 computers in a domain network. When you install software on the new computers, you discover that it does not run because User Account Control (UAC) causes it to fail. Because the accounting program was designed by the company and it will not be upgraded anytime soon, you must get it to work as is with UAC. What can you do to get the application to work with UAC? (Choose the best solution.)

Alter the program settings to *Run this program as an administrator*.

What is an XML script that provides the Windows 7 Setup program with the information it needs to perform an unattended installation?

Answer file

File and Storage Services falls into which of the following basic role categories:

Application Services

You manage a Windows 7 computer. You need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files. Mary needs to be able to open and view files, but should not be able to modify the files. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible. What should you do?

Assign Allow Read & execute, List folder contents, Read, and Write to the Accounting group. For the Mary user account, Deny the Write permissions.

You manage a Windows 7 computer. You need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open and view all files but not modify them. Mary needs to be able to modify existing files in the folder, add new files to the folder, but should not be able to delete or rename files. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible. What should you do?

Assign Allow Read & execute, List folder contents, and Read to the Accounting group. Assign Allow Write to Mary.

You manage a Windows 7 computer. You need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files. Mary needs to be able to modify existing files the folder, add new files to the folder, but should not be delete or rename files. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible. What should you do?

Assign Allow Read & execute, List folder contents, and read to the Accounting group. Assign Allow Write to Mary.

You manage a Windows 7 computer. You need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open and view all files but not modify them. Mary needs to be able to modify existing files in the folder, add new files to the folder, but should not be able to delete or rename files. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible. What should you do?

Assign Allow Read & execute, List foldler contents, and Read to the Accounting group. Assign Allow Write to Mary.

On your Windows 7 computer, you share the D:\Apps folder using a sharename of Apps. You need to configure permissions to share as follows: Members of the Appusers group should be able to open and view files in the shared folder. User JohnS should not have any access to file in the shared folder. JohnS is a member of the Appusers group. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Assign Allow Read permission to Appusers, and assign Deny Read permission to JohnS

On your Windows 7 computer, you share the D:\Apps folder using a sharename of Apps. You need to configure permissions to the share as follows: Members of the Appusers group should be able to open and view files in the shared folder. User JohnS should not have any access to files in the shared folder. JohnS is a member of the Appusers group. You need to assign the necessary permissions without assigning extra permissions beyond what is required and without affecting other access that might already be configured on the computer. You need to complete the task using the least amount of effort possible. What should you do?

Assign Allow Read permission to Appusers, and assign Deny Read permission to JohnS.

You manage a computer that runs Windows 7. The computer has a shared printer named Printer1. You want to let Chat pause, restart, and delete print jobs on the printer. Chad should not be allowed to delete the printer or change its properties. Chad is a member of the Sales group. Currently, the Everyone group has the Allow Print permission to the printer. What should you do?

Assign Chad the Allow Manage Documents permission to the printer.

You manage a Windows 7 computer with a printer that is used by the Sales department. The sales manager has asked you to restrict access to the printer as follows: ● Sally needs to connect to a printer, print documents, and pause and resume her own print jobs. ● Damien needs to pause and resume documents for all users, but does not need to change printer properties. You want to assign the most restrictive permissions that meet the sales manager's requirements. What should you do? (Choose two. Each choice is a required part of the correct solution.)

Assign Sally the Print permission. Assign Damien the Manage Documents permission.

You need to identify what is preventing the computer from entering sleep mode

At a command prompt, run powerfg /energy

You have configured BranchCache on client computers in your branch office to use Distributed Cache mode. You want to view the status of the BranchCache configuration on a Windows 7 client computer. What should you do?

At a command prompt, run the 'Netsh' command with the appropriate BranchCache parameters.

You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you insert the third-party drivers from the C:\Drivers\Network and C:\Drivers|Custom directories into the system image. What should you do? (Select two. Both answers are complete solutions.)

At the command prompt, run dism /add-driver /driver:c:\drivers\network /driver:c:\drivers\custom At the command prompt, run dism /add-driver /driver:c:\drivers /recurse

You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. You have created an answer file called Win7ProfAnswer.xml in the E\Images\Answerfiles folder. You want to apply the answer file to the image. What should you do?

At the command prompt, run dism /apply-unattend:e:\images\Answerfiles\Win7ProfAnswer.xml

You need to deploy Windows 7 Professional to multiple new computers using a previously captured system image. Before deploying the image, you need to make sure there is a specific Windows application on the image. What should you do?

At the command prompt, run dism /get-appinfo At the command prompt, run dism /get-apps

You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. Before deploying the image, you need to make sure there is a specific Windows application on the image. What should you do? (Select two. Both answers are complete solutions.)

At the command prompt, run dism /get-apps At the command prompt, run dism /get-appinfo

You are working on a computer running Windows 7. You recently installed a device that you only need temporarily. After several days of using the device, you remove it from the computer, and now you would like to remove the device driver as well. What should you do? (Select two. Both answers are complete solutions.)

At the command prompt, run pnputil -d. In Device Manager, uninstall the device.

Prior to capturing a system inage

At the command prompt, run sysprep.exe /generalize

You have a computer running Windows 7 Ultimate. Prior to capture the system image, you need to remove machine-specific information from the installation. What should you do?

At the command prompt, run sysprep.exe /generalize

You have a computer running Windows 7 Enterprise. You plan to capture the installation on this computer and use the image to deploy to other computers. You create an answer file named win7ent_answer.xml with Windows SIM. You want to remove computer-specific information and apply the settings in the answer file before you capture the installation. What should you do?

At the command prompt, run sysprep.exe/audit/oobe/unattend:win7ent_answer.xml

You create an answer file names win7ent_answer.xml

At the command prompt, run sysprep.exe/generalize/oobe/unattend:win7ent_answer.xml

You have a computer running Windows 7 Enterprise. You plan to capture the installation on this computer and use the image to deploy to other computers. You create an answer file named win7ent_answer.xml with Windows SIM. You want to remove computer-specific information and apply the settings in the answer file before you capture the installation. What should you do?

At the command prompt, run sysprep.exe/generalize/oobe/unattend:win7ent_answer.xml

You have a computer running Windows 7 Ultimate. Prior to capturing the system image, you need to remove machine-specific information from the installation. What should you do?

At the command prompt, run sysprep.ext/generalize

You have a computer that runs Windows 7. As part of the regular system maintenance, you are checking Performance Monitor statistics and event log events. You notice that there are several error events listed with the same ID number and description that sounds as if the error is related to system hardware. you check your Performance Monitor logs but don't notice anything unusual around the time that the events were generated. You would like to get an e-mail every time the event is logged so you can check the system statistics at the moment. What should you do?

Attach a task to the event

You would like to get an e-mail every time the event is logged so you can check the system statistics at that moment

Attach a task to the event

You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management

Attach the VHD

You would like to perform offline servicing of the image in the VHD file to add a driver and enable some Windows features

Attach the VHD file

You have a computer that runs Windows 7 Enterprise. You have created a VHD file that contains a Windows 7 installation image. The VHD file is currently not attached. You would like to perform offline servicing of the image int he VHD file to add driver and enable some Windows features. What should you do first?

Attach the VHD file.

You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the image on the Windows installation disc. You have downloaded the Windows AIK tools. You create a virtual disk file using Disk Management. What should you do next?

Attach the VHD.

You have several computers running Windows 7 Enterprise. The computers are members of a domain. You are configuring security settings that will be distributed to all computers on you network. You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions. Select the Audit Policy that will meet this requirement.

Audit Object access

You have several computers running Windows 7 Enterprise. The computers are members of a domain. You are configuring security settings that will be distributed to all computers on you network. You want to identify denied attempts to change a user's group membership in a computer's local database. Select the Audit Policy that will meet this requirement.

Audit account management

You manage several Windows systems that are members of a domain. You are configuring security settings that will be distributed to all computers on your network. You want to identify denied attempts to manipulate files on computers that have been secured through NTFS permissions. Select the Audit Policy that will meet this requirement.

Audit object access

Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources?

Authorization

Where is the boot menu configuration stored?

BCD registry file

You have a computer that runs Windows 7. the computer has a removable disk drive that has been formatted with NTFS. You want the drive to use FAT32 to be compatible with more operating systems. The drive is currently configured using drive letter D:. What should you do?

Back up the data on the D: drive. Reformat the D: drive using FAT32. Restore the data.

You need to use command line tools to prepare the default drive on a Windows System for use by BitLocker

Bdehdcfg -target default -size 500

You have created an answer file called Win7ProfAnswer.xml in the E:\Images\AnswerFiles folder. You want to apply the answer file to the image

Before deploying the image, you need to see a list of all the drivers included in the image

Which feature should you implement

BitLocker

What technology is used to encrypt removable USB devices?

BitLocker To Go

You need to start the computer using the least amount of effort (F8)

Boot from the installation disc and restore to a restore point

You have a computer that runs Windows 7. You install a new application. During installation, the computer reboots but does not start. Pressing F8 during startup has no effect. You need to start the computer using the least amount of effort. What should you try next?

Boot from the installation disc and restore to a restore point.

You have a computer that runs Windows 7. You have recently made some changes to your system. Things seemed to run fine for several days. Today, your computer started to be unstable. Shortly after logging on, the system crashes and hangs. Which of the following will most likely correct the problem in the least amount of time?

Boot into Safe Mode and restore to a restore point.

You have a computer that runs windows 7. You have recently made some changes to your system. Things seemed to run fine for several days. Today, your computer has started to be unstable. Shortly after logging on, the system crashes and hangs. Which of the following will most likely correct the problem in the least amount of time?

Boot into Safe Mode and restore to a restore point.

After removing machine-specific information from the computer, you are ready to capture the image as a WIM file

Boot to Windows PE and use ImageX to capture the Windows installation onto a network share

You have a computer running Windows 7 Ultimate. To deploy Windows 7, you want to use the Windows 7 installation on this computer as a system image. After removing the machine-specific information from the computer, you are ready to capture the image as a WIM file.

Boot to Windows PE and use ImageX to capture the Windows installation onto a network share.

You work for a company with headquarters in Seattle and an office in Olympia. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. All servers are located in the Seattle office, and shared files are stored on those servers. You want to improve file access for users in the Olympia office to meet the following requirements: * Copies of files should be saved on the client computers in the Olympia office. * Only a single copy of each file should exist in the Olympia office. * Files should only be transferred once from the Seattle office to the Olympia office (unless the file has changed). * Copies of the files in the Olympia office should be shared and available to all computers in that office. * Files should be encrypted during transit between the two offices. Which features should you implement in the Olympia office?

BranchCache

You decide to create an executable rule with a publisher

Browse and select the executable file for the application. Modify the rule to include the product name information

You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should use the digital signature of the software and apply to all current and future versions of the application, regardless of the filename or its location. You decide to create an executable rule with a publisher condition using application control policies. What should you do?

Browse and select the executable file for the application. Modify the rule to include the product name information.

You have a windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should use the digital signature of the software and apply to all current and future versions of the applications, regardless of the filename or its location. You decide to create an executable rule with a publisher condition using application control policies.

Browse and select the executable file for the application. Modify the rule to include the product name information.

You have a windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should use the digital signature of the software and apply to all current and future versions of the applications, regardless of the filename or its location. You decide to create an executable rule with a publisher condition using application control policies. What should you do?

Browse and select the executable file for the application. Modify the rule to include the product name information.

What technology is used with IE 8 to help defend against phishing?

SmartScreen Filtering

You have a computer running Windows 7 Enterprise. You need to change how Windows provides notifications when the firewall blocks a new program. Select the link that you would choose to make this change.

Change notification settings

You have a computer running Windows 7 Enterprise. You need to change how Windows provides notifications when the firewall blocks a new program. Select the link that you would choose to make this change.

Change notification settings.

On your Windows 7 computer, you share the D:\Promo folder using a sharename of Promo. The share has been assigned the following permissions: User/Group Permission Telesales group Allow Read Training group Deny Full Control Managers group Allow Change Mary user Allow Change The Mary user account is a member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do? (Choose two. Each choice is a possible solution.)

Change the Training group permission to allow Read. Remove the Mary user account from the Training group.

C:\Windows\system32> netsh branchcache show status all BranchCache Service Status: -------------------------------------- Service Mode = Hosted Cache Client (Set By Group Policy) Current Status = Running Service Start Type = Manual Hosted Cache Location = http://file1.mydomain.com (Set By Group Policy) Local Cache Status: ----------------------------- Maximum Cache Size = 5% of hard disk Active current Cache Size = 0 Bytes Local Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistRepub ( Default) Publication Cache Status: ------------------------------------- Maximum Cache Size = 1% of hard disk Active Current Cache Size = 0 Bytes Publication Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistPub (Default) Networking Status: ----------------------------- Content Retrieval URL Reservation = Configured (Required) Hosted Cache URL Reservation = Configured (Not Required) SSL Certificate Bound to Hosted Cache Port = Not configured (Not Required) Content Retrieval Firewall Rules = Enabled (Required) Peer Discovery Firewall Rules = Disabled (Not Required) Hosted Cache Server Firewall Rules = Disabled (Not Required) Hosted Cache Client Firewall Rules = Enabled (Required) You have a computer that runs windows 7 Ultimate. You work out of a branch office with BranchCache configured. The configuration caches files on a server in the branch office. Only HTTP and not SMB traffic is cached on the server. All file transfers should use encrypted communications. you run the 'netsh' command on your client computer and see the output listed in the image. How should you modify the client configuration?

Change the hosted cache location to file1.mydomain.com.

You have a laptop that runs Windows 7. You connect your laptop to the network at work to allow an associate to copy files from your computer. Other computers on the network are not able to discover your computer, and your computer is not able to build an accurate network map in the Network and Sharing Center. You open the Network and Sharing Center and see the information shown in the image. What should you do?

Change the network type to Home

You have a laptop that runs Windows 7. You connect your laptop on the network at work to allow an associate to copy files from your computer. Other computers on the network are not able to discover your computer, and your computer is not able to build an accurate network map in the Network and Sharing Center. You open the Network and Sharing Center and see the information shown in the image. What should you do?

Change the network type to Home.

You have a laptop running windows 7 Enterprise. You connect an external USB hard drive to the laptop to access specific data files. After editing the files, you need to disconnect the external USB hard drive. You do not want to lose your work on the data files. With the least amount of effort, you want to remove the USB hard drive from the laptop. What should you do?

Check the drive's 'Policies' tab and ensure that the 'Quick Removal' option is selected, then remove the USB connector.

With the least amount of effort

Check the drive's Polices tab and ensure that the Quick Removal option is selected, then remove the USB connector

You want to use the Backup and Restore console to schedule regular backups

Choose an external hard drive as the backup destination

You have a computer running Windows 7 Home Premium. The computer has a single hard drive. You want to use the Backup and Restore console to schedule regular backups. Backups will include all user data files and a system image backup. You want the backups to run unattended. What should you do?

Choose an external hard drive as the backup destination.

You can manage encrypted files or folder using the 'Cipher' command. Describe each command line's behavior. Cipher Cipher /k Cipher /r Cipher /rekey Cipher /u

Cipher by itself displays the encryption state of a folder or the files it contains. Cipher /k creates a new file encryption key for the user running Cipher. Cipher /r generates recovery agent keys. Cipher /rekey changes the certificate used to encrypt files. Cipher /u updates (or adds) encryption keys or recovery agent keys if they have changed.

In what class is the address of 156.43.75.212?

Class A

Your company will upgrade to Windows Server 2012. The present environment is Windows Server 2008 R2 servers or higher. What is the best path to upgrade to Windows Server 2012?

Clean installation of Windows Server 2012.

You would like to save all messages in the Application log

Clear the filter, then save the log

You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application log in Event Viewer. While troubleshooting the problem, you create a filter for the log that shows only the Warning and Error messages. You would like to save all messages in the application log (including Informational messages) so you can copy them to another computer and examine them there. What should you do?

Clear the filter, then save the log.

You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. you want to implement BranchCache in the Olympia office using Hosted Cache mode. Which of the following vest describes the infrastructure requirements?

Clients running Windows 7 Ultimate or Enterprise; server running Windows Server 2008 R2 in Olympia; Active Directory Certificate Services

When you originally deployed the AccServer virtual machine on your Windows Server 2012 hypervisor, it stored accounting data from all departments in your orgranization and therefore required a very large virtual disk. However, as your organization has grown, additional department-specific accounting servers have been deployed and much of the data that used to be stored on AccServer has been migrated to them. Because the virtual hard disk file for the AccServer virtual machine is set to grow dynamically, the now unused space in the file can now be reclaimed on the physical hard drive in the Windows server. Click on the option you would use in the Edit Virtual Hard Disk Wizard to do this without reducing the overall storage capacity of the virtual hard disk.

Compact

You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. The virtual machine uses a single dynamic disk of 100 GB. You notice that the physical size of the virtual hard disk is 40 GB, but that the virtual machine reports only a total of 20 GB of files. You want to reduce the physical space used by the virtual hard disk. What should you do?

Compact the disk.

What program do you use to manage fully all local users and group accounts on a computer running Windows 7?

Computer Management console

You need to configure the computer to use BitLocker

Configure BitLocker to use a startup key on a USB drive

You need to address this problem and easily provide the appropriate access to these shared files

Configure Offline Files for the folder that contains thses files

You would like these other updates to download and install automatically

Configure Windows Update to include recommended updates

You have a computer that runs Windows 7. Your computer is configured to download and automatically install important (critical) patches using Windows Update. You notice that updates that Microsoft suggests, but does not mark as important, are not being downloaded. You would like these other updates to download and install automatically with the least amount of effort. What should you do?

Configure Windows Update to include recommended updates.

You have a computer that runs Windows 7. Your computer is configured to download and automatically install important (critical) patches using Windows Update. You notice that updates that Microsoft suggests, but does not mark as important, are not being downloaded. You would like these other updates to download and install automatically with the least amount of effort. What should you do?

Configure Windows Update to included recommended updates.

You have a program that ran on your Windows XP machine that was running SP2. You try to install the program on Windows 7, but it does not run. What should you try first to overcome this problem?

Configure a Windows emulation mode.

You are concerned about the disk space use on the computer

Configure a performance counter alert

You have a shared computer that runs Windows 7. You are concerned about the disk space use on the computer. You would like to be notified by e-mail when the used disk space exceeds 85%. What should you do?

Configure a performance counter alert.

You need to configure the following power options on your Windows notebook system when running on battery power:

Configure the advanced settings of any power plan

You will use a custom image to install Windows 7 on each computer, you want the setup program for an application to run automatically

Configure a task in MDT

You need to automate the installation of Windows 7 to multiple computers. None of the computers will be a member of a domain. You will use a custom image to install Windows 7 on each computer. Following Windows installation, you want the setup program for an application to run automatically. What should you do?

Configure a task in MDT.

You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office using Distributed Cache mode. Using Group Policy, you enable the following policies: * Turn on BranchCache * Set BranchCache distributed Cache mode What else is required to complete the configuration?

Configure advance firewall rules to allow the necessary ports.

You manage a computer running Windows 7. You would like to configure your system so that an event is recorded any time a user successfully or unsuccessfully logs on. You do not want to record events related to logoff. What should you do?

Configure advanced audit policies in the local security policy

You have just received a new laptop at work that you will use on your company network and at home. The company network uses dynamic addressing, while your home network uses static addressing. You connect the laptop to the company network and everything works fine. When you take your laptop home, you cannot connect to devices on your home network or the Internet. You run ipconfig on the laptop and receive the following output: Connection-specific DNS Suffix : IP Address : 169.254.22.74 Subnet Mask : 255.255.0.0 Default Gateway : You need to be able to connect to both the company network and your home network with the least amount of configuration and cost. What should you do?

Configure an alternate TCP/IP configuration.

You manage a Windows system

Configure an excutable rule in application control policies with a publisher condition

You manage a computer that runs Windows 7. You would like to prevent users from running all software on the computer except for software that has been digitally signed. The rule should apply to all known and unknown software. What should you do?

Configure an executable rule in application control policies with a publisher condition.

You manage a computer that runs Windows 7. You would like to prevent users from running all software on the computer except for software that has been digitally signed. The rule should apply to all known and unknown software. What should you do?

Configure an executable rule in application control policies with a publisher condition.

You have a Windows 7 computer shared by multiple users. The computer has a single hard disk with a single partition. You want to make sure that each user can only save up to 4 GB of files on the existing hard disk. Files stored to USB devices should not count towards the limit. What should you do?

Configure disk quotas.

You have a small wireless network with 10 client computers configured in a workgroup. You upgraded the firmware on two wireless devices so you can use a better security standard than WEP. Now you need to implement the new security standard. You need the greatest amount of security with the least amount of effort, and without replacing any of the wireless infrastructure. What should you do? (Select two.)

Configure each client with the same key. Implement WPA-PSK.

You would like to send all events from the application to a fourth computer where you can save and view the logs

Configure event subscriptions

You mange three computers that run windows 7 and a custom application. The application generates Event viewer events and logs those events to a custom log for the application. You would like to send all events from the application to a fourth computer where you can save and view the logs. What should you do?

Configure event subscriptions.

You have several computers running Windows 7 Ultimate. The computers are members of a workgroup. You need to create many custom firewall rules on each computer. The rules must be specific for the Private network profile. You should complete the task with the least amount of effort as possible. What should you do? (Select two. Each answer is a complete solution.)

Configure one computer with the Windows Firewall with Advanced Security MMC snap-in. Then use the same tool to export the settings and import settings on the remaining machines. Configure one computer. Use *Netsh advfirewall* to export the firewall settings. Import the settings on the remaining machines.

