Q1. - (Topic 2)
You have a computer that runs Windows 7.
You need to copy files to a virtual hard disk (VHD) file.
What should you do first?
A. Run Dism.exe and specify the /image and /online parameters.
B. Open Windows Explorer, right-click the VHD file and select Open.
C. Run Diskpart.exe and then run the Select and Attach commands.
D. Run Imagex.exe and specify the /mountrw and /append parameters.
Answer: C
Explanation:
DiskpartMicrosoft command-line tool Diskpart is used to create and format volumes on the target computer.SelectShift the focus to an object.AttachAttaches a virtual disk file.
Q2. DRAG DROP - (Topic 4)
You use a computer that has Windows 7 Enterprise installed. The computer has a single
500GB hard disk.
You install two new 1 terabyte hard disks.
You need to configure the new disks in a fault-tolerant configuration.
What should you do? (To answer, move the appropriate actions from the list of actions from the list the answer area and arrange them in the correct order).
Answer:
Q3. - (Topic 3)
You have a computer that runs Windows 7. You plan to create an image of the computer.
You need to prevent files with the ISO file extension from being included in the image.
What should you do?
A. Run Dism.exe and use the /image parameter
B. Run Dism.exe and use the /scratchdir parameter
C. Run Imagex.exe and use the /config parameter
D. Run Imagex.exe and use the /norpfix parameter
Answer: C
Explanation:
ImageX is a command-line tool that enables the creation of image files for deployment in a manufacturing or corporate IT environment. You can create a configuration file (configuration_list.ini) to determine:
. Which files and folders must be excluded from the capture process when using the /capture option. . Which folders, files, and file types must be excluded from the compression process when using the /compress option. . Whether the .wim file aligns on a 64K boundary or the default 32K boundary.
Q4. - (Topic 3)
You have an offline virtual hard disk (VHD) that contains a generalized installation of Windows 7 Ultimate.
You need to disable the built-in games in the VHD. You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Start a computer from the VHD. Run Ocsetup.exe and specify the /uninstall parameter. Recapture the VHD.
B. Start a computer from the VHD. From Programs and Features, turn off the Games feature and then recapture the VHD.
C. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Pkgmgr.exe and specify the /uu parameter.
D. Create an answer file that has InboxGames disabled. On a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /apply-unattend parameter.
Answer: D
Explanation:
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. /Apply-Unattend (Applies an unattend.xml file to an image.) If you are updating device drivers using an unattended answer file, you must apply the answer file to an offline image and specify the settings in the offlineServicing configuration pass. If you are updating packages or other settings using an unattended answer file, you can apply the answer file to an offline or online image. Specify the settings in the offlineServicing configuration pass.
Q5. - (Topic 5)
You use a computer that has Windows 7 and Internet Explorer 8 installed.
You need to block all web content providers on the Internet from collecting and sharing your information with other websites.
What should you do?
A. From Manage Add-ons, disable all ActiveX and Java extensions.
B. From Internet Options, configure Privacy Settings for third-party cookies.
C. Enable InPrivate Filtering and select Automatically Block.
D. From Internet Options, add the web content provider to Restricted Sites.
E. Start an InPrivate Browsing session.
Answer: C
Q6. - (Topic 1)
Which of the following is not a volume type usable by Windows 7?
A. FAT
B. exFAT
C. NTFS
D. All of the above a volume types in Windows 7.
Answer: D
Q7. - (Topic 4)
A virtual hard disk (VHD) contains a Windows 7 Enterprise installation.
You need to mount the VHD on a client computer.
What should you do?
A. Run the Dism command with the /Mount-Wimoption.
B. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes.
C. Run the Dism command with the /Add-Package option.
D. Run the PEImg/Prepcommand.
E. Add a boot image in WDS.
F. Run the Dism command with the /Add-Driver option.
G. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True.
H. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to No.
I. Run the BCDEdit command.
J. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False.
K. Run the Start/w ocsetup command.
L. Run the imageX command with the /Mount parameter.
M. Create a capture image in WDS.
N. Run the DiskPart command and the Attach command option.
Answer: N
Q8. - (Topic 1)
Your company has an internal Web site that requires HTTPS. The Web site's certificate is self-signed. You have a computer that runs Windows 7 and Windows Internet Explorer 8. You use HTTPS to browse to the Web site and receive the following warning message. "There is a problem with this website's security certificate."
You need to prevent the warning message from appearing when you access the Web site. What should you do?
A. From Internet Explorer, enable InPrivate Browsing.
B. From Internet Explorer, add the Web site to the Trusted sites zone.
C. From Certificate Manager, import the Web sites certificate into your Personal store.
D. From Certificate Manager, import the Web sites certificate into your Trusted Root Certification Authorities store.
Answer: D
Explanation:
Certificate Manager A certificate manager can approve certificate enrollment and revocation requests, issue certificates, and manage certificates. This role can be configured by assigning a user or group the Issue and Manage Certificatespermission. When you assign this permission to a user or group, you can further refine their ability to manage certificates by group and by certificate template. For example, you might want to implement a restriction that they can only approve requests or revoke smart card logon certificates for users in a certain office or organizational unit that is the basis for a security group.Importing CertificatesYou may restore certificates and the corresponding private keys from a file.
