Q1. - (Topic 1)
A user wants to install the games included with Windows 7 on his PC. They were not installed by default.
Windows components can be added or removed using which of the following in Windows 7.
A. Click the Start Bar, Control Panel, Add/Remove Programs, and click Windows Components.
B. Click the Start Bar, Control Panel, Programs, then click Turn Windows features on or off.
C. Click the Start Bar, Settings, Windows Control Center.
D. Right click the "My Computer" icon, Choose Properties, Choose Computer Management, on the left pane choose Add Remove Windows Components.
Answer: B
Q2. HOTSPOT - (Topic 4)
You have upgraded a Windows XP system to Windows 7. One of the applications is not showing menus when you launch it under Windows 7. How do you fix this issue?
Answer:
Q3. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and ail the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Create an Easy Transfer file on a network location.
B. Use the Backup and Restore tool to back up data files for all users.
C. Use the Backup and Restore tool to create a system image on a network location.
D. Create a system repair disk.
Answer: A
Q4. - (Topic 5)
A network has a main office and a branch office.
The branch office has five client computers that run Windows 7. All servers are located in the main office. All servers have BranchCache enabled.
Users at the branch office report that it takes several minutes to open large files located in the main office.
You need to minimize the amount of time it takes for branch office users to open files located in the main office.
What should you do?
A. At the branch office, configure the client computers to use BranchCache Hosted Cache mode.
B. At the branch office, configure the client computers to use BranchCache Distributed Cache mode.
C. At the main office, configure the Quality of Service (QoS) Packet Scheduler on all servers.
D. At the main office, configure the servers to use Distributed File System Replication (DFSR).
Answer: B
Q5. - (Topic 3)
You have two computers named Computer1 and Computer2. Computer1 runs Windows Vista. Computer2 runs Windows 7.
You plan to use User State Migration Tool (USMT) 4.0 to migrate user profiles and data from Computer1 to Computer2.
You need to prevent some system settings from being migrated. You must achieve this goal by using the minimum amount of administrative effort.
Which file should you modify?
A. config.xml
B. migapp.xml
C. migdocs.xml
D. miguser.xml
Answer: A
Explanation:
Config.xml This file is different from the other migration files as it is used to exclude features from the migration. You can create and modify the Config.xml file using ScanState.exe with the /genconfig option.NOT MigDocs.xmlThis file contains information on the location of user documents.NOT MigUser.xmlMigUser.xml This file contains rules about user profiles and user data. The default settings for this file migrate all data in My Documents, My Video, My Music, My Pictures, desktop files, Start Menu, Quick Launch settings, favorites, Shared Documents, Shared Video, Shared Music, Shared desktop files, Shared Pictures, Shared Start menu, and Shared Favorites. This file also contains rules that ensure that all the following file types are migrated from fixed volumes: .qdf, .qsd, .qel, .qph, .doc, .dot, .rtf, .mcw, .wps, .scd, .wri, .wpd, .xl*, .csv, .iqy, . dqy, .oqy, .rqy, .wk*, .wq1, .slk, .dif, .ppt*, .pps*, .pot*, .sh3, .ch3, .pre, .ppa, .txt, .pst, .one*, .mpp, .vsd, .vl*, .or6, .accdb, .mdb, .pub, .xla, .xlb and .xls. The asterisk ( *) represents zero or more characters.NOT MigApp.xmlThis file contains rules about migrating application settings. These include Accessibility settings, dial-up connections, favorites, folder options, fonts, group membership, Open Database Connectivity (ODBC) settings, Microsoft Office Outlook Express mailbox files, mouse and keyboard settings, phone and modem options, Remote Access Service (RAS) connection phone book files, regional options, remote access, screen-saver settings, taskbar settings, and wallpaper settings.User State Migration ToolUSMT 4.0 is a command-line utility that allows you to automate the process of user profile migration. The USMT is part of the Windows Automated Installation Kit (WAIK) and is a better tool for performing a large number of profile migrations than Windows Easy Transfer. The USMT can write data to a removable USB storage device or a network share but cannot perform a direct side-by-side migration over the network from the source to the destination computer. The USMT does not support user profile migration using the Windows Easy Transfer cable. USMT migration occurs in two phases, exporting profile data from the source computer using ScanState and importing profile data on the destination computer using LoadState.
Q6. - (Topic 6)
Your company network includes desktop computers that have Windows 7 installed.
Microsoft updates are applied automatically at a scheduled time.
A use1- reports that a proprietary application has stopped working.
You need to uninstall the most recent update from Microsoft.
What should you do first?