You have a Windows 7 computer that you manage at work. Because of the security requirements of your company, you need to prevent all users from being able to use USB flash devices on this computer. What should you do?

Configure removable storage policies in the local security policy.

You manage 20 computers running Windows 7 in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. What should you do?

Configure the 'User Account Control" Behavior of the elevation prompt for standard users' setting in Group Policy to 'Prompt for credentials.'

You manage 20 computers running Windows 7 in a domain network. You want to prevent the Sales team members from making system changes. Whenever a change is initiated, you want to allow only those who can enter administrator credentials to be able to make the change. What should you do?

Configure the *User Account Control: Behavior of the elevation prompt for standard users* setting in Group Policy to *Prompt for credentials*.

In addition to accessing the intranet resources, you need to access the Internet while the VPN connection is active

Configure the advanced TCP/IP settings of the VPN connection

You use a VPN connection on your Windows desktop system to access resources on a corporate intranet. In addition to accessing the intranet resources, you need to access the Internet while the VPN connection is active; however, you do not want to send Internet traffic through the VPN connection. What should you do?

Configure the advanced TCP/IP settings of the VPN connection.

You have a computer running Windows 7 Professional. The computer is a member of a domain. You need to configure the wireless network card to connect to your network at work. The connection should use a user name and password for authentication with AES encryption. What should you do?

Configure the connection to use WPA2-Enterprise.

You want to connect a laptop computer running Windows 7 to a wireless network. The wireless network uses multiple access points and WPA2-Personal. You want to use the strongest authentication and encryption possible. SSID broadcast has been disabled. What should you do?

Configure the connection with a preshared key and AES encryption.

You want to configure your Windows system such that write access to removable storage devices is only allowed on drives protected with BitLocker To Go

Configure the local security policy

While managing the available memory for applications on you Windows system

Configure the paging file to 1.5 times the amount of physical RAM

You have a computer running Windows 7 Professional. While managing the available memory for applications, you need to increase the paging file to the recommended size for normal circumstances. What should you do?

Configure the paging file to 1.5 times the amount of physical RAM.

You use an external USB hard drive to store data

Configure the write caching drive polices for better performance

You need to increase the access speed of the hard drive

Configure the write caching drive policies for better performance

You have a computer running windows 7 Enterprise. You use an external USB hard drive to store data files. You often find yourself waiting as Windows writes data to the external drive. Although it is portable, you rarely remove the external drive from the computer. You need to increase the access speed of the hard drive. What should you do?

Configure the write caching drive policies for better performance.

You manage a laptop that runs Windows 7. The laptop is shared by members of the Sales team. Sales team members use standard user accounts to log on to the computer. You want to allow users to change the system time and the time zone. You need to grant them this ability while limiting their ability to perform unrelated tasks. What should you do?

Configure user rights for the Sales group in the local security policy.

You have an executive who needs her print jobs handled above those of others. How would you accomplish this advanced printing configuration?

Connect multiple print servers to a single print device

You have a new laptop computer running Windows 7 Professional. You need to connect your computer to a wired network at work and a wireless network at home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. In Devices and Printers, you click Manage default printers. Your home wireless network does not appear in the list of available networks. What should you do?

Connect to the wireless network.

You manage a Windows 7 computer. One day you are downloading some new mp3 files to your computer. You save the files directly to the music library on your computer. You want to copy the new files to a different folder on your computer. You view the properties of the Music library and see the dialog shown in the image. What should you do?

Copy the new files from the C:\Users\Public\Public Music folder.

Which program or component includes User Accounts?

Control Panel

You want to create a system image backup with the D: volume as the destination

Convert the D: drive to NTFS

You have a computer running windows 7 Professional with two volumes. The C: volume contains system settings and is formatted with NTFS. The D: volume is formatted with FAT32. You want to create a system image backup with the D: volume as the destination. What should you do?

Convert the D: drive to NTFS.

You currently manage a virtual machine named VM12 that has been installed on the Srv5 physical server. The virtual machine uses a single fixed disk of 100 GB saved in the vdisk1.vhd file. Physical disk space on the server is getting low. When you run Disk Management within the virtual machine, you notice that only 30 GB of space is being used, but the vdisk1.vhd file occupies 100 GB. You want to reduce the physical size of the virtual hard disk What should you do?

Convert the disk to a dynamically expanding disk named vdisk2.vhd. Delete vdisk1.vhd, and rename vdisk2.vhd to vdisk1.vhd.

You manage a Windows 7 computer. One day you are downloading some new mp3 files to your computer. You save the files directly to the Music library on your computer. You want to copy the new files to a different folder on your computer. You view the properties of the Music library and see the dialog shown in the image. What should you do?

Copy the new files from the 'C:\Users\Public\Public Music' folder.

You are downloading some new mp3 files to your Windows 7 system. You save the file directly to the Music library on your computer. You want to copy the new files to a different folder on your computer. You view the properties of the Music library and see the dialog shown in the image. What should you do?

Copy the new files from the C:\Users\Public\Public Music folder.

You are using USMT to migrate only the user profiles and user data from ComputerA to ComputerB. You need to specify the rules used for the migration to include all .jpg files

Create a custom XML file and then use <include> statements to specify the file types to be included in the migration

You have tow computers that run Windows 7 Home Premium: Comp1 and Comp2. Both computers are members of a HomeGroup; neither computer is a domain member. On Comp1, you share the C:\Files folder with the HomeGroup. The C:\Files\data.doc file is encrypted. From Comp2, you can access all of the files in the C:\Files folder except for the data.doc file. What should you do?

Copy your private key from Comp1 to Comp2.

You have two computers that run Windows 7 Ultimate: Comp1 and Comp2. Both computers are members of a HomeGroup; neither computer is a domain member. On Comp1, you share the C:\Files folder with the HomeGroup. The C:\Files\data.doc file is encrypted. From Comp2, you can access all of the files in the C:\Files folder except for the data.doc file. What should you do?

Copy your private key from Comp1 to Comp2.

Which script is used to create the Windows PE build?

Copype.cmd

You have decided to install multiple virtual servers, all running Windows Server 2011, on a single physical computer. You install Hyper-V on a server that is running Windows Server 2012 Datacenter edition. You need to install the following virtual machines: 3 servers running the Windows Server 2008 Standard edition (32-bit) 4 servers running the Windows Server 2008 R2 Standard edition (64-bit) 3 Servers running the Windows Server 2012 Datacenter edition (64-bit) To conserve disk space, you decide to use parent and differencing disks. You need to create the virtual hard disks used by the virtual machines. What should you do?

Create 3 fixed disks and 10 differencing disks.

Your company has started the transition to IPv6. You need to configure records on the DNS server so that clients can submit a host name query and receive back an IPv6 address for the specified host. What should you do?

Create AAAA records

Your company has started the transition to Ipv6. You need to configure records on the DNS server so that clients can submit a host name query and receive back an IPv6 address for the specified host. What should you do?

Create AAAA records

Your company has started the transition to Ipv6. You need to configure records on the DNS server so that clients can submit an IPv6 address and receive back the host name for that computer. What should you do?

Create PTR records.

You need to specify the rules used for the migration to include all .vmx and .vdmk files. What should you do?

Create a custom XML file and use <include> elements

As you monitor the application, you'd like to be able to do the following

Create a custom view

You have a computer that runs Windows 7 and a custom application. The application generates Event Viewer events and logs those events to the default Application and Security logs in the Event Viewer. As you monitor the application, you'd like to be able to do the following: * View all events related to the application from a single log. * View only the events related to the application and no others. * View the necessary events with minimal future configuration. * Save the Event Viewer configuration so that you can easily export and import the solution to other servers that will be running the application. What should you do?

Create a custom view.

You have been put in charge of installing Windows 7 on 15 new computers. You use Windows Deployment Services (WDS) to install the operating system on ten of the computers. You find, however, that the remaining five computers do not have the PXE support. You need to install Windows 7 on the remaining five computers with as little effort as possible. What should you do?

Create a discover boot image and convert it to an ISO image. Burn the ISO image to CD. Boot each computer to the CD, connect to the WDS server, and complete the installation.

You need to install Windows 7 on the remaining five computers with as little effort as possible

Create a discover boot image and convert it to an ISO image. Burn the ISO image. Burn the ISO image to CD. Boot each computer to the CD, connect the WDS server, and complete the installation

You manage a Windows 7 computer that is shared by multiple users. You want to prevent users from running a common game on the computer. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create a Software Restriction policy rule to protect your computer. What should you do?

Create a hash rule.

You manage a Windows 7 computer that is shared by multiple users. You want to prevent users from running a common game on the computer. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create a Software Restriction policy rule to protect your computer. What should you do?

Create a hash rule.

You manage a Windows 7 computer on a small home network. You want to share the following folders on your computer with users on the network: * D:\Clipart * D:\Fonts * D:\VacationPictures You want to allow access meeting the following requirements: * Users will access all folders through a single share. * The share should include only these folders and no others. * The folders should remain in their current locations in the file system structure. What should you do?

Create a library. Add all folders to the library. Share the library with the HomeGroup.

You manage a Windows 7 computer on a small home network. You want to share the following folders on your computer with users on the network: D:\Clipart D:\Fonts D:\VacationPictures You want to allow access meeting the following requirements: Users will access all folders through a simple share. The share should include only these folders and no others. The folders should remain in their current locations in the file system structure. What should you do?

Create a library. Add all folders to the library. Share the library with the HomeGroup.

You manage a Windows system on a small home network. You want to share the following folders on your computer with other users on the network: D:\Clipart D:\Fonts D:\VacationPictures You want to allow access to these folders while still meeting the following requirements: Users will access all folders through a single share. The share should include only these folders and no others. The folders should remain in their current location in the file system structure.

Create a library. Add all folders to the library. Share the library with the HomeGroup.

You manage a Windows system on a small home network. You want to share the following folders on your computer with other users on the network: -D:\Clipart. -D:\Fonts. -D:\VacationPictures. You want to allow access to these folders while still meeting the following requirements: -Users will access all folder through a single share. -The share should include only these folders and no others. -The folders should remain in their current locations in the file system structure. What should you do?

Create a library. Add all folders to the library. Share the library with the Homegroup.

You have a computer that runs Windows 7. Your computer has a single hard disk with a single volume used by the C:\ drive. You have previously upgraded the disk to a dynamic disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer. You need to add space to the C: volume as quickly as possible. What should you do?

Create a mount point using space on the second disk.

You want to allow only members of the Sales Team

Create an Executable rule with a publisher condition in application control policies

You decide to create a software restriction policy

Create an Internet zone rule

You attach each VHD file

Create an Unattend file with entries in the offlineServicing section. Run Dism to apply the file to each image

As part of your responsibilities, you manage multiple VHD files that contain bootable Windows images. You need to make multiple changes to the image within each of the VHD files. Each image will get the same list of updates. You want to update the images without booting to each VHD file. You attach each VHD file. What should you do next?

Create an Unattend file with entries in the offlineServicing section. Run Dism to apply the file to each image.

You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not be using WDS or MDT for the installation. When you start each computer, you would like the computer to boot and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?

Create an Unattended file on a USB drive. One each computer, edit the BIOS to boot from the optical drive firist. Insert the Windows installation disc into the DVD drive and the USB drive into a USB port.

You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You will not be using WDS or MDT for the installation. When you start each computer, you would like the computer to boot and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?

Create an Unattended file on a USB drive. One each computer, edit the BIOS to boot from the optical drive first. Insert the Windows installation disc into the DVD drive and the USB drive into a USB port.

To save time

Create an answer file named autonattend.xml. Place the file on a USB flash drive, and rum setup.exe

You intend to install Windows 7 by using a Windows 7 installation DVD on several computers. To save time, you would like to automate the installation of Windows 7 for each computer. What should you do?

Create an answer file named autounattend.xml. Place the file on a USB flash drive, and run setup.exe.

you intend to install Windows 7 using Windows 7 installation DVD on several computers. To save time, you would like to automate the installation of Windows 7 for each computer. What should you do?

Create an answer file named autounattend.xml. Place the file on a USB flash drive, and run setup.exe.

You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. If possible, the rule should apply to all current and future versions of the application, regardless of the filename or its location. The application is not digitally signed. What should you do?

Create an executable rule with a file hash condition in application control policies.

You have a Windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should apply to all current and future versions of the application, regardless of the filename or its location. What should you do?

Create an executable rule with a publisher condition in application control policies.

You have a windows 7 computer that is shared by multiple users at work. You want to allow only members of the Sales team to run the sales lead application. The rule should apply to all current and future versions of the application, regardless of the filename or its location. What should you do?

Create an executable rule with a publisher condition in application control policies.

You have several computers running Windows 7 Ultimate. Corporate policy states that a specific connection-oriented application must be blocked from accessing the Internet. You must use Windows Firewall with Advanced Security to complete the task.

Create an outbound rule blocking the corresponding TCP port on each machine.

You have several computers running Windows 7 Ultimate. Corporate policy states that a specific connection-oriented application must be blocked from accessing the Internet. You must use the Windows Firewall with Advanced Security to complete the task. What should you do?

Create an outbound rule blocking the corresponding TCP port on each machine.

When you start each computer

Create an unattend file on a USB drive. On each computer, edit the BIOS to boot from the optical drive first. Insert the Windows installation disc into the DVD drive and the USB drive into a USB port

You want to allow only members of the Sales Team to run the sales lead application

Create and executable rule with a file hash condition in application control policies

You have a small home network with the following computers: Comp1 runs Windows 7 Home Comp2 runs Windows 7 Home Premium Comp3 runs Windows 7 Professional You want to create a HomeGroup for your network. Which of the following should be part of your configuration? (Select the two most correct answers. Each choice is a required configuration step.)

Create the HomeGroup on Comp2 or Comp3. Set the network location to Home.

Which Internet Explorer security feature blocks

Cross-Site Scripting filter

You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 64-bit version

Custom (advanced)

You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 64-bit version.

Custom (advanced)

Which of the following is NOT an available security zone found in Internet Explorer?

Custom Sites

What is a command line tool that installers can use to mount, edit, and upgrade image files in the Windows Imaging format?

DISM.exe

You have a Windows image file for Windows 7. You need to add a device driver to the image file. What utility should you use?

DISM.exe

What user account has the ability to recover BitLocker drives for an entire organization?

Data recovery agent

You have a computer that runs Windows 7. The second hard disk in the computer has been assigned D: as the drive letter. The volume is formatted with NTFS. You decide that you would like to modify the D: volume to make it a RAID-0 volume. You want to convert the volume to a RAID-0 volume using the least amount of effort and expense as possible. What should you do?

Delete the existing volume. create a new striped volume. Restore data to the volume from a backup.

You want to use your Windows notebook to connect to your corporate intranet while you are at home or traveling

DirectAccess

You read about File History and want to implement it in this system

Disable Windows 7 Recovery on the system

You have set up the AccountWizard.exe program to run in Compatibility mode on a Windows 7 computer. After running the program, you find that the large-scale fonts do not appear correctly and the movement of the window appears erratic. Select the settings you would enable to correct these issues. (Select two.)

Disable desktop composition Disable display scaling on high DPI settings

You have set up the AccountWizard.exe program to run in Compatibility mode on a Windows 7 computer. After running the program, you find that the large-scale fonts do not appear correctly and the movement of the window appears erratic. Select the settings you would enable to correct these issues. (Select two.)

Disable desktop composition Disable display scaling on high DPI settings.

You have a computer running windows 7 Ultimate. You want to modify the default settings for UAC to meet the following criteria: * Prompts should be shown when programs make changes to your computer and when you make changes to windows settings. * The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. * Settings should apply to all standard users. What should you do?

Disable the 'Switch to the secure desktop when prompting for elevation' setting in Group Policy

You have a computer running Windows 7 Ultimate. You want to modify the default settings for UAC to meet the following criteria: Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings. The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. Settings should apply to all standard users. What should you do?

Disable the *Switch to the secure desktop when prompting for elevation* setting in Group Policy.

You want to modify the default settings for UAC on you Windows system to meet the following criteria: Prompts should be shown when programs make changes to your computer and when you make changes to Windows settings. The desktop should not be dimmed and locked out, but should allow you to continue working in other applications without responding immediately to the prompt. Settings should apply to all standard users. What should you do?

Disable the switch to the secure desktop when prompting for elevation setting in Group Policy.

Using Features on Demand results in saving potentially significant amounts of disk space. Features on Demand becomes a third installation state per feature in Windows Server 2012. While previous versions allowed only Enable or Disable, Features on Demand provides _______.

Disabled and deleted

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and use it on your home network. You would like to create a HomeGroup from your laptop that can be used on your home network. What should you do?

Disjoin your computer from the domain

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and use it on your home network. You Would like to create HomeGroup from your laptop that can be used on your home network. What should you do?

Disjoin your computer from the domain.

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You take your laptop home and use it on your home network. You would like to create a HomeGroup from your laptop that can be used on your home network. What should you do?

Disjoin your computer from the domain.

What command is used to partition and format a disk?

Diskpart.exe

You are working on a computer running Windows 7. You wold like to update the video driver that is used on the computer. Select the area in Device Manager where you would make this change.

Display Adapters

__________ is used as an external display that displays images on a screen.

Display projector

What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory?

Domains

You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT(Windows 8)

Download the Microsoft Application Compatibility Toolkit from Microsoft

You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT

Download the Windows Automated Installation Kit (Windows AIK) from Microsoft

You have a computer running Windows 7. The computer is part of a domain. You need to transfer user profiles and data files to the computer from a network share using USMT; however, you do not have USMT. What should you do?

Download the Windows Automated Installation Kit (Windows AIK) from Microsoft.

Which type of VHD file allocates additional physical disk space in the file as virtual disk storage is used

Dynamically expanding

You want to delete all restore points

Edit System Restore and select all the restore points to delete

You have a computer running Windows 7. You want to configure Windows to prompt for additional credentials whenever a sensitive action is taken. What should you do?

Edit User Account Control (UAC) settings.

You have a computer running windows 7. You want to configure windows to prompt for additional credentials whenever a sensitive action is taken. What should you do?

Edit User Account Control (UAC) settings.

You manage a laptop that runs Windows 7. To increase security for the laptop while traveling, you decide to require a smart card for logon. You also want users to be logged off automatically when the smart card is removed. What should you do?

Edit settings in the local security policy.

What does L2TP use to encrypt data?

IPsec

ou have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer, which you are using a Custom View to examine. After several days, there are several events int he Custom View. You would like to clear the messages from the view sot hat you only see messages starting from right now. You need to make sure that any messages in the corresponding logs still exist. What should you do?

Edit the Custom View properties and create a custom range for logged events, starting with today's date.

After several days, there are several event in the Custom View

Edit the Custom View properties and create a custom range for the logged events, starting with today's date

You manage a small network with Windows 7 clients, multiple subnets, and servers.You want your computer to be able to resolve a host name for a server on your network to it's IPv4 address. What should you do? (Select two. Each choice is a possible solution.)

Edit the Hosts file on the computer. Add an A record on the DNS server.

You manage a Windows 7 computer connected to a business network using switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix : mydomain.local Description : Broadcom network adapter Physical Address : 00-AA-BB-CC-74-EF DHCP Enabled : No Autoconfiguration Enabled : Yes Ipv4 Address : 192.168.1.102(Preferred) Subnet Mask : 255.255.255.0 Default Gateway : 192.168.2.1 DNS Servers 192.168.2.20 What should you do?

Edit the IPv4 properties and change the default gateway.

You manage a Windows system connected to a business network using switches and multiple subnets. You connect a workstation to the 192.168.1.0/24 subnet. The workstation can communicate with some hosts on the private network, but not with other hosts. You run ipconfig /all and see the following. What should you do?

Edit the IPv4 properties and change the default gateway.

You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer for IPv6 so it is correctly configured with the Ipv6 address, default gateway, and DNS server addresses. What should you do?

Edit the Internet Protocol Version 6 (TCP/IPV6) properties for the network adapter. Select Obtain an IPv6 address automatically and Use the following DNS server addresses.

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to customize the migration of application, user profile, and user data. What should you do? (Select two. Each choice is a required part of the solution.)

Edit the MigApp.xml and MigDocs.xml files Run Scanstate.

You have two computers: ComputerA is running Windows Vista Business and ComputerB is running Windows 7 Professional. You are using USMT to migrate only the user profiles and user data from ComputerA to ComputerB. You need to specify the fules used for the migration to include all .jpg files. What should you do?

Edit the MigUser.xml file.

You have two computers: ComputerA is running Windows Vista Business and ComputerB is running Windows 7 Professional. You are using USMT to migrate only the user profiles and user data from ComputerA to ComputerB. You need to specify the rules used for the migration to include all .jpg files. What should you do?

Edit the MigUser.xml file.

After installing the application

Edit the Processor Scheduling settings

You have a computer running windows 7 Enterprise. The computer is a member of a workgroup. For several months, the computer acted like a sever in the workgroup. It was optimized to share files and folders to the other computers. You no longer need the computer to act like a server. You want the computer to focus on applications which are found on typical workstations. After installing the applications, you believe the computer is not reacting quickly enough while using the applications. You know the machine has enough video memory and physical memory to handle the applications. What should you do?

Edit the Processor Scheduling settings.

You have a computer that runs windows 7. The computer has two hard dries, both formatted with NTFS. You have enabled System Restore on both disks. You want to delete all restore points, but still be able to make new restore points for both drives. What should you do?

Edit the System Protection settings in System Properties and delete the restore points.