6. Right-click the certificate store you want to import, and click Install PFX on the context menu.
7. The Certificate Import Wizard launches. Click Next.
8. In the File name text box, type the name of the certificate file that you want to import. Alternatively, you can find the file by clicking Browse.
9. Click Next. If the file specified is a Personal Information Exchange–PKCS #12 (*.pfx), you will be prompted for the password. Enter the password to import the file. Click Next.
10. On the next page, select where you'd like to store the certificate. Click Next.
11. The next wizard page contains summary information about the file that you are importing. Click Finish to import the file. The certificate(s) are now ready for use by the system.
Q9. - (Topic 2)
You have a computer that runs Windows 7.
You need to identify which hardware is required to create a system repair disc.
What hardware should you indentify?
A. CD/DVD burner.
B. Floppy disk.
C. Tape drive.
D. USB disk.
Answer: A
Q10. - (Topic 2)
You have a computer that runs windows 7. You have a system image of the computer. You need to restore a single file from the system image. You must achieve the goal using minimum administrative effort. What should you do?
A. From Disk Management, select Attach VHD.
B. From the Backup and Restore, select restore my files.
C. Restart the computer and run system restore.
D. Restart the computer and run system image recovery.
Answer: A
Explanation:
Attach VHD: Attaching a VHD activates the VHD so that it appears on the host computer as a local hard disk drive. This is sometimes called "surfacing a VHD" because the VHD is now visible to users. If the VHD already has a disk partition and file system volume when you attach it, the volume inside the VHD is assigned a drive letter. The assigned drive letter is then available for use, similar to when you insert a USB flash drive into a USB connector. All users (not just the current user) can use the attached VHD in the same way they use other volumes on local physical hard disk drives (depending on security permissions). Furthermore, because you can attach a VHD that is located on a remote server message block (SMB), you can manage your images remotely. Once attached the single file can be restored. The other answers are overkill or replace all files not just the one required.
http://technet.microsoft.com/en-us/library/dd440865%28WS.10%29.aspx
What is system protection? System protection is a feature that regularly creates and saves information about your computer's system files and settings. System protection also saves previous versions of files that you've modified. It saves these files in restore points, which are created just before significant system events, such as the installation of a program or device driver. They're also created automatically once every seven days if no other restore points were created in the previous seven days, but you can create restore points manually at any time.
System protection is automatically on for the drive that Windows is installed on. System protection can only be turned on for drives that are formatted using the NTFS file system.
There are two ways that you can take advantage of system protection:
* If your computer is running slowly or isn't working properly, you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point.
* If you accidentally modify or delete a file or folder, you can restore it to a previous version that's saved as part of a restore point.
Q11. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. Create an EFS Data Recovery Agent by using Group Policy.
B. From User Accounts, select Manage your file encryption certificates.
C. Run the cipher.exe /adduser /user:administrator command.
D. Run the manage-bde -on C: -RecoveryPassword password command.
Answer: A
Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.
Q12. - (Topic 5)
You manage several client computers in an organization.
You need to ensure that all users, including administrators, are required to enter a username and password when uninstalling applications from any computer in the organization.
What should you do?
A. Create a custom GPO to modify the User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode setting.
B. Configure an AppLocker Windows Installer rule.
C. Configure the User Account Control (UAC) settings on all client computers to always notify.
D. Create a custom GPO to configure a software restriction policy.
Answer: A
Q13. - (Topic 4)
A network contains computers that run Windows 7 and Windows Vista. A computer named Computer1 runs Windows 7.
You need to ensure that only users running Windows 7 and Windows Vista can connect to Computer1 using remote desktop.
In the System Properties window, on the Remote tab, what should you do?
A. Click the Advanced button. Select the Allow this computer to be controlled remotely check box on Computer1.
B. Select the Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) check box on Computer1.
C. Select the Allow connections from computers running any version of Remote Desktop (less secure) check box on Computer1.
D. Select Allow Remote Assistance connections to this computer check box on Computer1.
Answer: B
Q14. - (Topic 5)
You use a portable computer that has Windows 7 Enterprise SP1 installed.
A conference room at your company has a network projector installed on a server within the company network.
You need to connect to the projector from your computer.
What should you do?
A. From Screen Resolution, click Connect to a projector.
B. From Accessories, click Connect to a Network Projector.
C. From Network and Sharing Center, create a temporary network and run Displayswitch.exe.
D. From Device Manager, click Add legacy hardware.
Answer: B
Q15. - (Topic 4)
Your company network includes computers that have Windows 7 Enterprise installed. The computers use IP addresses of DNS and WINS servers assigned statically.
The DNS and WINS servers on the company network have been taken offline for upgrades.
Users report that they can no longer access the Internet.
You need to provide access to the Internet for the computers during the maintenance.
What should you do?
A. Change the IP address of the primary WINS to a public name server.
B. Change the IP address of the default gateway.
C. Change the IP address of the primary DNS to a public DNS.
D. Change the client IP address and subnet mask.
Answer: C