You have a computer that runs Windows 7. The computer is shared by three other users. You notice that some of your documents have been modified. You want to use auditing to track any changes to your documents. In the audit policy in the local security policy, you enable auditing of successful object access events. To test auditing, you make some changes to some files. However, when you examine the computer's Security Log, no auditing events are listed. You want to make sure an event is listed in the Security log whenever one of your documents is modified. What should you do?

Edit the advanced security properties of the folder containing your documents.

You find that backups are not being completed because the computer is asleep

Edit the backup task in Task Scheduler

dows 7. You have configured scheduled backups in the Backup and Restore console to take a backup each week. You save the backups to a network location. You find that backups are not being completed because the computer is asleep when the schedule time starts, and the computer is not waking up to perform the backup. The backup destination device is awake and available. What should you do?

Edit the backup task in Task Scheduler.

The D:\ drive in your computer has been formatted with NTFS. The Sales group on your computer has been given Allow Modify to the D:\Sales folder. The Mary user account is a member of the Sales group. You want to accomplish the following: Mary should not be allowed access to the D:\Sales\2010Sales.doc file. Mary should be able to read, write, and create new files in the D:\Sales folder. Your solution should not affect the abilities of other Sales group members to access files int eh D:\Sales folder. What should you do?

Edit the properties for the file; assign Mary the Deny Full Control permission

You need to make sure that the scheduled backup cam wake the computer

Edit the settings in the Task Scheduler

You have a computer running windows 7 Home Premium. You schedule regular backups once a week. Backups include all user data files and system image backup. After the first week, you see that backups are not being completed because the computer is asleep when the backup job is set to run. You need to make sure that the scheduled backup can wake the computer. You also want to make sure that backup does not run if the computer is on battery power or stops if the computer switches to battery power. What should you do?

Edit the settings in the Task scheduler

You decide that you want the backup to rum twice a week

Edit the task in the Task Scheduler

You have a computer that runs Windows 7 Professional. In the Backup and Restore console, you create a backup job that includes all user data files and a system image. The backup runs successfully for several weeks. You decide that you want the backup to run twice a week. You need to use the least amount of effort possible. What should you do?

Edit the task in the Task Scheduler.

You are working on a computer running Windows 7. You have several standard users needing permission to install devices on this computer because Windows 7 does not include the necessary drivers for the devices. What should you do? (Select two. Both answers are complete solutions.)

Enable Allow non-administrators to install drivers for these device setup classes in Group Policy. Run pnputil -i -a to add the drivers to the driver store.

You want to be able to stop working on your Windows notebook system

Enable Hybrid sleep

When running multiple application , your Windows system is slow to respond

Enable ReadyBoost on a USB flash drive

You have a computer running Windows 7 Ultimate. The computer meets the minimum hardware requirements. When running multiple applications, the computer is slow to respond. You need to improve performance, especially for the application that you are actively working in. What should you do?

Enable ReadyBoost on a USB flash drive.

Using the least effort possible, you need to protect the data on both volumes with restore points

Enable System Protection for the E: volume

You have a computer running Windows 7 Professional. The computer is used by three different users. The computer has the following two volumes with default System Protection settings: * C: ( System drive with user profiles and individual user files) * E: (Data files common to all users) Using the least effort possible, you need to protect the data on both volumes with restore points. What should you do? (choose the answer which is most correct.)

Enable System Protection for the E: volume.

You have a computer running Windows 7 Professional. Although the system drive has plenty of disk space, you add an internal hard drive to increase storage for user files. For the past several weeks you have created and changed many files stored on the new hard drive. You want to revert a specific file to a previous version. however, after viewing the file properties, you notice that no previous versions are available. You must ensure that you can revert files to previous versions on the new hard drive. What should you do?

Enable System Protection for the new hard drive.

You must ensure that you can revert files to previous versions on the new hard drive

Enable System Protection on the new hard drive

C:\ Windows\system32\netsh branchcache show status all The above command was run and received the following output. BranchCache service Status: ---------------------------- Service Mode = Hosted Cache Client (Set By Group Policy) Current Status = Running Service Start Type = manual Hosted Cache Location = file1.mydomain.com (Set By Group Policy) Local Cache Status: ------------------------------------------- Maximum Cache Size = 5% of hard disk Active Current Cache Size = 0 Bytes Local Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistRepub (Default) Publication Cache Status: ---------------------------------------------- Maximum cache Size = 1% of hard disk Active Current Cache Size = 0 Bytes Publication Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistPub (Default) Network Status: --------------------------------------- Content Retrieval URL Reservation = Configured (Required) Hosted Cache URL Reservation = Configured (Not Required) SSL Certificate Bound To Hosted Cache Port = Not Configured (Not Required) Content Retrieval Firewall Rules = Disabled (Required) Peer Discovery Firewall Rules = Disabled (Required) Hosted Cache Server Firewall Rules = Disabled (Not Required) Hosted Cache Client Firewall Rules = Enabled (Required) You have a computer that runs Windows 7 Ultimate. You work out of a branch office with BranchCache configured. The configuration caches files on a server in the branch office. all file transfers should use encrypted communications. You run the 'netsh' command on your client computer and see the output listed. How should you modify the client configuration?

Enable additional firewall rules.

C:\Windows\system32> netsh branchcache show status all BranchCache Service Status: -------------------------------------- Service Mode = Hosted Cache Client (Set By Group Policy) Current Status = Running Service Start Type = Manual Hosted Cache Location = http://file1.mydomain.com (Set By Group Policy) Local Cache Status: ----------------------------- Maximum Cache Size = 5% of hard disk Active current Cache Size = 0 Bytes Local Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistRepub ( Default) Publication Cache Status: ------------------------------------- Maximum Cache Size = 1% of hard disk Active Current Cache Size = 0 Bytes Publication Cache Location = C:\Windows\ServiceProfiles\NetworkService\AppData\Local\PeerDistPub (Default) Networking Status: ----------------------------- Content Retrieval URL Reservation = Configured (Required) Hosted Cache URL Reservation = Configured (Not Required) SSL Certificate Bound to Hosted Cache Port = Not configured (Not Required) Content Retrieval Firewall Rules = Enabled (Required) Peer Discovery Firewall Rules = Disabled (Not Required) Hosted Cache Server Firewall Rules = Disabled (Not Required) Hosted Cache Client Firewall Rules = Enabled (Required) You have a computer that runs windows 7 Ultimate. You work out of a branch office with BranchCache configured. The configuration caches files on a server in the branch office. Only HTTP and not SMB traffic is cached on the server. All file transfers should use encrypted communications. you run the 'netsh' command on your client computer and see the output listed in the image. How should you modify the client configuration?

Enable additional firewall rules.

You have a Windows 7 computer that you use at home. You have a small network set up, with each member of the family having their own computer. You would like to share files such as pictures, videos, and music on your computer with other members of your family. Your mother should be able to modify any of these files, while everyone else should only have read-only access. You want to use the simplest method to make these files available while providing the level of access specified. What should you do?

Enable file and printer sharing in the Network and Sharing Center. Share specific folder and configure the necessary permissions.

You have a Windows 7 computer that you use at home. You have a small network set up, with each member of the family having their own computer. You would like to share files such as pictures, videos, and music on your computer with other members of your family. Your mother should be able to modify any of these files, while everyone else should only have read-only access. You want to use the simplest method to make these files available while providing the level of access specified. What should you do?

Enable file and printer sharing in the Network and Sharing Center. Share specific folders and configure the necessary permissions.

You are on an airplane and are being instructed to turn off your Windows notebook

Enable hibernation

You have been asked to troubleshoot a Windows 7 computer that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand. he has asked you to figure out why user Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director's user account is a standard user and not a member of the local Administrators group. You want the UAC prompt to show. What should you do?

Enable the 'Run all administrators in Admin Approval Mode' setting in Group Policy.

You have been asked to troubleshoot a Windows 7 computer that is a member of a workgroup. The director who uses the machine said he is able to install anything he wants as well as change system settings on-demand. He has asked you to figure out why User Account Control (UAC) is not being activated when he performs a sensitive operation. You verify that the director's user account is a standard user and not a member of the local Administrators group. You want the UAC prompt to show. What should you do?

Enable the *Run all administrators in Admin Approval Mode* setting in Group Policy.

You manage a computer running Windows 7 Enterprise. You are configuring security settings that will identify when people attempt to log on with an incorrect password. You need the computer to note the failed attempts in its own audit log. You want to use Local Security Policy that create the settings. What should you do?

Enable the Audit account logon events

You manage a computer running Windows 7 Ult

Enable the Content Advisor

You have a computer running Windows 7 Ultimate. You need to restrict access to Web sites that contain nudity, sex, or violence. What should you do?

Enable the Content Advisor.

You have a computer running Windows 7 Ultimate. The computer has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is a public connection. you need to allow help desk users to use Remote Assistance to help you across the wired network, but want to block any such access from the wireless network. you want to configure Windows Firewall to allow and deny access as described. What should you do?

Enable the Remote Assistance exception only on the private profile.

You have a computer running Windows 7 Ultimate. The computer has both wired and wireless network connections. The wired connection is on the internal private network, but the wireless connection is a public connection. You need to allow help desk users to use Remote Assistance to help you across the wired network, but want to block any such access from the wireless network. You want to configure Windows Firewall to allow and deny access as described. What should you do?

Enable the Remote Assistance exception only on the private profile.

You need to protect the computers while users

Enable the SmartScreen filter

You want to protect yourself from phishing

Enable the SmartScreen filter

You have a computer running Windows 7 Home Premium. While using Internet Explorer 8, you want to protect yourself from phishing sties. What should you do?

Enable the SmartScreen filter.

You have several computers running Windows 7 Professional. The computers are members of a domain. You need to protect the computers while users browse the Internet with Internet Explorer 8. You want to display a warning message to users when they attempt to visit a Web site that is known to host malware. What should you do?

Enable the SmartScreen filter.

You want to reduce the amount of traffic across the WAN link for file reads from the Data share

Enable transparent caching

You are the desktop administrator for you company. You manage a mix of Windows 7 and Windows 8 systems. You would like to manage the computers remotely using a tool with a graphical user interface (GUI). What should you do?

Establish a Remote Desktop connection to each computer. Open Computer Management and connect to each remote computer.

You currently manage a virtual machine named VM12 that has been installed on the Srv5 physical server. The virtual machine uses a single fixed disk of 40 GB saved in the vdisk1.vhd file. The virtual machine is running out of free disk space. The virtual machine currently uses about 39.5 GB of the available disk space. You need to add more disk space to the virtual machine. What should you do?

Expand the vdisk1.vhd disk.

You have two computers that run Windows 7 Professional: Comp1 and COmp2. Both computers are members of a domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do?

Export the recovery agent keys from Comp1 and import them to Comp2.

You have two computers that run Windows 7 Professional: Comp1 and Comp2. Both computers are members of a domain. You have a domain user account named EFS-Recovery. You use the user account to recover some files on Comp1. You need to recover some files on Comp2, but are unsuccessful. What should you do?

Export the recovery agent keys from Comp1 and import them to Comp2.

You need to install Windows 7 Enterprise edition on multiple computers. You have an ISO image of the Windows 7 Enterprise edition installation disc that you will use for the installation. You want to boot the computer to a command prompt, connect to a network share, and then run setup from the shared folder. You create a shared folder named WinInstall on a server. What should you do? (Select two. Each choice is a required part of the solution.)

Extract the ISO image and copy all files in the image to the shared folder. Create a bootable disc with WinPE and the necessary network drivers. Edit the BIOS to boot from the optical drive first.

What is the primary tool in Windows Server 2012 to take control of the shares on all your disks on all your servers and exercise granular control over their properties?

File and Storage Services in Server Manager

You want to see memory statistics for a specific process running on your Windows system.

Filter on the application in Resource Monitor

You want to see the amount of disk activity that is generated by an application running on your Windows system

Filter on the application in Resource Monitor

You have a computer that runs windows 7. You want to see the amount of disk activity that is generated by an application. What should you do?

Filter on the application in Resource Monitor.

You have a computer that runs windows 7. You want to see memory statistics for a specific process. You need to view the working set, shareable, and private memory for the process. What should you do?

Filter on the process in Resource Monitor.

You decide to install Windows 8.1 in a VHD file on your Windows 7 system. To ensure that the evaluations realistic, you need to ensure the best possible performance

Fixed size

When you run the Backup and Restore console

Format the new drive with FAT32 or NTFS

You have a computer running Windows 7 Ultimate. You want to use the Backup and Restore console to back up all user files on the computer. To ensure you have space for all of the user files, you install a new hard drive, boot the computer, and initialize the drive in Disk Management. When you run the Backup and Restore console, it does not show any valid destination drives. What should you do? (Choose the most correct answer.)

Format the new drive with FAT32 or NTFS.

When you run the Backup and Restore console, you cannot

Format the new drive with NTFS

You have a computer running Windows 7 Ultimate. You want to use the Backup and Restore console to back up all user files on the computer. You want to include a system image in the scheduled backup. To ensure you have space for all of the user files and the system image, you install a new 360 GB internal hard drive, boot the computer, and initialize the drive in Disk Management using MBR. When you run the Backup and Restore console, you cannot include a system image during the backup job. What should you do?

Format the new drive with NTFS.

You need to change the hardware so that you can install Windows 7 Enterprise

Free up some space on the hard drive

You have a computer on you workbench without an operating system. You would like to instal windows 7 enterprise 32-bit edition on the computer. The computer has the following hardware specs: Hard drive with 12GB of free space. 1GB of RAM, one additional socket available. One Pentium 2.8 GHz processor, one additional socket available. Video card with 128 MB of memory. You need to change the hardware so that you can install Windows 7 Enterprise. What should you do?

Free up some space on the hard drive.

You have a computer on your workbench without an operating system. You would like to install Windows 7 Enterprise 32-bit edition on the computer. The computer has the following hardware specifications: Hard drive with 12 GB of free space. 1 GB of RAM, one additional socket available. One Pentium 2.8 GHz processor, one additional socket available. Video card with 128 MB of memory. You need to change the hardware so that you can install Windows 7 Enterprise. What should you do?

Free up some space on the hard drive.

You have a computer running Windows 7 Enterprise. The computer is a member of a domain. A file server on the network named Server1 runs Windows Server 2008 R2. You log on to the computer by using an account named Mary. With the least amount of effort possible, you need to ensure that every time you connect to a shared folder on Server1, you authenticate by using an account named Admin. What should you do?

From Credential Manager, select Add a Windows Credential.

You would like to generate a report that shows the status of hardware resoures

From Performance Information and Tools in the Control Panel, generate a system health report

You mange a computer that runs Windows 7. You would like to generate a report that shows the status of hardware resources, processes, and system and configuration information on the computer. The report should include suggestions for ways to maximize performance and streamline system operation. What should you do?

From Performance Information and Tools in the Control Panel, generate a system health report.

You have a laptop running Windows 7 Enterprise. The laptop is used both in a public network and a private (work) network. The work network contains FTP servers which hold sensitive data. To protect the data, you need to ensure that the computer can connect to FTP servers only while it is connected to the private (work) network. What should you do?

From Windows Firewall with Advanced Security, create a new rule.

You have a laptop running Windows 7 Enterprise. The laptop is used both in a public network and private (work) network. The work network contains FTP servers which hold sensitive data. To protect the data, you need to ensure that the computer can connect to FTP servers only while it is connected to the private (work) network. What should you do?

From Windows Firewall with Advanced Security, create a new rule.

You have a Windows 7 computer with a single hard drive. You want to add fault tolerance to the existing hard drive. You install a new hard drive in the computer. What should you do?

From a command prompt, run 'Diskpart'. Use the 'Add' command.

You have a computer that runs Windows 7. You run Runas with the /savecred option to start an application. You need to delete the stored password. What shoul you do?

From the Credential Manager, remove the credential from the Vault.

You manage a Windows 7 system. Your company has a corporate intranet Website. You open Internet Explorer as shown in the image. You need to ensure that you can access Web pages on both the Internet and the intranet. What should you do?

From the Tools menu, click Work Offline.

You manage a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Internet Explorer as shown in the image. You need to ensure that you can access Web pages on both the Internet and the intranet. What should you do?

From the Tools menu, click Work Offline.

You want to use DirectAcess to access application servers on your corporate intranet

Full enterprise network access (end-to edge)

You have a computer that runs Windows 7. You would like to configure Windows update to download updates that Microsoft suggests, but does not mark as important. You would like to ensure that updates are installed on the computer without the intervention of an Administrative user. Select the settings that you should enable on the computer.

Give me recommended updates the same way I receive important updates. Allow all users to install updates on this computer.

Which type of IPv6 address is unique throughout the IPv6 universe?

Global

You need to determine if a specific security update from Windows Update is installed on the computer

Go to Programs and Features in Control Panel

You have a computer that runs windows 7. The computer is a member of a domain. windows Update settings are controlled through Group Policy. You need to determine if a specific security update from Windows Update is installed on the computer. What should you do?

Go to Programs and Features in the Control Panel

You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You need to determine if a specific security update from Windows Update is installed on the computer. What should you do?

Go to Programs and Features in the Control Panel.

You share a single Windows 7 Professional computer with Judith and Dalton. You are the owner of the D:\Reports folder. Judith needs to be able to see the files and subfolder in the D:\Reports folder. Dalto needs to be able to do these same things, but also to delete folders. you need to assign the necessary NTFS permissions to the D:\Reports folder. What should you do?

Grant Read & Execute to Judith; Modify to Dalton

You have a computer that runs Windows 7. Windows Update is continually notifying you to install an update that you have determined that you should not install on your machine due to incompatibility reasons. You want Windows Update to stop notifying you of this update. What should you do?

Hide the update.

Software Restriction policies and AppLocker are configured through __________.

Group policies

Which account is designed for users that require only temporary access to the computer and is disabled by default?

Guest

You have a Windows 7 laptop that is shared by three users. The computer is a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. You install a smart card reader and obtain a new smart card with a certificate that can be used for EFS recovery. You add a data recovery agent using Group Policy. What should you do next?

Have each user run 'cipher /u'

You have a Windows 7 laptop that is shared by three users. The computer is a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you can recover any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. You install a smart card reader and obtain a new smart card with a certificate that can be used for EFS recovery. You add a data recovery agent using Group Policy. What should you do next?

Have each user run *cipher /u*.

You have a computer that runs windows 7. Windows Update is continually notifying you to install an update that you have determined that you should not install on your machine due to incompatibility reasons. You want Windows Update to stop notifying you of this update. What should you do?

Hide the update.

You want Windows Update to stop notifying you of this update

Hide the uupdate

You are working on a Windows 7 system that continuously fails once you logon to the system. You suspect that a startup application is causing the issue. What can you do to successfully logon to the system

Hold on the Shift key while logging on to the system

You manage the small network that is connected to the Internet as shown in the graphic. You add Host A to the network. All hosts use manually-assigned TCP/IP values. The subnet where Host A resides uses a 28-bit subnet mask. Which TCP/IP configuration values should you choose for Host A? To answer, drag a value to each TCP/IP parameter shown in the diagram.

IP Address 10.0.0.97 Subnet Mask 255.255.255.240 Default Gateway 10.0.0.110

Network Diagram [*]-------------66.11.177.12--(_)--10.0.0.204------------10.0.0.205--(_)--10.0.0.110------------[HostA] Key: [*] = Internet (_) = Router [HostA] = Computer You manage the small network that is connected to the Internet as shown in the graphic. You add Host A to the network. All hosts use manually-assigned TCP/IP values. The subnet where Host A resides uses a 28-bit subnet mask. Which TCP/IP configuration values should you choose for HostA? Choose: IP Address, Subnet Mask and Default Gateway

IP Address = 10.0.0.97 Subnet Mask = 255.255.255.240 Default Gateway = 10.0.0.110

What protocol does DirectAccess use to encrypt network communications?

IPSec

You create a file named myCaptureSettings.ini to identify the compression settings. You need to edit the compression settings in the file

Identify files that are not compressed using the CompressionExclusionList section

You have a computer running Windows7 Ultimate. You will use this computer as a reference computer to install Windows 7 from a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named myCaptureSettings.ini to identify the compression settings. You need to edit the compression settings in the file. What should you do? (Choose the best answer.)

Identify files that are not compressed using the CompressionExclusionList section.

You are getting ready to deploy Windows 7 to multiple enterprise workstations. What do you use to hold the information captured from the reference computer?

Image file

You need to implement a solution to meet the stated requirements

Implement BitLocker with a TPM

You want to implement a solution so that notebooks are checked for the latest security updates as they connect to the betwork

Implement Network Access Protection (NAP) with a quarantine network

You manage several Windows notebook systems that are members of a domain. Several employees in your company use the notebook computers to connect to the company network. Because they often use these notebooks while traveling or to help them do their jobs, you can't prevent them from connecting to the network. However, you are concerned that many of these systems won't always have the latest security patches installed. You want to implement a solution so that notebooks are checked for the latest security updates as they connect to the network. If the required updates are missing, you want to prevent these computers form having full access to the private network. What should you do?

Implement Network Access Protection (NAP) with a quarantine network.

Because the application to be tested may be malicious

Implement a private virtual network

You have a computer running Windows 7 Enterprise. A customer application works great on previous versions of Windows; however, it does not execute correctly on the Windows 7 computer. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You must get the application to work correctly on this computer. What should you do next?

Implement a shim from the Compatibility Administrator

You have a computer running Windows 7 Enterprise. A custom application works great on previous versions of Windows; however, it does not execute correctly on the Windows 7 computer. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this didn't fix the problem. You must get the application to work correctly on this computer. What should you do next?

Implement a shim from the Compatibility Administrator.

You have several computers running Windows 7 Enterprise. The computers are members of a domain. Your company has an internal Web site that requires HTTPS. The Web site's certificate is self-signed. You use HTTPS to browse to the Web site and receive the warning message as seen in the image. You need to prevent the warning message from appearing when you access the Web site.

Import the Web site's certificate into the Trusted Root CA list

You have two computers that run Windows 7. One computer has two hard disks. The second disk is a dynamic disk formatted with FAT32. You remove the second hard disk from this system and install it into the other system. After adding the disk, Disk Management reports it as foreign and you are unable to access data on the disk. What should you do?

Import the disk.

You have a Windows 7 computer. You install a new internal sound card in the computer. After rebooting, you install the driver, but the device doesn't appear to be working. You need to view information for the device and perform troubleshooting steps. What should you do?

In Computer Management, go to Device Manager.

You are working on a computer running Windows 7. You try to listen to Audio CDs, but no audio is coming from the speakers. After checking the speaker cables, the volume level, and the mute feature, you check Device Manager and see the dialog shown in the image. What should you do?

In Device Manager, enable the Soundmax Integrated Digital HD Audio Driver device.

You have a laptop that runs Windows 7. The laptop has a built-in Ethernet and wireless network card. The wireless card stops working. You use the PCMCIA slot to add a wireless card to your laptop. After installing the wireless card, the adapter does not show in the list of available network adapters in the Network and Sharing Center. What should you do to troubleshoot the problem?

In Device Manager, right-click the wireless device and choose Properties. Examine the device configuration.

You are working on a computer running Windows 7. Your audio card is working, but you learn about an updated driver that adds some new features to the device. You download and install the new driver. After you restart and log on to Windows 7, you can no longer play audio files. Using a minimum of administrative tasks, you need to find a solution to be able to play audio. What should you do?

In Device Manager, roll back the driver.

Your audio card in you windows system is working, but you learn about an updated driver that adds some new features to the device. You download and install the new driver. After you restart and log on to windows, you can no longer play audio files. Using a minimum of administrative tasks, you need to find a solution to be able to play audio. What should you do?

In Device Manager, roll back the driver.

You have a new laptop computer running Windows 7 Professional. You need to connect your computer to a wired network at work and a wireless network at home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. What should you do?

In Devices and Printers, click Manage default printers.

You have a new notebook computer running Windows. You need connect your computer to a wired network at work and a wireless network home. While connected to your work network, you set the default printer. You want to configure a different default printer to use when connected to your home network. What should you do?

In Devices and Printers, click Manage default printers.

You have a Windows 7 Ultimate computer that is shared by multiple users. The default printer on your computer is a Sharp AL-2040. When you send a print job to the default printer, nothing happens. Other users who also use the same printer are not experiencing any problems. What should you do?

In Devices and Printers, right-click the Sharp AL-2040 icon and select Troubleshoot.

You manage a Windows 7 computer. The computer has a printer shared with the name of Printer1. You need to modify the permissions that apply to the shared printer for network users. What should you do?

In Devices and Printers, right-click the printer and select Printer properties. Edit the Security settings.

You want to view the events form these two computers on Computer3

In Event Viewer, open the Forwarded Events log

You have two computers that run window 7: Computer 1 and Computer2. You have configured event subscriptions with the default settings to forward events from these two computers to a third Windows 7 computer, Computer3. You want to view the events from these two computers on Computer3. What should you do?

In Event Viewer, open the ForwardedEvents log.

You have a computer running Windows 7 Ultimate. A user made some modifications on the computer. You notice Internet Explorer isn't the default browser anymore. With the least administrative effort, you need to make sure that Internet Explorer is the default browser. What should you do? (Select two. Each answer is a complete solution.)

In Internet Options on the "Advanced" tab, click the "Reset..." button. In Internet Options on the "Programs" tab, click the "Make default" button.

You manage several computers running Windows 7. A user made some modifications on the Advanced tab in Internet Explorer and is now having some problems. You need to restore the default Internet Explorer settings with the least amount of effort. What should you do?

In Internet Options on the "Advanced" tab, click the "Restore advanced settings" button.

A users made some modification on an Advanced tab

In Internet Options on the Advanced tab, slick the Reset... button

You have a computer running Windows 7 Home Premium. You have enabled the content Advisor in Internet Explorer 8. While browsing the Internet, a specific Web site is blocked by the Content Advisor. you want users to be able to view the Web site. What should you do?

In Internet Options, use the "Content" tab to add the Web site as an approved site.

you have Enable the Content Advisor in Internet Explorer 9

In Internet Options, use the Content tab to add the Web site as an approved site

You need to enable Aero with the minimum amount of effort

In Performance Information and Tols, click Re-run the assessment

You have a computer running Windows 7 Professional. The computer has a standard SVGA graphics adapter. You upgrade the graphic card with a new adapter that should support Aero, but you are still unable to use Aero. You need to enable Aero with the minimum amount of effort. What should you do?

In Performance Information and Tools, click Re-run the assesment.

Professional. The computer has a standard SVGA graphics adapter. You upgrade the graphic card with a new adapter that should support Aero, but you are still unable to use Aero. You need to enable Aero with the minimum amount of effort. What should you do?

In Performance Information and Tools, click Re-run the assessment.

On a periodic basis, the application writes or modifies several registry entries

In Performance Monitor, configure a configuration data collector

You have a computer that runs windows 7 and a custom application. On a periodic basis, the application writes or modifies several registry entries. You want to monitor these registry keys so that you can create a report that shows their corresponding settings over the next 5 days. What should you do?

In Performance Monitor, configure a configuration data collector.

You would like to generate a report that runs several basic tests of the operating system

In Performance Monitor, run the System Diagnostics data collector set

You manage a computer that runs Windows 7. You would like to generate a report that runs several basic tests of the operating system, Security Center, hard disk, services, and hardware devices and drivers. The report should include suggestions for how to improve system performance. What should you do?

In Performance Monitor, run the System Diagnostics data collector set.

While working with a new application on your Windows system

In Resource Monitor, analyze the wait chain for the process

You have a computer that runs Windows 7. You want to modify the disk defragmentation schedule to run twice a week on Wednesdays and Saturdays at 11pm. What should you do?

In Scheduled Tasks, modify the default task to run on Wednesdays and Saturdays.

You have a computer running Windows 7 Professional. The computer is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer. You want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. You want to make the change using the least amount of effort possible. What should you do?

In Windows Firewall with Advanced Security, add an outbound rule. Require only secure connections for the rule, and add the Sales group to the list of authorized groups.

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer. You want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. You want to make the change using the least amount of effort possible. What should you do?

In Windows Firewall with Advanced Security, add an outbound rule. Require only secure connections for the rule, and add the Sales group to the list of authorized groups.

You manage a laptop computer that runs Windows 7. As part of your security auditing strategy, you would like the system to record packets that have been dropped by firewall rules on your computer. You want to record only the packets dropped on public interfaces. You do not want to record information about allowed packets. What should you do?

In Windows Firewall with Advanced Security, configure logging for the public profile.

You manage a laptop computer that runs Windows 7. As part of your security auditing strategy, you would like the system to record packets that have been dropped by firewall rules on your computer. You want to record only the packets dropped on public interfaces. You do not want to record information about allowed packets. What should you do?

In Windows Firewall with Advanced Security, configure logging for the public profile.

You want to schedule a backup that includes everything on the C: and D:

In Windows Task Scheduler, create a task to run wbadmin

You have a computer running Windows 7 Professional. The computer is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer. you want to configure the firewall as follows: * Allow a specific port used by the application. * Open the port only for members of the Sales group. You want to make the change using the least amount of effort possible. What should you do?

In Windows firewall with Advanced Security, add an outbound rule. Require only secure connections for the rule, and add the Sales group to the list of authorized groups.

You wnat to prevent all other users from installing these applications

In application control policies, create a Windows Installer rule with a file hash condition

You manage a computer running Windows 7 and shared by multiple users. Recently, users have downloaded and installed two malware programs onto the computer. After download, the applications are installed by running programs with a .msi extension. The files are not digitally signed. You want to prevent all users from installing these applications, regardless of how they have obtained the files. What should you do?

In application control policies, create a Windows Installer rule with a file hash condition.

You manage a computer running Windows 7 and shared by multiple users. Recently, users have downloaded and installed two malware programs onto the computer. After download, the applications are installed by running programs with a .msi extension. The files are not digitally signed. You want to prevent all users from installing these applications, regardless of how they have obtained the files. What should you do?

In application control policies, create a Windows Installer rule with a file hash condition.

You want to prevent users from running any file with a .bat or .vbs extension

In application control policies, create a script rule with a publisher condition

You manage a computer that runs Windows 7. You want to prevent users from running any file with a .bat or .vbs extension unless the file is digitally signed by your organization. What should you do?

In application control policies, create a script rule with a publisher condition.

You manage a computer that runs Windows 7. You want to find out who has been running a specific game on your computer. You do not want to prevent users from running the program, but instead want to log information when the file runs. The application is not digitally signed. What should you do?

In application control policies, create an executable rule with a path condition that identifies the file. For executable rules, configure "Audit only".

You manage a computer that runs Windows 7. You want to find out who has been running a specific game on your computer. You do not want to prevent users from running the program, but instead want to log information when the file runs. The application is not digitally signed. What should you do?

In application control policies, create an executable rule with a path condition that identifies the file. For executable rules, configure "Audit only".

You want to find out who has been running a specific game on your computer

In application control policies, create and executable rule with a path condition that identifies the file. For executable rules, configure Audit only

You have a Windows 7 computer that you manage at work. Because of security requirements for your company, you need to prevent all users from being able to save files to any removable storage device on the computer. Users are allowed to copy files from these devices. You want to accomplish this with the least amount of effort as possible. What should you do?

In removable storage access in Group Policy, configure the policy for each device type to deny write access.

Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups?

User rights

You manage a computer that runs Windows 7. While working with a new application, the application stops responding. You would like to analyze the application and its associated processes to identify which processes the application is waiting on. What should you do?

In resource Monitor, analyze the wait chain for the process.

You would like to be able to see only the Warning and Error events from both logs displayed at the same time

In the Application log, filter the log to show only Warning and Error events. Save the filter to a Custom View, adding the System log as an additional filter

Users sometimes allow Internet Explorer to remember passwords

In the AutoComplete settings, clear the User names and passwords on forms check box

You have a computer running Windows 7. Multiple people use the computer. Users sometimes allow Internet Explorer to remember passwords when accessing various Web sites. You need to secure the computer against the possibility that the stored passwords can be stolen off the system. What should you do?

In the AutoComplete settings, clear the User names and passwords on forms check box.

You are preparing to install Windows 7 to a new computer. You copy the installation files from a DVD to a USB flash drive, then use bootsect to make the USB drive bootable. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. Using disk tools, you create a single partition that takes up the entire array. You insert the USB drive and boot the computer. The computer boots and shows you the following message: Error loading operating system Reboot and select proper boot device. What should you do?

In the BIOS, modify the boot order to boot from the USB device first.

You insert the USB drive and boot the computer. The computer boots and shows you the following message:

In the BIOS, modify the boot order to boot the USB device first

You have a computer running windows 7 Enterprise. The C: drive holds all system files and is the boot volume. The D: volume holds only user data files. You want to create a system image backup that includes both the C: and D: drives. You will save the backup to an external disk and archive it in case you need to recover your system. What should you do?

In the Backup and Restore console, configure a system image backup.

With the least amount of effort You need to copy

In the Remote Desktop client properties, edit the local devices and resources options

You have a computer running Windows 7 Ultimate. You will connect to the computer using Remote Desktop. With the least amount of effort, you need to copy files from your local hard drive to the hard drive of the remote computer. What should you do?

In the Remote Desktop client properties, edit the local devices and resources options.

You are about to give a presentation and have connected you laptop to a multimedia projector

In the Windows Mobility Center, enable the Presentation Settings option

You mange a laptop computer that runs Windows 7. You would like to log all of the packets that are dropped by the firewall on your computer. What should you do?

In the local security policy, configure object access policies for the Windows Filtering Platform (WFP). View audit entries in the Security log in Event Viewer.

You manage a computer running Windows 7. Previously, you configured the following auditing settings: You enabled the Audit object access policy to log failed events. You configured auditing on several files, folder, and registry settings for a specific group for failed Read and Modify actions. Now you would like to audit only failed attempts to vie or modify registry settings. You no longer want to log audit entries for files access. You need to make the change with the least amount of effort possible. What should you do?

In the local security policy, stop auditing for the Audit object access policy. Enable the Audit Registry advanced audit policy

You have a computer that runs Windows 7. You create the D:\drivers folder on the computer for third party drivers and copy drivers for special devices to that folder. You want non-administrative users to be able to install devices on the computer without needing administrative privileges and without being prompted for the driver, but only for those devices whose driver is located in the D:\drivers folder. What should you do?

In the registry, edit the DevicePath key.

You have received a new Windows 7 Business edition laptop for use at work. You configure the wireless adapter to connect to the network. You also have a wireless network at home. You configure a second profile for your home network. For several weeks, the wireless connection works fine. Whether you are at home or at work, you can start your computer and make a connection without browsing for the list of available networks. One day you come in to work to find that you can't connect. You check with the network administrator, and he states that they have prevented the SSID of the company network from being visible. You need to make it as easy as you can to connect to the company wireless network now and in the future. What should you do?

In the wireless network profile, select Connect even if the network is not broadcasting.

What feature found in Internet Explorer 8 enables you to surf the Internet without leaving any record of your activities?

InPrivate Filtering

You need to configure system protection on this system

Increase the amount of disk space reserved for restore point on C:

You have a Windows 7 Professional computer that is used by three users. Each user has a folder for storing personal data. Chat copies a file from a CD-RW to his folder and receives the message Insufficient disk space. He finds that he cannot even add data to an existing file and save it. Other users of the computer do not have the same problems. You see that the volume has over 20 GB of free disk space. You need to let Chad create and edit files. What should you do?

Increase the quota limit.

You have several computers in a domain network. Your company develops software that runs on bot Windows XP and Windows 7. Programmers need to have computers that will dual boot between Windows XP and Windows 7. You need to configure each system to meet the programmer's requirements. What should you do?

Install Windows XP first, and then install Windows 7 on another partition.

You have a computer running Windows 7 Ultimate. You need to create a system repair disc in case you need to recover the Windows installation after a serious error. You run the Backup and Restore console, but are unable to create the disc. What should you do?

Install a CD/DVD burner.

You are working in Hyper-V Manager on your Windows Server 2012 system. This system hosts several Windows Server 2008 R2 virtual machines. You create snapshots of these virtual machines nightly as part of your disaster recovery plan. Users are complaining that they can no longer access the virtual servers. In Hyper-V Manager, they are identified as being in a Paused-Critical state. What should you do? (Select two. Each answer is part of the overall solution.)

Install a new physical hard disk in the hypervisor host. Move the snapshot files to the new hard disk.

You have a computer running Windows 7. You need to install an updated driver for a hardware device on the computer. You need a driver file which has been tested by Microsoft and comes from a legitimate source. What should you do?

Install an updated driver with a digital signature.

You recently received a new desktop computers and one of your colleagues is not able to install the image using the WinPE CD

Install the latest hardware drivers for these new desktop computers on the WinPE image

Last month you deployed Windows 7 Enterprise to all of the desktop computers in your company using a single system image. To install this image, you created a WinPE boot CD. You recently received new desktop computers, and one of your colleagues is not able to install the image using the WinPE CD. The WinPE CD cannot boot to the network drive. What should you do?

Install the latest hardware drivers for these new desktop computers on the WinPE image.

You have a 32-bit computer that rums Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate

Install the latest service pack

You have a 32-bit computer that runs Windows Vista Business RTM that you would like to upgrade to Windows 7 Ultimate. Your computer has the following specifications: 1 GHz processor 1 GB RAM 128 MB video card 16 GB free disk space DVD drive You would like to perform the upgrade with the least amount of effort possible. What should you do first?

Install the latest service pack

Your organization must upgrade to Windows 7. During the upgrade planning process you discover an application that will not run and is not supported on the Windows 7 platform. The organization must have the application and must upgrade to Windows 7. What solution would you recommend?

Install the program on the Windows 7 computer using Windows XP Mode

--------------------------------- Windows Security Encrypting File System To share file access with other users, select their certificate from the list and click OK. Mary Issuer: Mary Valid From: 5/26/2010 to 5/2/2110 Click here to view certificate prope... OK Cancel -------------------------------- You have a computer that runs Windows 7. Mary and mark share the computer. Mary encrypts a file by using Encrypting File System (EFS). When Mary attempts to grant mark access to the file, she sees the above dialog. You need to ensure that Mary can grant Mark access to the file. What should you do?

Instruct Mark to log on to the computer and encrypt a file.

You have a computer that runs Windows 7. Mary and Mark share the computer. Mary encrypts a file by using Encrypting File System (EFS). When Mary attempts to grant Mark access to the file, she sees the dialog shown in the image. You need to ensure that Mary can grant Mark access to the file. What should you do?

Instruct Mark to log on to the computer and encrypt a file.

Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney shares the laptop with his manager, Kate. Rodney stores private company documents in the C:\Data folder on his laptop. Both Rodney and Kate access the documents when they are using the laptop. Rodney is concerned about the documents falling into the wrong hands if his laptop if stolen. Rodney wants to protect the entire contents of the C:\Data folder. You want to help Rodney encrypt the contents of the C:\Data folder so that Kate and Rodney are the only authorized users. What should you do?

Instruct Rodney to log on to his computer, edit the properties of the C:\Data folder, and enable encryption. Add Kate as an authorized user for each file in the C:\Data folder.

Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney shares the laptop with his manger, Kate. Rodney stores private company documents in the C:\Data folder on his laptop. Both Rodney and Kate access the documents when they are using the laptop. Rodney is concerned about the documents falling into the wrong hands if his laptop is stolen. Rodney wants to protect the entire contents of the C:\Data folder. You want to help Rodney encrypt the contents of the C\Data folder so that Kate and Rodney are the only authorized users. What should you do?

Instruct Rodney to log on to his computer, edit the properties of the C:\Data folder, and enable encryption. Add Kate as an authorized user for each file in the C:\Data folder.

One of the users installs a new Internet Explorer add-on

Instruct the other users to log on and disable the add-on

You have a computer running Windows 7. Multiple people use the computer. One of the users installs a new Internet Explorer add-on that interferes with the browsing functionality of other users on the system, but the add-on is necessary for business purposes. What should you do?

Instruct the other users to log on and disable the add-on.

To enforce security settings, you decide to manage the notebook by enrolling it with your cloud-based Windows Intune account

Instruct the user to enroll it using the Company Portal

What specialized program collects compatibility information for web pages and web-based applications?

Internet Explorer Compatibility Test Tool

You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. A fourth hard disk is connected to the IDE channel. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. Only the disk on the IDE channel is visible. Select the option you would choose to make the RAID array visible for the installation.

Load Driver

Which type of user profile is automatically created when a user logs on the computer for the first time and is stored on the computer's local hard drive?

Local user profile

Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all of Rodney's files. You make Kate's account an administrator for Rodney's computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney's documents, receiving an access denied message. you realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do?

Log on to the laptop using an account with DRA privileges. Clear the Encrypt attribute on the file.

Rodney, a user in the research department, uses a Windows 7 Professional laptop computer with a single NTFS volume. Rodney recently left the company on short notice. Rodney's manager, Kate, wants access to all of Rodney's files. You make Kate's account an administrator for Rodney's computer and give her the computer. Later, Kate informs you that she cannot open one of Rodney's documents, receiving an access denied message. You realize that Kate is trying to access a file that Rodney encrypted using EFS. You want to let Kate open the file. What should you do?

Log on to the laptop using an account with DRA privileges. Clear the Encrypt attribute on the file.

You want to see information about how the computer is configured

Look through the WimdowsUpdate.log file

You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You find that your computer has not been installing recent updates. You want to see information about how the computer is configured to get updates including the name of the server it tires to contact when checking for and downloading updates. What should you do?

Look through the WindowsUpdate.log file.

You have a computer that runs Windows 7. The computer is a member of a domain. Windows Update settings are controlled through Group Policy. You find that your computer has not been installing recent updates. You want to see information about how the computer is configured to get updates including the name of the server it tries to contact when checking for and downloading updates. What should you do?

Look through the WindowsUpdate.log file.

You need to allow remote Desktop access for Mary while granting her the least amount of privileges possible

Make Mary's user account a member of the Administrators Group

You manage a Windows 7 computer that is a member of a workgroup. The computer is shared by three users. Each user has a standard user account. Mary is one of the three users of this computer. She wants to access the computer using a Remote Desktop connection. You need to allow Remote Desktop access for Mary while granting her the least amount of privileges possible. What should you do?

Make Mary's user account a member of the Remote Desktop users group.

You manage a small office network with a single subnet. The network is connected to the Internet. All client computers run Windows 7. A single server runs Windows Server 2008 RS. Computers are not a member of a domain. Hosts use IPv6 addresses on the private network. all hosts on the private network are assigned host names such as Computer1, Computer2, etc. All computers use a DNS server at the Internet service Provider (ISP) to resolve hostnames for Internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure that LLMNR is enabled on all computers.

You manage a small office network with a single subnet. The network is connected to the Internet. All client computers run Windows 7. A single server runs Windows Server 2008 R2. Computers are not a member of a domain. Hosts use IPv6 addresses on the private network. All hosts on the private network are assigned host names such as Computer1, Computer2, etc. All computers use a DNS server at the Internet Service Provider (ISP) to resolve hostnames for Internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure that LLMNR is enabled on all computers.

You manage a small office network with a single subnet. The network is connected to the internet. All client computers run windows 7 or windows 8.x. A single server runs windows server 2012. The client computers are not joined to a domain. All hosts us IPv6 addresses on the private network. All computers on the private network are assigned host names such as Computer1 and Computer2, etc. All hosts use a DNS server at the Internet Service Provider(ISP) to resolve the hostnames for internet hosts. You need to implement a solution so that hosts on your private network can resolve hostnames for other hosts on the private network. You want to implement the solution with the least amount of effort. What should you do?

Make sure the LLMNR is enabled on all computers.

What was the partition style(s) prior Windows Server 2008 and Windows Vista?

Master Boot Record (MBR) only

You have previously used Hyper-V to create a parent installation of Windows 7 with three child installations. Child virtual systems are named Client1, Client2, and Client3. The parent virtual hard disk file is named parent vhd, with differencing disks named Client1.vhd, Client2.vhd, and Client2.vhd. You decide that you want to configure the Client2 virtual machine so that it no longer uses a differencing disk. The remaining two virtual machines should continue to use differencing disks from the parent. What should you do?

Merge Client2.vhd with Parent.vhd creating a new file named Client2a.vhd. Delete Client2.vhd and rename Client2a.vhd to Client2.vhd.

To increase the available memory for applications

Modify the Advanced system settings

You have a computer running Windows 7 Professional. To increase the available memory for applications, you need to increase the size of the paging file. What should you do?

Modify the Advanced system settings.

You have a folder on your Windows 7 Professional computer that you would like to share with members of your development team. Users should be able to view and edit any file in the shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they cannot modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

You have a folder on your Windows 7 Professional computer that you would like to share with members of your development team. Users should be able to view and edit any file int he shared folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they can not modify any of the files. What should you do?

Modify the NTFS permissions on the folder.

You have a folder on your Windows desktop system that you would like to share with members of your development team. Users need to be able to view and edit any file in the share folder. You share the folder and give Everyone Full Control permission to the shared folder. Users connect to the shared folder and report that they can open the files, but they cannot modify any of the file. What should you do?

Modify the NTFS permissions on the folder.

You need to restore the folder and its contents as quickly as possible

Mount the .vhd file in the backup, then copy the folder to the drive

You have a laptop computer that runs Windows 7. Your computer is configured to connect to the wireless network at work using a wireless profile named Company1. The profile is configured to connect using 802.11b. During a recent upgrade, your company has added an 802.11n wireless router. The router is configured to support 802.11n using one radio, and 802.11b/g with the other radio. You create a second profile on your computer for the 802.11n network. You notice that your computer is connecting automatically using 802.11b. You want the computer to connect first using 802.11n, and only use 802.11b if 802.11n is unavailable. What should you do?

Move the 802.11n profile up in the list of the preferred networks.

You manage a Windows 7 computer. For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions. You need to move the file from the existing folder to the D\Confidential folder. You want to keep the existing NTFS permissions on the fold. You want to accomplish this with the least amount of effort possible. What should you do?

Move the file to the new folder.

Because of a hardware failure, computer1 will not boot

Move the hard disk form Computer 1 to Computer 2. Use the recovery key from Computer 1 to gain access to the encrypted volume

What command do you use to start the System Configuration Tool?

Msconfig

What technology enables a computer to transmit the same data to multiple destinations at the same time?

Multicasting

Which component in a Network Access Protection (NAP) solution generates a Statement of Health (SoH) that reports compliance with network health requirements

NAP client

What would a corporation use to allow private IPv4 addresses to communicate with the Internet?

NAT

Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides basic NFS sharing with authentication and permissions. Which do you choose?

NFS Share-Quick

On which layer of the OSI model is IPv4 Addressing included?

Network

What component is used to ensure that all clients meet a minimum set of criteria such as up-to-date anti-virus protection and Windows updates?

Network Access Protection

You would like to use Windows Deployment Services (WDS) to deploy a custom image to all computers. All computers have a PXE-compliant network card.

Place an install image and a boot image on the WDS server

You are deploying Windows 7 in the accounting department. You discover that the users of the Windows 7 workstations will need the rights to change the network configuration of their local computers. What local group should you add the accounting users to on the Windows 7 computer? (Choose the most appropriate group)

Network Configuration Operators

You need to prevent users on a Windows workstation from installing applications

Network Zone

Which of the following is not an infrastructure requirement for using DirectAccess

Network access for files server role

A sales rep from a computer manufacturer recently offered you a very competitive price on Windows RT tablet systems

No, Windows RT does not support domain join

You have a PBY 32 GB USB 2.0 flash drive that you want to use for the Windows To Go drive

No, you must use an eSATA external storage device to create a Windows To Go drive

What should you do to configure the laptop for the DirectAccess connection

Obtain a computer certificate for the laptop

You have a Windows 7 computer that is shared by multiple users. You want to allow non-administrative users to install devices that use third-part drivers. Users should be able to install the device without prompts for administrative credentials. Users should only be able to install devices that use the drivers that you specifically identify. You copy the necessary drivers to the computer. You configure the DevicePath registry key to identify the folder where the drivers are located. A standard user logs on and tries to install the device, but gets a prompt for administrative credentials. What should you do?

Obtain drivers that have a digital signature.

On Comp1, you access files on the Data share across a WAN link

On Comp1, edit the local security policy

You use a desktop system named Comp1 that is located in a branch office. A server running Windows Server 2008 R2 named Srv1 is located in the main office. You share a folder named Data using the default caching settings. On Comp1 you access files on the Data share across a WAN link. You want to use transparent caching to reduce WAN traffic. What should you do?

On Comp1, edit the local security policy.

You are managing two computers: Comp1 is running Windows 7 Ultimate; Comp2 is running Windows XP Professional. You want to use Remote Desktop to manage Comp1 from Comp2. What should you do?

On Comp1, enable the 'Allow connections from computers running any versions of Remote Desktop' option in the system properties.

You want to use Remote Desktop to manage Comp1 and Comp2

On Comp1, enable the Allow connections from computers running any versions of Remote Desktop option in the system properties

You have two computers running Windows 7: comp1 and Comp2. Both computers are members of a domain. You need to ensure that you can remotely execute commands on comp2 from comp1. What should you do?

On Comp2, run "winrm qc"

You have two computers running Windows 7: comp1 and Comp2. both computers are members of a domain. Windows Remote Management (WinRM) is enabled on both computers. From comp2, you need to create an additional disk volume on comp1. What should you do?

On Comp2, run "winrs" and then run "diskpart"

You have two computers running Windows 7 named Comp1 and Comp2. Both Comp1 and Comp2 received their IP addresses from a DHCP server in the network, and accessed the Internet through a common default gateway. After several changes in the network infrastructure, Comp1 is the only computer with a connection to the Internet. In addition, Cmop1 is now acting as the default gateway and is sharing its Internet connection with Comp2. On Comp2, you are unable to access the Internet. You use the ipconfig /all command and discover the IP address for the Local Area Connection is 192.168.0.25 with a subnet mask of 255.255.255.0. What should you do?

On Comp2, run ipconfig /renew

You have two computers running Windows 7 named Comp1 and Comp2. Both Comp1 and Comp2 received their IP addresses from a DHCP server in the network, and accessed the Internet through a common default gateway. After several changes in the network infrastructure, Comp1 is the only computer with a connection to the Internet. In addition, Comp1 is now acting as the default gateway and is sharing its Internet connection with Comp2. On Comp2, you are unable to access the Internet. You use the ipconfig /all command and discover the IP address for the Local Area Connection is 192.168.0.25. What should you do?

On Comp2, run ipconfig /renew

You need to ensure that you can remotely execute commands on Comp2 from Comp1

On Comp2, run winrm qc

Windows Remote Management (WinRM) is enabled on both computers

On Comp2, run winrs and then diskpart

You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate all user profiles and data files from ComputerA to ComputerB. You need to ensure the user accounts on the destination computer are created and enabled during the migration. What should you do?

On ComputerB, run loadstate with the /lae and /lac options.

You need to configure M400 to cache the files from the Data share so they can be used when M400 is not connected to the network

On M400, make the Data share available offline and enable encryption of offline files

You want to prevent all files with the .iso and .mp3 extension from being cached

On Srv1, edit the local security policy

You need to migrate all user profiles and data files from WS1 to WS2. You need to ensure the user accounts on the distination computer are created and enabled during the migration

On WS2, rum loadstate with the /i option

You have two Windows systems named Computer1 and Computer2. Over the next few days, you want to monitor Computer1. You would like to automatically save the contents of the Application and System logs on Computer1 to Computer2. You will then use Even Viewer on Computer2 to view the contents of the logs generated on Computer1. What should you do?

On both computers, enable and configure Even Subscriptions. Configure Computer1 as a source, and Computer2 as a collector.

Over the next few days, you want to monitor Computer1

On both computers, enable and configure Event Subscriptions. Configure Computer1 as a source, and Computer2 as a collector

You have two computers that run Windows 7: computer1 and Computer2. Over the next few days, you want to monitor Computer1. You would like to automatically save the contents of the Application and System logs on Computer 1 to Computer2. You will then use Event Viewer on Computer2 to view the contents of the logs generated on Computer1. What should you do?

On both computers, enable and configure Event Subscriptions. Configure Computer1 as a source, and Computer2 as a collector.

When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer

On each computer, edit the BIOS to boot from the network first

You need to install Windows 7 Enterprise edition on multiple computers. Each computer has a single SATA hard drive, a PXE-compliant network card, a DVD drive, and several open USB ports. You have decided to use Windows Deployment Services (WDS) to simplify installation. You configure the WDS server with everything necessary to perform the installation. When you start each computer, you would like the computer to boot, connect to the WDS server, and start the installation process automatically without any intervention. You want to minimize the actions that you must perform on each computer. What should you do next?

On each computer, edit the BIOS to boot from the network first.

You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and Error events logged to the Application and System logs in Event Viewer. You would like to be able to see only the Warning and Error events from both logs displayed at the same time. You want to save this configuration so that you can check back each day to see any new errors. What should you do?

On the Application log, filter the log to show only Warning and Error events. Save the filter to a Custom View, adding the System log as an additional filter.

You have a computer that runs Windows 7. The computer has a single hard disk configured as a basic disk with a single partition formatted with NTFS. The disk has run out of space. You need to add space to the disk. you install a new hard drive and start disk Management. You need to add space to the existing volume using only necessary actions. What should you do? (Select two.)

On the C:\ drive, create an empty folder. On the new hard disk, create a new partition without a drive letter.

Your windows system has a single hard disk configured as a basic disk with a single partition formatted with NTFS. The disk has run out of space. You need to add space to the disk. You install a new hard drive and start Disk Management. You need to add space to the existing volume using only necessary actions. What should you do?

On the C:\ drive, create an empty folder. On the new hard disk, create a new partition without a drive letter.

While connecting to a remote system using Remote Desktop

On the Experience tab of the Remote Desktop connection, clear the Desktop Background

You have a computer running Windows 7 Ultimate. While connecting to a computer using Remote Desktop, you need to prevent the desktop background on the remote computer from displaying on the local computer. What should you do?

On the Experience tab of the Remote Desktop connection, clear the Desktop Background Option.

You have a Windows desktop system that is a member of a domain. Your domain contains a DHCP server that runs Windows Server 2008 R2. The server is configured as a Network Access Protection (NAP) enforcement point. You need to configure the computers as a NAP client. What should you do?

On the client, start the Network Access Protection Agent service. Configure the service to auto-start. On the client, enable the enforcement client for DHCP.

You decide to use a system image to deploy Windows 7 to multiple computers. You have configured a reference computer with Windows 7 and are ready to capture and deploy the image. You want to save the image file using three smaller files instead of one large file. Then you need to install the image to the new computers. You want to perform these actions with the least amount of effort possible. What should you do? (Select two. Each choice is a required part of the solution.)

On the reference computer, run imagex /capture. After the image is captured, run imagex /split. On the target computer, run imagex /apply /ref.

When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk

On the screen where you select the disk to install Windows, click Load Driver

You are installing Windows 7 on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a RAID5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive. You insert the installation DVD, boot to the disc, and start the installation. When you are prompted to select the disk where you want to install Windows, the RAID array you created does not show as a possible destination disk. What should you do?

On the screen where you select the disk to install Windows, click Load Driver.

You have a Windows 7 Ultimate laptop computer that you use both at home and in the office. The laptop has both an Ethernet and a wireless network connection. At home you have created a simple Ethernet network that connects your home computers to the Internet through a cable modem. A friend comes over to your house for some help configuring his new laptop computer. His computer has a wireless network adapter but not an Ethernet network adapter. He wants to connect his laptop through your network to the Internet to download some drivers. What should you do? (Select two. Each choice is a required part of the solution.)

On your laptop, configure a network bridge. Set up an ad hoc wireless connection between his computer and yours. Configure the wireless connection to use WPA-Personal

You job requires considerable travel. While Working in your office, you use a Windows 8.1 desktop system. While on the road, you used a Windows RT tablet devices. While Traveling, you frequently need to access files stored on the desktop system from your table device. What Windows 8.1/RT service can you configure to do this?

OneDrive.

You are working on a computer running Windows 7 Enterprise. Two devices connected to the computer are not performing correctly. You suspect the devices are conflicting with each other because they may be using the same system resources. What should you do to identify the problem? (Select two. Each answer is a possible solution.)

Open Device Manager and view the Resources tab. Run System Information (msinfo32).

When you test the VPN connection from your home, you find that the connection cannot be made

Open UDP port 500 and 4500 and protocol 50 on your home router

You must prevent Internet Explorer on your Windows system

Open an InPrivate Browsing session

You have a computer running Windows 7. You must prevent Internet Exporer from saving data during a browsing session. What should you do?

Open an InPrivate Browsing session.

You enable Remote Desktop on the computer

Open port 3389 in the network firewall

You have a Windows 7 computer that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop, preventing a connection to the Windows 7 computer What should you do?

Open port 3389 in the network firewall.

You have a windows system that you would like to manage remotely. You enable Remote Desktop on the computer. While working from home, you find that your home firewall is blocking Remote Desktop, preventing a connection to the system. What should you do?

Open port 3389 in the network firewall.

You suspect that a process on your windows 7 computer is causing a large amount of network activity. You would like to view the network activity on your computer filtered by specific processes. Select the link that you would choose to view this information.

Open resource Monitor

To trouble shoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS)

Open the Services snap-in

You have a computer running Windows 7 Ultimate. After running the Backup and Restore console, you notice that backups are not created for open files. To troubleshoot the issue, you want to confirm that the Volume Shadow Copy Service (VSS) is started and is configured to start automatically when the computer boots. What should you do?

Open the Services snap-in.

On Comp1, you want to see your synchronization partners

Open the Sync Center in the Control Panel

You have a computer that runs Windows 7. You started using the computer three months ago. Since that time, you have found that, from time to time, the system has had slowdowns and crashes. You want to look at a report that shows important events for the server since it was installed. you'd like to see when software was installed, along with any hardware or application failures. You want to view this information with as little effort as possible. What should you do?

Open the System Stability Chart in Reliability Monitor.

You want to view this information with as little effort as possible

Open the System Stability Chart in Reliabilty Minitor

You have a workstation running the 64-bit version of Windows 7 Ultimate that you would like to change to the 64-bit version of Windows 7 Professional

Perform a Custom (advanced) installation using the Windows 7 installation disc

You have a workstation running the 64-bit version of Windows 7 Ultimate that you would like to change to the 64-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?

Perform a Custom (advanced) installation using the Windows 7 installation disc.

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available following the upgrade. You want to perform the upgrade with the least amount of effort possible. What should you do?

Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run *Scanstate* and then *Loadstate*.

You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available following the upgrade

Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run Scanstate and then Loadstate

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want your user profile settings to be applied to Windows 7, with all user files available following the upgrade. You want to perform the upgrade with the least amount of effort possible. What should you do?

Perform a custom (advanced) installation of Windows 7 to the existing hard drive. After the installation, boot into Windows 7 and run Scanstate and then Loadstate.

The disk holding the operating system fails

Perform a system image recovery

You have a computer that runs Windows 7. The computer has two hard disks, one internal disk and one removable hard disk. You complete a full system backup and schedule regular backups of the system drive. All backups are saved to the removable hard disk. You also enable system protection on the system disk. The disk holding the operating system fails. you replace the disk with a new one, and now need to get the system running again as quickly as possible. you boot the computer to the Windows installation disc. What should you do?

Perform a system image recovery.

You want to perform the upgrade with the least amount of effort and cost

Perform an Upgrade using the Windows 7 installation disc

You have a workstation running the 32-bit version of Windows Vista Business that you would like to upgrade to the 32-bit version of Windows 7 Professional. You want to perform the upgrade with the least amount of effort and cost. What should you do first?

Perform and Upgrade using the Windows 7 installation disc.

You need to monitor the processor utilization on your Windows system

Performance counter alert

You want to monitor the processor utilization on your Windows 7 computer. You want to get an e-mail notification every time the processor utilization exceeds 90%. You create a new Data collector Set in Performance Monitor. What type of Data collector should you create?

Performance counter alert

Which of the following enables the user to manage, configure, or perform certain tasks on an object?

Permissions

You have several computers running Windows 7 Enterprise. The computers are connected to the network as shown in the image. You have configured static IP addresses for Comp1 and Comp2. To test the connection between the computers, you enter *ping 192.168.23.38* on Comp1's command prompt; however, the ping is unsuccessful and times out. You then use the *ping 192.168.23.231* on Comp2's command prompt, but the ping times out again.You need the ping commands to succeed between the two computers. What should you do?

Permit ICMPv4 traffic through the firewalls of both computers.

YOu have a computer running Windows 7 Professional. You have just enabled Remote Desktop on the computer so you can connect to it using a dial-up modem from home and run a few reports. You need to optimize the performance of your Remote desktop session for your slow connection. Select the Experience setting(s) that will optimize performance.

Persistent bitmap caching

You need to add additional disk space to the AccServ virtual machine running on a Windows Server 2012 hypervisor. to accomplish this, you decide to create a pass-through disk. Click the option you would use in the virtual machine's Settings screen to do this.

Physical hard disk:

What command is used to test network connectivity between two hosts?

Ping

You manage a network with all Windows 7 clients. As part of your Ipv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?

Ping the address beginning with 2001:

You mange a network with all Windows 7 clients. As part of your IPv6 migration strategy, you have implemented Teredo on your network. You would like to test the communication of a client computer using Teredo. What should you do?

Ping the address beginning with 2001:

You manage a network with all Windows 7 clients. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP. What should you do?

Ping the address beginning with FE80:

You mange a network with all Windows 7 clients. As part of your IPv6 migration strategy, you have implemented ISATAP on your network. You would like to test the communication of a client computer using ISATAP. What should you do?

Ping the address beginning with FE80:

You need to install Windows 7 to multiple computers on your network. You would like to use Windows Deployment Services (WDS) to deploy a custom image to all computers. All computers have a PXE-compliant network card. What should you do?

Place an install image on the WDS server.

You would like to use Windows Deployment Services (WDS) to deploy a custom image to all computers. The computers do not have a PXE-compliant network cards

Place an install image on the WDS server. Boot each computer using a CD that contains a discover boot image with Windows PE

You need to install Windows 7 to multiple computers on your network. You would like to use windows Deployment Services (WDS) to deploy a custom image to all computers. The computers do not have a PXE-compliant network cards.

Place an install image on the WDS server. Boot each computer using a CD that contains a discover boot image with Windows PE.

You have a folder on your Windows 7 computer that you would like members of your development team to access. You want to restrict network and local access to only specific users. All other users must not be able to view or modify the files in the folder. What should you do? (Select two.)

Place the files on an NTFS partition. Configure both share and NTFS permissions.

You need to configure the system to create a memory dump

Place the paging file on the system drive

You have a laptop running windows 7 Professional. You have been having trouble with the laptop crashing. The support technician wants you to send him a memory dump that occurred when the computer crashed. You find that the computer did not create the memory dump file. You need to configure the system to create a memory dump file when it crashes. What should you do?

Place the paging file on the system drive.

Which command is used to manage power?

Powercfg.exe

You are researching the network requirements needed to support WDS on your network. One of your workstation requirements is that the network interface adapter has to support _______.

Pre-boot Execution Environment

What program that comes with Windows 7 is a wizard-based solution that users or administrators can use to automatically configure an executable file to use an appropriate Windows 7 compatibility mechanism?

Program Compatibility Troubleshooter

Which of the following configures Internet Explorer to only low-integrity disk locations, such as the Temporary Internet Files and the standard IE storage areas, including the History, Cookies, and Favorites folders?

Protected mode

Which of the following is used to help prevent attackers that penetrate the computer?s defense from accessing vital system components?

Protected mode

__________ are the rules or languages in which networking is possible.

Protocols

You want to configure the scheduled backup to include a system image

Purchase and attach an external USB hard disk

You have a laptop computer running Windows 7 Ultimate. The computer has a single 20 GB internal hard drive and an optical drive. The internal hard drive has a single volume which currently takes all of the disk space. You want to sue the Backup and Restore console to create a scheduled backup that includes all user files and system image. You purchase and attach a 30 GB USB flash drive to the computer. When you run the Backup and Restore console, you select the flash drive as the backup destination. however, you cannot configure the settings to include a system image during the backup. You want to configure the scheduled backup to include a system image with the least amount of effort. What should you do?

Purchase and attach an external USB hard disk.

A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the following specifications (Windows 8.1 Pro)

Purchase the desktop systems as configured and implement them in the network

You run the setup and install Windows 7 in the same computer and hard drive

Re-install all applications

You have a computer that runs Windows XP Professional that you would like to upgrade to Windows 7 Professional. You run the setup program and install Windows 7 on the same computer and hard drive. What should you do next?

Re-install all applications.

You have a computer running Windows 7. Prior to installing some software, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but it is not working at all. What should you do?

Reboot the machine.

You have a computer running windows 7. Prior to installing some software, you turn off User Account Control (UAC), reboot the computer, and install the software. You turn UAC back on, but it does not prompt you before performing sensitive actions. You want the protection of UAC, but it is not working at all. What should you do?

Reboot the machine.

You need to start the computer using the least amount of effort (new music)

Reboot the system using Last Known Good Configuration from the Advanced Startup options

You have a computer that runs Windows 7. You install the drivers to connect your new PDA to the computer. Immediately following the device installation, you get a bluescreen error. You reboot the computer but it shows the same error before the boot process completes. You need to start the computer using the least amount of effort. What should you try first?

Reboot the system using Last Known Good Configuration from the Advanced Startup options.

You have a computer that runs Windows 7. You install the drivers to connect your new music player to the computer. Immediately following the device installation, you get a bluescreen error. You reboot the computer but it shows the same error before the boot process completes. You need to start the computer using the least amount of effort. What should you try first?

Reboot the system using Last Known Good Configuration from the Advanced Startup options.

Which of the following would you use to reconfigure BitLocker so the system will start

Recovery key

What do you call a template for a workstation configuration that contains all the software the workstation requires?

Reference computer

You have lost the USB device containing the startup.

Reformat the hard drive and reinstall Windows

Which of the following requires invitations to use?

Remote Assistance

Which program enables you to connect to a remote computer including servers with no interaction required from the remote computer?

Remote Desktop

You manage a Windows 7 computer with an attached printer. You share the printer using a share name of Printer1. You assign the Allow Print permission for the printer to the Sales group. However, you discover that users who are not members of this group can print to the printer. You want only members of the Sales group print to Printer1. What should you do?

Remove Everyone from the printer's access control list.

You manage a Windows 7 computer. You need to control access to the D:\Reports folder as follows: Members of the Accounting group should be able to open and view all files, edit them, and add new files. They should not be able to delete or rename files. Mary needs to be able to open and view files, but should not be able to modify the files or delete them. Mary is a member of the Accounting group. You want to assign NTFS permissions taking the least amount of actions possible and affecting existing permissions as little as possible. What should you do?

Remove Mary from the Accounting group. Assign Allow Read & execute, List folder contents, read, and modify to the Accounting group. Assign allow Read & execute, List folder contents, and Read to Mary.

You have a Windows 7 computer that is shared by multiple users. Sally wants to access a file in the Reports folder. A group named Sales has been granted the Full Control permission to the Reports folder and all subfolders and files. You add Sally as a member of the Sales group, but she still cannot access the file that she needs. You want to let Sally access the Reports folder. What should you do?

Remove Sally from any other groups that have been explicitly denied access to the Reports folder.

On your Windows computer, you share the D:\Promo folder using a sharename of Promo. The share has been assigned the following permissions: Telesales group > Allow Read Training group > Deny Full Control Managers group > Allow Change Mary user > Allow Change The Mary user account is a member of the Training group. NTFS permissions allow all access. Mary needs to be able to edit documents in the shared folder but cannot. You need to modify the share permissions to allow her the necessary access. What should you do?

Remove the Mary user account from the Training group. Change the Training group permission to allow Read.

You have a stand-alone computer running Windows 7 Professional. You notice that the Aero features are not displayed. The computer has a 19 inch CRT screen that supports refresh rates up to 65 Hertz and a video card with 64 MB RAM. You need to use the Aero features. What should you do?

Replace the video adapter card with one that has at least 128 MB RAM.

You need to use the areo features

Replace the video adapter card with the one that has at least 128 MB RAM

Your Windows system is a member of a domain. To increase security as users log onto the computer, you need to implement the strongest form of multi-factor authentication. What should you do?

Require a password, a biometric scan, and a token device.

You have a computer running Windows 7 Professional. The computer has the following two volumes: * The C: drive is the system drive with user profiles and individual user files * The D: drive holds data files common to all users You take the following actions: * You create a system image backup that includes both the C: and D: drives. * You schedule regular backups to back up all user libraries. The scheduled backup includes a system image. * You use System Restore to take a snapshot. You edit and save a file on the D: drive. You decide that you don't like the changes and want to revert to a previous version of the file. You go to the 'Previous Versions' tab of the file and see nothing listed. You need to restore the previous version of the file. What should you do?

Restore the file form the system image.

You go to the Previous Versions tab of the file and see nothing listed

Restore the file from the system inage

You manage a computer that runs Windows 7. As part of your regular system maintenance, you install the latest operating system updates. After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. You want to restore the computer to its previous state before the updates as quickly as possible. What should you do?

Restore the system using a restore point.

You are working on a computer running Windows 7. It is part of a domain. You recently installed Windows 7 Professional edition. After installation, you are not able to connect to resources on the network. You check Device Manager and see the dialog shown in the image. What should you do?

Right-click the Broadcom NetXtreme Gigabit Controller and select Update Driver.

You have a Windows 7 computer. You use the computer at home with a small network used by members of your family. you want to share the contents of a folder with other users over your network. most users should have read-only access, but you want to explicitly deny access to other users. you want to configure the permissions using the least amount of effort possible. What should you do?

Right-click the folder and select 'Properties'. Configure Advanced Sharing on the 'Sharing' tab.

You have a Windows 7 computer. You use the computer at home with a small network used by members of your family. You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny access to other users. You want to configure the permissions using the least amount of effort possible. What should you do?

Right-click the folder and select Properties. Configure Advanced Sharing on the Sharing tab.

You have a Windows system that use at home on a small network shared by members of your family. You want to share the contents of a folder with other users over your network. Most users should have read-only access, but you want to explicitly deny access to other users. You want to configure the permissions using the least amount of effort possible. What should you do?

Right-click the folder and select Properties. Configure Advanced Sharing on the Sharing tab.

Which type of user profile is stored on a shared server drive, which makes it accessible from anywhere on the network?

Roaming user profile

You use the computer tor several days

Roll back the display adapter driver

You have a computer that runs Windows 7. You install a new art application on your computer. The application recommends that you install an updated video driver. You install the new driver. You use the computer for several days, but notice that the display doesn't seem to refresh properly. You want to sue your previous display adapter driver to correct the problem. You need to implement a solution that minimizes downtime. What should you do?

Roll back the display adapter driver.

You have a computer that runs Windows 7. You install a new art application on your computer. The application recommends that you install an updated video driver. You install the new driver. You use the computer for several days, but notice that the display doesn't seem to refresh properly. You want to use your previous display adapter driver to correct the problem. You need to implement a solution that minimizes downtime. What should you do?

Roll back the display adapter driver.

What type of exploit is in use in this scenario

Rootkit

You decide not to keep any of the changes you have made to the image on the VHD file. the VHD file is still attached

Rum Diskpart, then detach. Restore the VHD file from a backup

You create a file named myCaptureSettings.ini to identify the compression settings

Rum imagex.exe with the /capture, /compress, and /config options

You are the desktop administrator for your company. You manage 20 Windows 7 comptuers. You would like to manage the computers remotely using the Windows Remote Shell. You need to enable remote management on each computer. What should you do?

Run "Winrm quickconfig".

You have a Windows 7 laptop that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recovery agent so you cna recover any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first?

Run "cipher /r"

You have a Windows 7 computer with a new hard drive. You want to create and format volumes on the hard drive. What should you do?

Run 'Diskpart' from the command prompt.

You mange a computer that runs windows 7. You have just added a new 300 GB hard drive to the computer. You create a single volume named 'Data' and format the volume using FAT32. The volume is assigned drive letter D:. You copy several files to the new hard disk. You would like the disk to be included in any restore points created on the computer. What should you do first?

Run 'convert.exe to change the drive to NTFS.

You have a laptop running Windows 7 Ultimate edition. You have been encrypting files on your computer using EFS and a self-signed certificate. You now want to protect your encrypted files using a certificate on a smart card. You install a smart card reader and obtain a smart card with a new certificate. You want to make sure that all encrypted files use the certificate on the smart card. What should you do first?

Run 'rekeywiz'

You have a Windows 7 laptop that is shared by three users. The computer is not a member of a domain. Each user has been using EFS to encrypt their personal files on the laptop. You would like to add your user account as a recover agent so you can revery any encrypted file encrypted by any user on the laptop. You would like to store the recovery keys on a smart card. What should you do first?

Run *cipher /r*.

You have a laptop running Windows 7 Ultimate edition. You have been encrypting files on your computer using EFS and a self-signed certificate. You now want to protect your encrypted files using a certificate on a smart card. You install a smart card reader and obtain a smart card with a new certificate. You want to make sure that all encrypted files use the certificate on the smart card. What should you do first?

Run *rekeywiz*.

You have a computer that runs Windows 7. You need to manually check for updates from Windows Update. What should you do? (Select two. Both answers are complete solutions.)

Run *wuauclt.exe /detectnow*. Click the *Check for updates* button in Windows Update.

You have a workstation running the 32-bit version of Windows 7 Professional that you would like to upgrade to the 32-bit version of Windows 7 Ultimate. You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible. What should you do first?

Run Anytime Upgrade

You want to perform the upgrade with the least amount of effort and cost while maintaining as much user data as possible

Run Anytime Upgrade

You need to boot the computer from the VHD file (Windows 8 Enterprise)

Run BCDEdit and modify the BCD boot entries

You have a computer that runs Windows 7 Ultimate and a VHD file which contains a Windows 7 installation. You need to boot the computer from the VHD file. What should you do?

Run BCDEdit and modify the BCD boot entries.

If you have a program that ran in Windows XP but does not run in Windows 7, what should you load to run the program?

Windows XP Mode

You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the install.wim image on the Windows installation disc. You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management. You run ImageX to apply the image to the VHD file. What should you do next?

Run BCDEdit to create a BCD entry pointing to the VHD file.

The hard drive in your Windows system has been protected using BitLocker.

Run BdeHdCfg.exe

You have a computer that runs Windows 7. You need to free up disk space and would like to delete all but the most recent restore point. What should you do? (Select two. Each selection is a complete answer.)

Run Cleanmgr as an administrator, then use the More Options tab to clean up the restore points. In Disk Cleanup, select Clean up system files, then use the More Options tab to clean up the restore points.

You have received sone operating system updates and would like to add these to the existing install image without recapturing the entire image

Run DISM

You want to deploy Windows 7 Enterprise to multiple computers from a previously-captured system image. You have received some operating system updates and would like to add these to the existing install image without recapturing the entire image. What should you do?

Run DISM

You have a Windows 7 computer with a single hard disk. You notice that the disk defragmentation schedule has been turned off on your computer. The disk is badly fragmented. You want to run disk defragmentation manually. What should you do?

Run Defrag.

You have a computer that runs Windows 7. The computer has two hard drives, both formatted with NTFS. You have enabled System Restore on both disks. You want to delete all restore points except for the last restore point. What should you do?

Run Disk Cleanup

You have a computer that runs Windows 7. The computer has two hard drives, both formatted with NTFS. you have enabled System Restore on both disks. You want to delete all restore points except for the last restore point. What should you do?

Run Disk Cleanup.

You boot the computer using WinPE and map a drive to the network share

Run Diskpart to partition and format the disk

You have a computer without an operating system installed. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on the following network share: \\imgserve\images. You need to manually deploy the image onto the computer. You boot the computer using WinPE and map a drive to the network share. What should you do next?

Run Diskpart to partition and format the disk.

You have a computer that runs Windows 7 Enterprise. You have a VHD file that contains a Windows 7 image. You need to perform offline servicing of the image in the VHD file. You attach the VHD file and use Dism to make several changes. You decide not to keep any of the changes you have made to the image on the VHD file. The VHD file is still attached. What should you do?

Run Diskpart, then detach. Restore the VHD file from a backup.

You have a computer that runs Windows 7 Enterprise. You have a VHD file that contains a Windows 7 image.You need to perform offline sercicing of the image in the VHD file. You attach the VHD file and use Dism to make several changes. You decide not to keep any of the changes you have made to the image on the VHD file. The VHD file is sill attached. What should you do?

Run Diskpart, then detach. Restore the VHD file from a backup.

You realize the driver should not have been added to the image. You need to undo the changes you have made using the least amount of effort possible. The VHD file is still aattached

Run Dism /Remove-Driver

You have a computer that runs Windows 7 Enterprise. You have created a VHD file that contains a Windows 7 image. You need to perform offline servicing of the image in the VHD file to add a driver and enable some Windows features. You attach the VHD file. You use Dism to add a driver. You realize the driver should not have been added to the image. You need to undo the changes you have made using the least amount of effort possible. The VHD file is still attached.

Run Dism /Remove-Driver.

You want to undo the changes with the least amount of effort

Run Dism with the /unmount-wim and /discard options

You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image. You mount the image and use Dism to make several changes to the image. You decide not to keep any of the changes you have made to the image. The image is still attached. You want to undo the changes with the least amount of effort. What should you do?

Run Dism with the /unmount-wim and /discard options.

You have a computer running Windows 7 Professional. You want to capture the installation as a system image. You need to remove any computer-specific information from the computer prior to capturing the image. What should you do?

Run Sysprep

You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You have downloaded the Windows AIK tools. you create and attach a virtual disk file using Disk Management. What should you do next?

Run ImageX to apply the install.wim image to the VHD.

You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management. What should you do next?

Run ImageX to apply the install.wim image to the VHD.

You have downloaded the Windows AIK tools. You create and attach a virtual disk file using Disk Management

Run Imagex to apply the install.wim image to the VHD

You are visiting a Web site that worked fine when you were using Internet Explorer 6 on a Windows XP machine. However, you suspect that this Web site is not compatible with Internet Explorer 8?s protected mode. Which of the following should you NOT do when troubleshooting this problem?

Run Internet Explorer as a domain administrator.

You want to deploy Windows 7 Enterprise to multiple computers from a previously-captured system image. You have received an updated application and would like to add the application to the existing install image without recapturing the entire image.. What should you do?

Run MDT 2010 with the Distribution share.

You have received an updated application and would like to add the application to the existing install image without recapturing the entire image

Run MDT with the Distribution share

You have a computer running Windows 7 Home Premium. You need to customize which utilities and programs are processed at startup for the computer. What should you do?

Run Msconfig

You need to customize which utilities and programs are loaded at startup on your Windows system

Run Msconfig

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scanstate in Windows XP, Perform a custom installation of Windows 7 to the existing hard drive. Boot into windows 7 and re-install all applications. Run Loadstate.

You want to upgrade your computer to Windows 7 Professional . You want to maintain as much of the application, user profile, and user data as possible

Run Scanstate in Windows XP. Perform a custom (advanced) installation of Windows 7 to the existing hard drive. Boot into Windows 7 and re-install all application. Run Loadstate

You have computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scanstate in Windows XP. Perform a custom (advanced) installation of Windows 7 to the existing hard drive. Boot into Windows 7 and re-install all applications. Run Loadstate.

You have a computer that runs Windows XP Professional. You want to upgrade your computer to Windows 7 Professional. You want to maintain as much of the application, user profile, and user data as possible. You want to perform the upgrade with the least amount of effort possible. What should you do?

Run Scantate in Windows XP. Perform a custom (advanced) installation of Windows 7 to the existing hard drive. Boot into Windows 7 and re-install all application. Run Loadstate.

You want to capture the installation as a system image

Run Sysprep

You want to prevent the Windows Welcome screen

Run Sysprep with the /audit option

You decide to use a system image to deploy Windows 7 to multiple computers. You have installed Windows on a reference computer. You need to restart Windows and manually install applications and make other changes prior to capturing the image. You want to prevent the Windows Welcome screen from showing when the system reboots prior to customizing the installation. You do not want any changes you make to prevent the end-user from seeing the full Out-of-Box Experience after the image is applied. What should you do?

Run Sysprep with the /audit option.

You manage a computer that runs Windows 7 Enterprise edition. You would like to boot the computer to a VHD file that contains a Windows 7 installation. You will use the install.wim file from Windows installation disc to create the VHD file. You would also like to apply updates to the image. What should you do?

Run WIM2VHD

You will use the install.wim file from the Windows installation disc to create the VHD file. You would also like t apply updates to the image

Run WIM2VHD

You have two computers: ComputerA is running Windows XP Professional and ComputerB is running Windows 7 Professional. You need to transfer user profiles and data files from ComputerA to ComputerB. What should you do? (Select two. Each answer is a complete solution.)

Run Windows Easy Transfer Run USMT

You have a computer running Windows 7 Ultimate. The computer is performing poorly. You want to check the memory component subscore of your computer. What should you do?

Run Windows Experience Index

Your Windows system is performing poorly

Run Windows Experience Index

Later in the day, you experience problems accessing the same files

Run Windows Network Diagnostics

You have a computer running Windows 7 Enterprise. After connecting to your company's network, you are able to access all of your personal files. Later in the day, you are having problems accessing the same files, as well as other files on the network. What should you do?

Run Windows Network Diagnostics

You want to deploy Windows 7 to multiple computers using a system image. You would like to use an answer file to automate the installation process on a reference computer. What should you do first?

Run Windows System Image Manager (Windows SIM).

You would like to use an answer file to automate the installation process on a reference computer

Run Windows System Image Manager(Windows SIM)

The computer currently boots to Windows 7 by default. You need the computer to boot to Windows 8 as the default operating system instead

Run bcdedit.exe

You have a stand-alone computer running both Vista and Windows 7. The computer currently boots to Windows 7 by default. You need the computer to boot to Windows Vista as the default operating system instead. What should you do?

Run bcdedit.exe.

You would like the disk to be included in any restore point

Run convert.exe to change the drive to NTFS

You manage a computer that runs Windows 7. You have just added a new 300 GB hard drive to the computer. You create a single volume named Data and format the volume using FAT32. The volume is assigned drive letter D:. You copy several files to the new hard disk. You would like the disk to be included in any restore points created on the computer. What should you do first?

Run convert.exe to change the drive to NTFS.

You need to copy files to an existing VHD file that contains a Windows 7 installation

Run diskpart.exe, the use the list, select, and attach commands

You have a computer running Windows 7 Ultimate. You need to copy files to an existing VHD file that contains a Windows 7 installation. What should you do?

Run diskpart.exe, then use the list, select, and attach commands.

You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you need to see a list of all the drivers included in the image. What should you do?

Run dism

You are performing a network installation of Windows 7 on a new computer. You boot the computer using Windows PE. You need to install a device driver for the network adapter. What should you do?

Run drvload.exe

You are performing a network installation on windows 7 on a new computer. You boot the computer using windows PE. You need to install a device driver for the network adapter. What should you do?

Run drvload.exe

You need to install a device driver for the network adapter

Run drvload.exe

You have mounted and dismounted the image several times. You want to reduce the overall size of the image file by removing unnecessary resource files from the image file

Run imagex /export

You need to deploy Windows 7 Enterprise to multiple new computers. You have an image that you have previously captured. You have mounted and dismounted the image several times. You want to reduce the overall size of the image file by removing unnecessary resource files from the image file. What should you do?

Run imagex /export.

You need to deploy Windows 7 Enterprise to multiple new computers. You have an image that you have previously captured.You have mounted and dismounted the image several times. You want to reduce the overall size of the image file by removing unnecessary resource files from the image file. What should you do?

Run imagex /export.

You have a computer running Windows 7 Ultimate. You will use this computer as a reference computer to install Windows 7 from a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to capture the image using compression, but excluding some file types from being compressed. You create a file named myCaptureSettings.ini to identify the compression settings. What should you do next?

Run imagex.exe with the /capture, /compress, and /config options.

You have a computer running Windows 7 Ultimate. You want to capture the installation as a system image. You have already used Sysprep to remove machine-specific information from the reference computer. You need to exclude specific files from the ImageX capture operation. What should you do? (Select two. Each choice is a required part of the solution.)

Run imagex.exe. Create a wimscript.ini file and include an exclusion list section.

You have a computer that runs Windows 7 connected to a domain network. After reconfiguring the static address of an internal Web server named WEB3, your computer can no longer connect to WEB3. However, other users are still able to connect to the same Web server. You need to be able to connect to the website on the WEB3 server. What should you do?

Run ipconfig /flushdns

You have a computer that runs Windows 7. Your network has just transitioned from using IPv4 to IPv6. IPv6 configuration is performed automatically using stateful DHCPv6. A DNS server on your network provides name resolution for IPv6. Your computer is having problems communicating on the network. You would like to receive new configuration information from the DHCP server as well as remove all old DNS entries in your local DNS cache. What should you do? (Select two. Each choice is a required part of the solution.)

Run ipconfig /release6 and ipconfig /renew6 Run ipconfig /flushdns

You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. You need to configure your computer with a static IPv6 address. What should you do?

Run netsh

You have a computer that runs Windows 7. Your company has started the migration to IPv6 on your network. Your network administrator tells you that the network is using stateless autoconfiguration. You need to configure your computer for IPv6 so it is correctly configured with the IPv6 address, default gateway, and DNS server addresses. The computer is currently configured to get all IPv6 information automatically. What should you do?

Run netsh interface ipv6 add dnsserver

You have a computer that runs Windows 7. Your network has just transitioned from using Ipv4 to Ipv6. Ipv6 configuration is performed automatically using information received by network routers. The network does not use a DHCPv6 server. Your computer is unable to communicate with a server named Srv1. A ping test to the server using its Ipv6 address works, but fails when you use its host name. What should you do?

Run netsh with the add dnsserver option.

You have a computer running Windows 7. You need to see a list of third-party drivers on the system. What should you do?

Run pnputil -e at the command prompt.

You have two computers: ComputerA is running Windows Vista and ComputerB is running Windows 7. You need to migrate specific application settings from ComputerA to ComputerB by using USMT. What should you do? (Select two. Each choice is a required part of the solution.)

Run scanstate with the /i option. Edit the migapp.xml file.

You have a single computer running Windows XP. You perform a Custom (advanced) installation of Windows 7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the Windows XP installation to the Windows 7 installation. What should you do?

Run scanstate with the /offlineWinOld: option

You have a single computer running windows xp. You perform a custom (advanced) installation of windows 7 to the existing disk partition on the computer. You need to migrate user profiles and user data from the windows xp installation to the windows 7 installation. What should you do?

Run scanstate with the /offlinewinold: option

You need to migrate user profiles and user data from the Windows XP installation to the Windows 7 installation

Run scanstate with the/offlineWinOld: option

Your Windows 7 computer has two hard drives. C: = 32.00 GB NTFS D: = 2 GB FAT32 The C:\Finances folder and its contents have been encrypted. You need to move the C:\Finances\Reports.xls file to the D: drive. You want the file to remain encrypted. You want to accomplish this with the least amount of effort possible. What should you do?

Run the 'convert' command followed by the 'xcopy' command

You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2008 R2 and holds all shared files for the company. The office in Olympia has 5 client computers, all running Windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office, caching all contents on a server in the Olympia office. What should you do to configure the client computers int he Olympia office?

Run the 'netsh' command to set the BranchCache mode to Hosted Cache. Use the FQDN of the server in the Olympia office.

Your Windows 7 computer has two hard drives as shown in the *Exhibit*. The C:\Finances folder and its contents have been encrypted. You need to move the C:\Finances\Reports.xls file to the D: drive. You want the file to remain encrypted. You want to accomplish this with the least amount of effort possible. What should you do?

Run the *convert* command, followed by the *xcopy* command.

You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fine on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next?

Run the Compatibility Administrator

You just purchased a new Windows 7 system for an artist in your company. After installing an art application to the computer, the artist states that the application does not work correctly. The application worked fin on a Windows XP machine. In an attempt to fix the problem, you tried to run the application in compatibility mode. When this didn't work, you temporarily disabled UAC, but this still didn't fix the problem. You decide to create a shim for the application. You download the Application Compatibility Toolkit (ACT). What should you do next?

Run the Compatibility Administrator.

You create and attach a virtual disk file using Disk Management. You need to apply the Windows image file to the virtual disk

Run the Install-WindowsImage.ps1 PowerShell script

You have a computer that runs Windows 7 Enterprise. You want to configure the computer to boot to a Windows 7 installation on a VHD file. You will use the install.wim image on the Windows installation disc. Your computer does not have the Windows AIK installed. You create and attach a virtual disk file using Disk Management. You need to apply the Windows image file to the virtual disk. What should you do?

Run the Install-WindowsImage.ps1 PowerShell script.

You have a computer that runs Windows 7 connected to a domain network. One day you find that your computer cannot connect to any network resources. You run the Ipconfig command and find that the network connection has been assigned the address of 169.254.12.155 with a mask of 255.255.0.0. What should you do?

Run the Ipconfig /release and Ipconfig /renew commands.

You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with Windows 7. What should you do?

Run the Windows 7 Upgrade Advisor

You have a Windows XP Professional system that you would like to upgrade to Windows 7 Ultimate

Run the Windows 7 Upgrade Advisor

You have a Windows Vista system that you would like to upgrade to Windows 7. You want to make sure that everything in your current system is compatible with windows 7. What should you do?

Run the Windows 7 Upgrade Advisor.

You have a Windows XP Professional system that you would like to upgrade to Windows 7 Ultimate. What should you do first?

Run the Windows 7 Upgrade Advisor.

You have a computer running Windows 7 Ultimate. For several years, the developers in your company have used a specific application. After installing the application on your computer, it no longer executes correctly. The application worked best on Windows XP machines with Service Pack 3. You need to have the application work correctly on this computer with the least amount of administrative effort. What should you do?

Run the application in compatibility mode.

You have a computer running Windows 7 Ultimate. For several years, all employees in your organization used an in-house application that was created by internal developers. After installing the applications on you Windows 7 system, it doesn't execute correctly. The application worked correctly on Windows XP machinces with Service Pack 3. You need the application to work correctly on this computer with the least amount of administrative effort What should you do?

Run the application in compatibility mode.

You have a computer running Windows 7 Ultimate. For several years, the developers in your company have used a specific application. After installing the application on your computer, it no longer executes correctly. The application worked best on Windows XP machines with Service Pack 3. You need to have the application work correctly on this computer with the least amount of administrative effort. What should you do?

Run the application in compatibility mode.

Your Windows 7 computer has two hard drives as shown in the image. The C: drive is running out of space. You would like to move the C:\Finances folder to the D: drive. Existing NTFS permissions should be kept on the folder following the move. You want to accomplish this with the least amount of effort possible. What should you do?

Run the convert command, followed by the xcopy command.

You have a laptop that runs Windows 7. The laptop uses DHCP for IPv4 addressing information. You need to see the IPv4 address, subnet mask, and DNS server addresses that the network connection is currently using. What should you do? (Select two. Each choice is a possible solution.)

Run the netsh command. View the status for the network connection. Click the Details button.

You have just installed a new Windows 7 computer for a client. The client asks you to install a software program that has the following minimum software requirements. 256 Memory 1 Gigabyte Hard Drive Windows XP Operating system You install the software on the Windows 7 computer and when you select the shortcut to launch the executable the program will not launch. What step would be most appropriate to take next?

Run the program using one of the Windows XP compatibility modes

You want to make sure that everything in your current system is compatible with Windows 7

Run the windows 7 Upgrade Advisor

You would like to manage your computers remotely using the Windows Remote Shell

Run winrm quickconfig

What physical disk technology runs at 600 MB/sec. However, it is no longer suitable for large enterprise servers.

SATA

Using File and Storage Services in Server Manager, you will create a new share. The New Share Wizard prompts you for a profile. You need a profile that provides SMB sharing with full share and NTFS permissions and access to services provided by File Server Resource Manager. Which do you choose?

SMB Share-Advanced

Which VPN protocol connects using SSL?

SSTP

What option starts the computer with a minimal set of generic drivers which are needed to run the system?

Safe mode

You would like to create a new Custom view using the current filter settings

Save the filter to a Custom View

You have a computer that runs Windows 7. You are troubleshooting a problem that keeps occurring. When the problem happens, there are several Warning and error events logged to the Application log in Event Viewer. You create a custom View that shows only Warning and Error events. During troubleshooting, you filter the Custom View to show only the Error messages. You would like to create a new custom View using the current filter settings. What should you do?

Save the filter to a Custom View.

What do you call it when you are loading an application, and you get a credential prompt that makes the rest of the screen dull and unclickable?

Secure desktop

You have a computer running Windows 7 Ultimate. Using Internet Explorer 8, you need to set restriction on ActiveX controls. Select the tab you would choose to set the restrictions?

Security Tab

You have a computer that runs Windows 7 Professional. The computer has a single hard drive. You have scheduled regular backups of the computer to include everything on the hard drive. The backups are stored on a network shared folder. You need to make a full backup of the computer right now. What should you do?

Select the CD/DVD drive as the backup destination.

Considering the different ways to remotely manage servers, which allows you to create server groups?

Server Manager

Your Windows 7 computer has a folder named D:\SalesDocs. The folder has been shared with the sharename of SalesDocs. The D: drive is formatted with NTFS. The following permissions have been configured for the folder: NTFS permissions: Users group = Allow-Read Sales group = Allow-Modify Share permissions: Users group = allow-Read Sales group = Allow-Change Sally is a member of both the Users and Sales group. She needs to be able to read and modify all files in the SalesDocs shared folder except for the StyleGuide.doc file. Sally should be able to read StyleGuide.doc but not modify it. What should you do?

Set Sally's NTFS permission for StyleGuide.doc to Deny Write.

Your Windows 7 computer has a folder named D:\SalesDocs. The folder has been shared with the sharename of SalesDocs. The D: drive is formatted with NTFS. The following permissions have been configured for the folder: NTFS permissions Users group = Allow-Read Sales group = Allow-Modify Share permissions Users group = Allow-Read Sales group = Allow-Change Sally is a member of the the Users and Sales groups. She needs to be able to red and modify all files in the SalesDocs shared folder except for the StyleGuide.doc file. Sally should be able to read StyleGuilde.doc but not modify it. What should you do?

Set Sally's NTFS permission for SytleGuide.doc to Deny Write.

You have a computer that runs Windows 7. Recently, a WSUS server was configured and enabled in your internal network. Now you need to configure Windows Update on your computer to search for and download updates from the WSUS server. What should you do?

Set the 'Specify intranet Microsoft update service location' setting in Group Policy.

You have a computer running Windows 7 Professional. The computer is used by several people. You want to prevent users from reusing old passwords. You also want to force them to used a new password for at least 5 days before changing it again. What should you d0? (Select two. Each answer is a required part of the solution.)

Set the minimum password age policy. Set the enforce password history policy.

You have a computer that runs Windows 7. Recently, a WSUS server was configured and enabled in your internal network. Now you need to configure Windows Update on your computer to search for and download updates from the WSUS server. What should you do?

Set the *Specify intranet Microsoft update service location* setting in Group Policy.

Recently, a WSUS server was configured and enabled

Set the Specify intranet Microsoft update service location setting in Group Policy

Recently, a WSUS server was configured and enabled in you internal network. Now you need to configure Windows Update on your computer to search for and download updates for a WSUS server. What should you do?

Set the Specify intranet Microsoft update service location setting in Group Policy.

You have a computer running Windows 7 Professional. The computer is used by several people. You want to require users to create passwords that are at least 10 characters long. You also want to prevent logon after three unsuccessful logon attempts. You need to use Local Security Policy to configure specific account policies. What should you do? (Select two. Each answer is a require part of the solution.)

Set the account lockout threshold policy. Set the minimum password length policy.

You manage several computers that run Windows 7. You would like to have better control over the applications that run on these computers, so you have decided to implement AppLocker. You have created default rules and an executable rule that allows the company's accounting application to run. You notice that you can still run any program on your test client. What should you do? (Select two. Each choice is a possible solution.)

Set the enforcement mode for executable rules to Enforce rules. Start the Application Identity service on the client

You manage several computers that run Windows 7. You would like to have better control over the applications that run on these computers, so you have decided to implement AppLocker. You have created default rules and an executable rule that allows the company's accounting application to run. You notice that you can still run any program on your test client. What should you do? (Select two. Each choice is a possible solution.)

Set the enforcement mode for executable rules to Enforce rules. Start the Application Identity service on the client.

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You travel to a branch office in your company. The branch office has 5 computers running Windows 7 Ultimate edition. Computers in the branch office are not domain members. All computers use a HomeGroup for file sharing. You want to join the HomeGroup in the branch office. What should you do?

Set the network location for the connection to Home.

You have a laptop running Windows 7 Professional. The computer is a member of the mydomain.local Active Directory domain. You travel to a branch office in your company. The branch office has 5 computers running Windows 7 Ultimate edition. Computers in the branch office are not domain members. All computers use a HomeGroup for file sharing. You want to join the HomeGroup in the branch office. What should you do?

Set the network location for the connection to Home.

You need to improve performance without upgrading any hardware

Set the visual effects for best performance

You have a computer running Windows 7 Ultimate. You recently upgrade the computer from windows XP Professional. The client who uses the computer has called to complain that the windows 7 interface is very slow. For example, after clicking on the Windows start button, the Start Menu slowly appears on the screen. You want to improve performance without upgrading any hardware. What should you do?

Set the visual effects for best performance.

You have a laptop running Windows 7 Ultimate. You need to configure the laptop to use a VPN connection to the company VPN server. Select the link you would use to begin setting up the VPN connection.

Set up a New connection or network

Your Windows 7 computer has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows: - Members of the Sales group should have read-only access to content in the folder. - Members of the SalesAdmin group should be able to open, edit, andd add new files to the folder. - No other users should have access. Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permissions as possible. What should you do?

Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

Your Windows 7 computer has a folder named D:\SalesDept. The D: drive is formatted with FAT32. You need to allow network access to the folder as follows: ● Members of the Sales group should have read-only access to the content in the folder. ● Members of the SalesAdmin group should be able to open, edit, and add new files to the folder. ● No other users should have access. Members of the SalesAdmin group are also members of the Sales group. You want to assign as few permissions as possible. What should you do?

Share the SalesDept folder. Grant Read permission to the Sales group and Change permission to the SalesAdmin group. Remove Everyone from the access control list.

You have a computer that runs windows 7. The computer has a single hard drive with a single disk partition. The 500 GB system (C:) volume currently has 200 GB free. You decide to implement BitLocker, but find you need a 100 MB partition in addition to the system partition. You need to add a second partition for use with BitLocker with as little effort and cost as possible. What should you do?

Shrink the C: volume. Create a new partition using free space on the disk.

Your organization recently purchased several Windows RT tablets

Sign up for a Windows Intune account to manage the tablets

You are working on a computer running Windows 7. It is a member of a domain. You need to discover if there are any drivers on the computer which do not have a digital signature. Which of the following tools should you use?

Sigverif.exe

What type of backup creates a separate backup of the computer?s system disk and reserve partition that Windows 7 creates on the disk during installation and saves to a VHD file on the backup device?

System image backup

You want to use Hyper-V to create two virtual machines, with each using a common parent installation. Listed below are the steps necessary to complete the configuration. Drag each required step from the list on the left to the spaces on the right. Use only the necessary steps to complete the configuration.

Step 1 Create one fixed disk. Step 2 Create the virtual machine(s) Step 3 Install the operating system Step 4 Install integration services Step 5 Make the disk(s) read only Step 6 Create two differencing disks Step 7 Create the virtual machine(s) Step 8 Step 9

Your Windows system has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure. You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share. What should you do?

Stop sharing folder. share the folder again as Reorg$ with the same permissions as before.

You Windows 7 computer has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure. You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share. What should you do?

Stop sharing the folder. Share the folder again as Reorg$ with the same permissions as before.

Your Windows 7 computer has a shared folder named Reorg. The folder contains sensitive information about planned changes in the personnel structure. You configure permissions on the folder to deny access to unauthorized users. You want to prevent users from seeing this share when they browse the computers on the network. You still need to allow access to users who are authorized to use the share. What should you do?

Stop sharing the folder. Share the folder again as Reorg$ with the same permissions as before.

If you don?t have TPM, how else can you use BitLocker?

Store the encryption key on a USB flash drive.

What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier?

Subnet mask

What do you use to synchronize between your computer, offline drives, and mobile devices?

Sync Center

What is a command line program that installers can use to prepare Windows 7 computers for imaging, auditing, and deployment including preparing a reference computer?

Sysprep.exe

You currently manage a virtual machine named VM18 that has been installed on the Srv5 physical server. The virtual machine runs Windows Server 2012 Enterprise edition and a custom application. You receive an update to the application. You want to save the current state so that if the update causes any problem,s you can easily revert back to the state before the update was installed. What should you do?

Take a snapshot of the virtual machine.

Which of the following is NOT a basic printer permission?

Take ownership

An employee has a Windows 7 laptop. The employee has just been fired, but not before he assigned Deny Full Control permission to Everyone to all the files and folders on the laptop. All users, including you, are now blocked from accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do?

Take ownership of the files, and change the permissions.

An employee has a Windows notebook system. The employee has just been fired, but not before he assigned Deny Full Control permission to Everyone to all the files and folders on the system. All users, including you, are now blocked form accessing these important files. You are the administrator and you need to make these files available as quickly as possible. What should you do?

Take ownership of the files, and change the permissions.

Which type of image contains all of the elements of a workstation configuration, including applications drivers, updates, and all configuration settings?

Thick images

You are viewing the System Stability chart in Reliability Monitor on a Windows system

There is not enough data to calculate a Stability Index

What are the differences, physically and logically, between the two printing configurations: Network-attached Printing and Network-attached Printer Sharing?

They are essentially the same physically. Logically, the print jobs are handled differently.

Which Internet Explorer 11

Tracking Protection

You have a small home network with the following computers: -Comp1 runs Windows 7 Home. -Comp2 runs Windows 7 Home Premium. -Comp3 runs Windows 7 Professional. You want to create a HomeGroup for your network. Which of the following should be part of your configuration? (Select the two most correct answer)

U-Set the network location to Home. -Create the HomeGroup on Comp2 or Comp3.

You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain and you plan to configure the computer to beet from a .VHD image. Which Windows 7 edition should you use?

Ultimate (64-bit)

You are planning to install Windows 7 on a new 64-bit computer. The computer will be joined to a domain and you plan to configure the computer to boot from a .VHD image. Which Windows 7 editon should you use?

Ultimate (64-bit)

The computer will be joined to a domain and you plan to configure the computer to boot from a .VHD image

Ultimate(64-bit)

You've installed an 802.11 wireless adapter in the desktop system

Update the wireless network adapter driver on the desktop system to one that is campatible with Wi-Fi Direct

However, you are unable to see the tablet device from the desktop system

Update the wireless network adapter driver on the desktop system to one that is compatible with Wi-Fi Direct

Several users have complained that they can't view apps from the Windows Store side by side on screen

Upgrade the LCD monitors to models with a native resolution of at least 1366 x 768

You want to be able to read and write files to the drive from a computer that is running Windows xp Pro

Upgrade the Windows xp computer to Windows 7 Ult or Ent

You want to protect the hard drive using BitLocker and a startup key saved to a USB device

Upgrade the computer to Widows 7 Ultimate or Enterprise

Your organization recently decided to implement a Windows Server 2012 system with Active Directory installed. Management has asked you to join your Windows 7 client systems to the new domain

Upgrade the desktop systems to Windows 7 Professional

You have a computer that runs Windows 7. The computer has an extra disk that has three primary partitions and an extended partition with two logical drives. All volumes are formatted with FAT32. You want to convert the partitions to simple volumes, preferably without losing any data. What should you do?

Upgrade the disk to a dynamic disk.

A sales rep from a computer manufacturer recently offered you a very competitive price on desktop systems with the following specifications (Windows 7 Pro)

Upgrade the operating system to Windows 7 Enterprise or Ultimate

A sales rep from a computer manufacturer recently offered you a very competitive price on notebook systems with the following specifications

Upgrade the operating system to Windows 8.1 Enterprise

You work for a company with headquarters in Seattle and an office in Olympia. A single server in the Seattle office runs Windows Server 2003 and holds all shared files for the company. The office in Olympia has 5 client computers, all running windows 7. The Olympia office is connected to the Seattle office with a WAN link. You want to implement BranchCache in the Olympia office. What should you do?

Upgrade the server in Seattle to Windows Server 2008 R2. configure BranchCache in Distributed Cache mode.

You have a computer running Windows 7 Enterprise. You check the Windows Experience Index as shown in the image. YOu want to increase the system's performance. What should you do?

Upgrade the video card.

You need to boot the computer from the VHD file (Windows 7 Professional)

Upgrade to Windows 7 Ultimate

You have a computer tha runs Windows 7 Professional and a VHD file which contains a Windows 7 installation. You need to boot the computer from the VHD file. What should you do first?

Upgrade to Windows 7 Ultimate.

You have a computer that runs Windows 7 Professional and a VHD file which contains a Windows 7 installation. You need to boot the computer from the VHD file. What should you do first?

Upgrade to Windows 7 Ultimate.

You need to use an application that only runs on Windows XP, so you decide to implement Client Hyper-v on your desktop system so you can create a virtual machine to run the application

Upgrade to a 64-bit version of Windows 8 Professional

The note book has the following hardware installed

Upgrade to a notebook with UEFI firmware implemented in the motherboard

You need to use virtual machines to test an application on different platforms as it is being developed. You decide to implement Client Hyper-V on your desktop system

Upgrade to the 64-bit version of Windows 8.1 Professional

You have a laptop computer running Windows 7 Home Premium. You connect your computer to a wired network at work and a wireless network at home. You want to configure your computer to use a different default printer for each network. What should you do first?

Upgrade your computer to Windows 7 Professional.

You have a laptop computer running Windows 7 Home Premium. You connect your computer to a wired network at work and a wireless network at home. You want to configure your computer to use a different default printer for each network. What should you do?

Upgrade your computer to Windows 7 Professional.

You have a two computers: Comp1 is running Windows XP Professional and Comp2 is running Windows 7 Professional. After moving EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data. You need to open the EFS-encrypted files on Comp1. What should you do? (Select two. Each answer is a complete solution.)

Use *Cipher.exe* to transfer the encryption certificates. Use USMT to transfer the encryption certificates.

You want to view, but not modify the installation and data files in the VHD file

Use Disk Management to attach the VHD file ad read-only

You have a VHD file which contains a Windows 7 Enterprise installation and other data files. You want to view, but no modify the installation and data files in the VHD file. What should you do?

Use Disk Management to attach the VHD file as read-only.

You would like to perform offline servicing of the image in the VHD file to add a driver and enable some Windows features

Use Diskpart to attach the VHD file. Use Dism to modify the image. Use Diskpart to detach the image

You have a computer that runs Windows 7 Enterprise. You have created a VHD file that contains a Windows 7 image. You would like to perform offline servicing of the image in the VHD file to add a driver and enable some Windows features. What should you do?

Use Diskpart to attach the VHD file. Use Dism to modify the image. Use Diskpart to detach the image.

Your domain contains a VPN server that runs Windows Server 2008 R2

Use EAP as the authentication protocol

You manage a computer running Windows 8.1 Pro

Use Family Safety in Control Panel

You have several computers running Windows 7 Ultimate. The computers are members of a domain. For all the computer, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?

Use Group Policy

You have several computers running Windows 7 Ultimate. The computers are members of a domain. For all the computers, you want to remove access to administrative tools from the Start menu and hide notifications from the System Tray. What should you do?

Use Group Policy

Without user intervention, you want both sites to display

Use Group Policy to enable Compatibility View using the URL of the Internet website

You have many computers running Windows 7 Enterprise. The computers are members of a domain. Your company uses a site on its intranet to manage customer records. Your company also uses a site on the Internet to mange customer files. Both the intranet site and the Internet site were developed for Internet Explorer 7. Without user intervention, you want both sites to display properly in Internet Explorer 8, but not affect other sites found on the Internet net. What should you do?

Use Group Policy to enable Compatibility View using the URL of the Internet website.

You manage a Windows system that are members of a domain. You company uses a site on its intranet to manage customer records. Your company also uses a site on the Internet to manage customer marketing profiles. Both the intranet site and the Internet site were developed for Internet Explorer 7. Without user intervention, you want both sites to display properly in the latest version of Internet Explorer, but not affect other sites found on the Internet. What should you do?

Use Group Policy to enable Compatibility View using the URL of the Internet website.

You have a computer that runs Windows 7. While manually configuring Windows Update, you notice that several settings are grayed out and unchangeable as shown in the image. You want to enable the settings so you can manually configure them. What should you do?

Use Group Policy to modify the Windows Update settings.

You have a computer that runs windows 7. While manually configuring Windows Update, you notice that several settings are grayed out and unchangeable as shown in the image. You want to enable the settings so you can manually configure them. What should you do?

Use Group Policy to modify the Windows Update settings.

You decide to use VPN Reconnect, but you need to ensure each laptop will make the correct VPN connection to the server

Use Internet Key Exchange version 2 (IKEv2) as the VPN protocol

You have a stand-alone computer running Windows 7 Professional. You need to determine if the computer has any administrative vulnerabilities. What should you do?

Use Microsoft Baseline Security Analyzer (MBSA)

You have a stand-alone computer running windows 7 Professional. You need to determine if the computer has any administrative vulnerabilities. What should you do?

Use Microsoft Baseline Security Analyzer (MBSA)

You need to determine if the computer has any administrative vulnerabilities

Use Microsoft Baseline Security Analyzer (WSUS)

Enable BitLocker

Use Microsoft Deployment Toolkit (MDT)

You need to install Windows 7 on 20 computers. You would like to automate the installation process as much as possible. After booting each destination computer, you would like to complete all of the following automatically (in this order): 1. Partition and format the hard disk 2. Install Windows from a custom image 3. Following installation of the image, applying Windows updates 4. Install applications 5. Enable BitLocker What should you do?

Use Microsoft Deployment Toolkit (MDT)

The computer connects to the network behind a firewall that blocks all but the most common ports

Use Remote Shell

You have a Windows 7 computer that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports. You need to use a remote management solution that does not require additional firewall ports opened. What should you do?

Use Remote Shell.

You need to come up with a solution that will work in most instances

Use Secure Socket Tunneling Protocol (SSTP) as the VPN protocol

You want to add a role to several Windows Server 2012 systems on the network. Which of the following is correct?

Use Server Manager on any Windows Server 2012 to connect and install the role to all the systems.

On a Windows Server 2012 server, you decide to change the interface. Select the best answer to convert a GUI server to Server Core.

Use Server Manager to start the Remove Roles and Features Wizard.

You decide to change the interface on your Windows Server 2012 server. Select the best answer to convert a GUI server to Server Core.

Use Server Manager to start the Remove Roles and Features Wizard.

You want to make sure that the application continues to run in the background

Use Take Manager to modify the process priority

You have a computer running windows 7 Ultimate. You have an application that compresses videos used in your online business. You want to make sure that the application continues to run in the background, even if you open other applications. You need to adjust the amount of attention given to that application. What should you do?

Use Task Manager to modify the process priority.

You have a new Windows 7 Ultimate computer with both a wired and a wireless connection. You want to configure a small wireless network at home. You install a router that connects your network to the Internet and which is the wireless access point. You have turned off SSID broadcast on the Internet router. You will connect devices using a preshared key. You need to configure your laptop to connect to the wireless network, and would like to use the most secure method available to you. What should you do? (Select two. Each choice is a required part of the solution.)

Use WPA2-Personal security. Manually create a network profile.

You have a computer that runs Windows 7. You have just read about a new security patch for Windows 7. You install the patch as a Windows Update, but after you reboot and log back on your computer is unstable. What action should you take?

Use Windows Update in the Control Panel to uninstall the update.

You have a computer that runs Windows 7. You have just read about a new security patch for Windows 7. You install the patch as a Windows Update, but after you reboot and log back on your computer is unstable. What action should you take?

Use Windows Update in the Control Panel to uninstall the update.

You recently bought a computer running Windows 7 Professional. After using Internet Explorer 8, you notice that over 10 of your favorite Web sites are not displaying properly. With the least amount of administrative effort, you want to configure Internet Explorer 8 so that the sites display properly. You do not want to affect how other sites on the Internet are displayed. What should you do first?

Use Windows Update to update the list of Web sites which require Compatibility View.

With the least amount of administrative effort

Use Windows Update to update the lost of Web sites which require Compatibility View

You have a single computer running Windows Vista. You are about to complete a clean installation of Windows 7 on the computer, and you need to migrate user profiles and user data from the previous installation of Windows Vista. What should you do? (Select two. Each choice is a required part of the solution.)

Use a wipe-and-load migration. Run WET and use External hard disk or USB flash drive as the transfer method.

You have a computer that runs Windows 7. You attempt to execute a program in the C:\Program Files\AccWiz directory, but you receive a prompt to elevate your privileges. You need to execute the program without receiving a prompt for elevated privileges. You also need to prevent harmful applications from making unwanted changes to the system. What should you do?

Use runas.exe to execute the program in the C:\Program Files\AccWiz directory.

Your Windows system has devices which are Personal Identity Verification (PIV) compliant. You want to implement a form of authentication which takes advantage of PIV. What should you do?

Use smart card authentication

You want to configure the backup job and the schedule with a minimal amount of effort

Use the Backup and Restore console

You have a computer running Windows 7 Professional. The computer has the following tow volumes: * The C; drive is the system drive with user profiles and individual user files * The D: drive holds data files common to all users You take the following actions: * You schedule regular backups to back up all user libraries. The scheduled backup includes the entire D: drive, as well as a system image. * You use System Restore to take a snapshot. After working with a file on the D; drive, you accidentally delete most of the data in the file. You need to recover the file as it existed before you made the changes. You check the System Protection settings and find that system protection is not enabled for the D: drive. Using the least amount of effort, you must restore the data in the file. What should you do?

Use the 'Previous Versions' tab of the file properties to restore the file.

You have a computer running Windows 7 Ultimate. When running multiple applications, the computer is slow to respond. To improve performance, you enable ReadyBoost on a USB flash drive. You need to edit the ReadyBoost settings. What should you do?

Use the 'ReadyBoost' tab in properties of the USB flash drive.

You have a computer running Windows 7 Professional. The computer has the following drives: * C: (system drive with user profiles) * E: (Data files) * F: (External USB hard drive) You enable System Protection on the C: drive. You also schedule regular backups with the following settings: * Back up all user libraries * Back up the C: and E: drives * Include a system image * Save the backup to the F: drive Last night the E: drive crashed. You need to restore the data files found in the E: drive. What should you do?

Use the Backup and Restore console to restore data from backup.

You have a computer running windows 7 Ultimate. To protect your data from loss or corruption, you enable System Protection on all drives in your computer. You also schedule regular backups with the following settings: * Back up all user libraries * Back up all drives * Include a system image Today you notice that your user profile settings are corrupt. You need to restore the user profile settings with the least amount of effort. What should you do?

Use the Backup and Restore console to restore the user profile form backup.

You need to restore the user profile settings with the least amount of effort

Use the Backup and Restore console to restore the user profile from backup

You have a computer running Windows 7 Enterprise. The computer has two volumes: C: and D:. You want to schedule backup jobs of the C: volume to include all user files and a system image of the C: volume. You want to configure the backup job and the schedule with a minimal amount of effort. What should you do?

Use the Backup and Restore console.

You have a computer running windows 7 enterprise. The computer has two volumes: C: and D:. You want to schedule backup jobs of the C: volume to include all user files and a system image of the C: volume. You want to configure the backup job and the schedule with a minimal amount of effort. What should you do?

Use the Backup and Restore console.

Last night the E: drive crashed

Use the Backup and restore console to restore data from backup

You want to view the logs shown in the Event Viewer on a remote computer. What should you do?

Use the Connect To Another Computer command in the Action Menu within the Event Viewer.

You are configuring a small wireless network with 10 client laptops that require network access. You have configured a new wireless access point with an SSID that is not broadcasting. You have manually created a network profile on one computer, which successfully connects to the network. You would like to configure the network profile on the remaining clients with the least amount of effort. What should you do?

Use the Copy this network profile to a USB flash drive option to save the wireless network settings to a USB flash drive. On each additional client, insert the USB drive and run the utility to copy the profile settings to the client.

You load a driver for your motherboard and now the system does not boot properly. What should you do to overcome this problem? (Choose the best answer.)

Use the Last Known Good Configuration.

Which of the following is a series of folders associated with a specific user account that contains personal documents and personal settings?

User profile

You want to use Microsoft Deployment Toolkit (MDT 2010) to deploy Windows 7 to several new computers. You have a previously-captured image which contains the Windows 7 installation and several custom applications. If possible, you would like to deploy the image to all the computers with no intervention required by the user. You do not have a Microsoft SQL server. What should you do?

Use the Lite Touch Installation (LTI) installation method.

You do not have a Microsoft SQL server

Use the Lite Touch Installation(LTI) installation method

You manage a network with 30 computers. Each computer is currently running Windows XP. All computers are members of a domain. You need to upgrade the computers to Windows 7 Professional. You will use a system image to deploy a clean installation of Windows 7 to each computer. Before you begin the upgrading process, you need to identify which application installed on computers can run on Windows 7. What should you do?

Use the Microsoft Application Compatibility Toolkit (ACT).

You manage a network with 30 computers. Each computer is currently running Windows XP. All computers are members of a domain. You need to upgrade the computers to Windows 7 Professional. You will use a system image to deploy a clean installation of Windows 7 to each computer. Before you begin the upgrading process, you need to identify which applications installed on computers can run on Windows 7. What should you do?

Use the Microsoft Application Compatibility Toolkit (ACT).

You need to configure you Windows notebook system to save as much battery power as possible

Use the Power Saver power plan

You check the System Protection settings and find that system

Use the Previous Versions tab of the file properties to restore the file

A user downloaded an ActiveX control using Internet Explorer

Use the Programs tab in Internet Options

You have a computer running windows 7 Ultimate. Using Internet Explorer 8, a user downloaded an ActiveX control and now the browser seems unstable. You need to remove the ActiveX control. What should you do?

Use the Programs tab in Internet Options.

You need to edit the ReadyBoost settings

Use the ReadyBoost tab in the properties of the USB flash drive

You have a desktop computer running Windows 7. After several months of working fine, you are now having problems booting your machine. The system stalls immediately after the BIOS information screen. You need to get the system started as quickly as possible. What should you do?

Use the Startup Repair tool

You have several computers in a network. Some of the computers do not have an optical drive. Your boss has asked you to install Windows 7 on each of the computers. What should you do? (Select two. Each choice is a required part of the solution.)

Use the bootsect command to make the USB flash drive bootable. Copy the product DVD to a USB flask drive and boot from the drive.

You need to deploy Windows 7 Professional to multiple new computers using a previously-captured system image on a network share. You have updated the offline image with a Windows Update Stand-alone Installer (.msu) file. You believe the new .msu file is causing a problem on the system image. What should you do?

Use the dism /cleanup-image and /revertpendingactions options.

You believe the new .msu file is causing a problem on the system image

Use the dism \cleanup-image and \revertpendingactions options

You have a computer without an operating system installed. You have a previously-captured image which contains a Windows 7 Enterprise installation. The image is on the following network share: \\imgserv\images. You need to manually deploy the image onto the computer. After booting the computer into WinPE, you partitioned and formatted the local hard drive with DiskPart. What should you do next? (Select two. Each choice is a required part of the solution.)

Use the net use command to connect to the network share and map the drive with a letter. Use imagex.exe with the /apply option to copy the image from the network share to the local drive.

You manage a Windows 7 computer. For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permissions. You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the fold. You want to accomplish this with the least amount of effort possible. What should you do?

Use the robocopy command to copy the file to the C:\Reports2 folder.

Your windows system has two hard drives: C: and D:. For the D:\Reports\Finances.xls file, you explicitly grant the Mary user account the Allow Modify NTFS permission. You need to move the file from the existing folder to the C:\Reports2 folder. You want to keep the existing NTFS permissions on the file. You want to accomplish this with the least amount of effort possible. What should you do?

Use the robocopy command to copy the file to the C:\Reports2 folder.

Before deploying the image, you need to append several files to the image. You want to compress the appended files to minimize disk space

Use the same compression type as the initial capture

You need to deploy Windows 7 Enterprise to multiple new computers using a previously-captured system image. Before deploying the image, you need to append several files to the image. You want to compress the appended files to minimize disk space. What should you do?

Use the same compression type as the initial capture.

After several months of working fine

Use the startup repair tool

How can you execute commands on a remote computer?

Use winrs.exe.

You have two computers: Comp1 is running windows vista business and Comp2 is running windows 7 professional. After moving EFS-encrypted files from Comp1 to Comp2, no one can open the files and access the data. You need to open the EFS-encrypted files on Comp1. What should you do?

User Cipher.exe to transfer the encryption certificates. Use USMT to transfer the encryption certificates.

You have a computer running Windows 7 Enterprise. You want to create a VHD file with the following settings: * Size = 200 GB * Location = F:\VHDS * Name = Win7vhd What should you do?

Using DiskPart, type create vdisk file=f:\VHDS\Win7vhd.vhd maximum=204800

You want to create a VHD file with the following settings:

Using DiskPart, type create vdisk file=f:\Win7vhd.vhd maximum=204800

What format supports Virtual PCs that contain the entire content of a hard disk in a single, portal file?

VHD

What technology uses the remote client to connect to a remote access server over the Internet?

VPN

You manage a Windows 7 computer connected to a business network using switches and multiple subnets. One day you find that the computer is unable to connect to the Internet, although it can communicate with a few other computers on the local subnet. You type ipconfig /all on the computer and see the following output: Ethernet adapter Local Area Connection: Connection-specific DNS Suffix . : mydomain.local Description : Broadcom network adapter Physical Address : 00-AA-BB-CC-74-EF DHCP Enabled : Yes Autoconfiguration Enabled : Yes IPv4 Address : 160.254.155.1 (Preferred) Subnet Mask : 255.255.0.0 Default Gateway : DNS Servers : What should you do?

Verify that the DHCP server is up and functional.

You have a laptop that runs Windows 7. The laptop uses IPv6. The network connection is configured to obtain an IPv6 address automatically. You need to see the IPv6 address that the network connection is currently using. What should you do? (Select two. Each choice is a possible solution.)

View the status for the network connection. Click the Details button. Run the netsh command.

You need to upgrade a 64-bit Windows Vista Business edition desktop system to Windows 8.1 Professional

Vista SP1 of later must be installed prior to running the upgrade

What are duplicates of files that Windows creates as part of a restore point?

Volume shadow copy

What can be installed on Windows Server 2008 that enables installers to deploy Windows Imaging files to workstations over the network?

WDS

Which wireless technology is considered a weak encryption protocol?

WEP

What is the file-based disk image format used to deploy its latest Windows operating system releases, Windows 7, and Windows Server 2008?

WIM

Your organization has decided to implement a wireless infrastructure. They require that the infrastructure be capable of central administration and logging. Based on this information what is the best solution?

WPA-Enterprise

Windows Server 2012 provides hardware-independent NIC teaming or bonding to allow for better network performance and adapter fault tolerance. However, in what scenario is the NIC teaming limited?

When network traffic consists of large TCP sequences

You have a computer that runs Windows Vista. You need to perform a clean installation of Windows 7 onto the computer. You would also like to retain the system and user files from the Windows Vista installation. What should you do?

While running setup.exe on the Windows 7 installation media, select the Custom (advanced) option.

You need to perform a clean installation of Windows 8 onto the computer, but you would like to retain the existing system settings and user files from the Windows 7 installation

While running the Windows 8 installation, select the Custom (advanced) option

Which mobile wireless technology can leverage the existing 802.11

Wi-Fi Direct

You need to upgrade a notebook system running 64-bit Windows 7 Home Premium edition to 64-bit Windows 8 Enterprise

Windows 7 Home Premium cannot be upgraded to Windows 8 Enterprise

Which tool set is designed specifically for mobile PCs?

Windows Mobility Center

Considering the different ways to remotely manage servers, what allows administrators to use their web browser as a remote management gateway?

Windows PowerShell Web Access Gateway

What is the graphical utility that installers can use to create distribution shares and answer files that automate and customize Windows 7 installations?

Windows SIM

Drag each component of the Windows Automated Installation Kit on the left and drop it on the correct description of it function on the right.

Windows SIM - Creates and manages answer file Sysprep - Removes machine specific information DISM - Applies updates, drivers, and language packs to Windows image Oscdimg - Creates ISO images WinPE - A thin version of Windows ImageX - Creates and image file for deployment

Considering the different ways to remotely manage servers, what does Microsoft recommend we connect to other servers instead of a Window Server 2012?

Windows workstation

Which of the following do you have to create the same user account for on each computer that a user needs to access?

Workgroups

You have a small network with three subnets as shown in the graphic. IP addresses for each router interface are also indicated. You need to connect Wrk1_A to SubnetA and Wrk5_C to SubnetC. Which IP addresses should you use? (Select two.)

Wrk1_A = 192.168.111.62 Wrk5_C = 10.155.64.97

Can you create a recovery drive using this device

Yes, the device meets the minimum requirements for a recovery drive

You grant a user the NTFS permissions needed to access a file. You then move the file to a different location. Is the user still able to access the file?

Yes, when you move the file, its permissions go with it.

Which of the following statements should be considered as you formulate your policy

You can't use domain-based group policies to enforce security settings on mobile devices

When you manage permissions in any of the Windows Server 2012 permission systems, you are actually creating and modifying the _______ in an _______.

access control entries; access control list

You manage a windows system that is shared by multiple users at work. You want to allow only members of the sale team to run the salse lead application. If possible, the rule should apply to all current and future versions of the application, regardless of the filename or its location. The application in not digitally signed. What should you do?

create an executable rule with a file hash condition in application control policies.

Which Hyper-V feature in Windows Server 2012 allows you to create read-only parent virtual hard disk files that are linked to child virtual hard disk files that contain only changes made to the parent disk?

differencing disks

You have set up the AccountWizard.exe program to run in Compatibility mode on a Windows 7 computer. After running the program, you find that the large-scale fonts do not appear correctly and the movement of the window appears erratic. Select the settings you would enable to correct the issues.

disable desktop composition disable display scaling on high DPI setting

What factor is not important for choosing the best Windows Server 2012 edition for your environment?

heating and cooling system of the datacenter

What is the default web address for the PowerShell Web Access Gateway?

https://<server name>/pswa

Your supervisor has asked you to compile a graphical representation of the network. What is the best method to accomplish this task for your supervisor?

netsh

You have installed a test network with one server and two workstations, all running IPv6. You have disabled Ipv4, and now what to test to make sure that the Ipv6 is used to communicate between hosts. Yo want to ping the link-local address for a host. What should you do?

ping FE80::AB134:7845:10C:9956%12

You have installed a test network with one server and two workstations, all running IPv6. You have disabled Ipv4, and now what to test to make sure that the Ipv6 is used to communicate between hosts. You want to ping the link-local address for a host. What should you do?

ping FE80::AB134:7845:10C:9956%12

You need to install Windows 7 to multiple computers on your network. You would like to use windows deployment services (WDS) to deploy a custom image to all computers. All computers have a PXE-compliant network card. What should you do?

place an install image and a boot image on the WDS server.

What is XML Paper Specification (XPS)?

print job files stay a single document format to the print device, rather than conversion through EMS and PCL

Which command should you use to do this

psexec\\WS1 cmd

You want to deploy windows 7 enterprise to multiple computers from a previously-captured system image. You have received an updated application and would like to add the application to the existing install image without recapturing the entire image. What should you do?

run MDT with the Distribution share

You are troubleshooting your network and want to determine the path that your communications is taking to get to its destination. What command line utility can you use to determine the path that the packets have taken?

tracert

After you create a new VHD, it appears as a _________ in the Disk Management snap-in and in Server Manager.

uninitialized disk

You have a Windows system that you would like to manage remotely. The computer connects to the network behind a firewall that blocks all but the most common ports. You need to use a remote management solution that does not require additional firewall ports opened. What should you do?

use remote shell

What command do you use to allow remote management communications on a PC so that you can use winrs.exe?

winrm quickconfig


Set pelajaran terkait

Chapter 8 Tectonics, Earthquakes, and Volcanism

View Set

Abdominopelvic Chapter 20 (Male Pelvis) and Chapter 29 (Scrotum) Review

View Set

Human Anatomy Brain and Cranial Nerves

View Set

BT 1, BT 2, BT 3, BT 4, BT 5, BU 1, BU 2, BU 3, ES AUSAT

View Set