A. From the Action Center, open the Windows Update window.
B. From the Event Viewer, open the System log.
C. From the Services console, open the Windows Update service.
D. From the Task Scheduler, view the WindowsBackup node.
Answer: A
Q7. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a stand-alone computer which has only one partition. Windows 7 is run by this computer. The computer is shared by two users that are respectively named User1 and User2. User01 uses Encrypting File System (EFS) to encrypt a file. User01 tries to grant User2 access to the file as shown in the exhibit. You have to make sure that User1 are able to grant User2 access to the file. So what action should you perform to make sure of this?
A. User02 should be instructed to log on to the computer and take ownership of the file.
B. User02 should be instructed to log on to the computer and encrypt a file.
C. User1 should be instructed to export his certificate to a certificate (.cer) file.
D. User01 should be instructed to move the file to a shared folder on the computer.
Answer: B
Q8. - (Topic 2)
Your network consists of a single Active Directory forest.
You have 50 portable computers and 50 desktop computers. All computers have 32-bit hardware.
You plan to deploy Windows 7 and 10 corporate applications to the computers by using a custom image.
You need to prepare for the deployment by using the minimum amount of administrative effort.
What should you do first?
A. On one computer, install Windows 7 and the corporate applications.
B. On one portable computer and one desktop computer, install Windows 7 and the corporate applications.
C. On a server, install and run the Microsoft Assessment and Planning (MAP) Toolkit.
D. On a server, install the Windows Automated Installation Kit (AIK) and run Windows System Image Manager (Windows SIM).
Answer: A
Explanation:
To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart. Open an elevated command prompt on the reference computer and run the following command: c:\windows\system32\sysprep\sysprep.exe /oobe /generalize
/shutdown.
Sysprep prepares the image for capture by cleaning up various user-specific and computerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.
Q9. - (Topic 5)
You have a computer joined to a domain that runs Windows 7. Your company network contains a Windows Server 2008 R2 remote access server. The server is configured as a Network Access Protection (NAP) enforcement point.
You set the startup type of the NAP Agent service to Automatic on the computer.
You need to complete the configuration of the computer as a NAP client.
What should you do?
A. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the netsh command.
B. From the command line of the computer, enable the DHCP Quarantine Enforcement Client by using the ipconfig command.
C. From the NAP Client Configuration console, configure the user interface settings.
D. From the NAP Client Configuration console, configure the Health Registration settings.
Answer: A
Q10. DRAG DROP - (Topic 6)
You work for Contoso. Ltd. as part of a Windows 7 deployment team.
You create a new Windows Preinstallation Environment image. The image file is located at N:\images\winpe_x86 and is named WinPE.wim. An unsigned driver is located at
N:\Drivers\Driverl.inf.
You need to include the driver in the WinPE.wim image.
Which four actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q11. - (Topic 5)
You use a client computer named Marketing that has Windows 7 SP1 installed. The computer allows connections from other computers that have any version of Remote Desktop installed. The computer has a locally attached printer shared as Printer1.
A MarketingUsers group is a member of the local Remote Desktop Users group on the computer. Only the MarketingUsers group has access to Printer1. A user named User1 is a member of MarketingUsers.
You need to configure the computer to meet the following requirements:
. Prevent User1 from establishing Remote Desktop sessions to the Marketing computer.
. Allow other members of MarketingUsers to connect to the Marketing computer by using Remote Desktop.
. Ensure that User1 can access Printer1.
What should you do?
A. Assign the Deny access to this computer from the network user right to User1.
B. Remove the MarketingUsers group from the Remote Desktop Users group.
C. Assign the Deny log on through Remote Desktop Services user right to User1.
D. Remove User1 from the MarketingUsers group.
Answer: C
Q12. - (Topic 3)
You have a computer that runs Windows 7 and Windows Internet Explorer 8.
You open Internet Explorer and access a Web site. The Web site displays a page that has misaligned text and graphic image. You verify that the Web page displays correctly in previous versions of Internet Explorer. You need to view the Web page correctly.
What should you do?
A. Modify the text size.
B. Enable Caret Browsing.
C. Enable Compatibility View.
D. Disable the SmartScreen Filter.
Answer: C
Explanation:
Internet Explorer Compatibility View Internet Explorer Compatibility View allows sites designed for previous versions of Internet Explorer to display correctly for users of Internet Explorer 8. You can enable Compatibility View for a page by clicking the broken page icon at the end of the address bar. You can configure Compatibility View settings through the Compatibility View Settings dialog box. You can access this dialog box by clicking Compatibility View Settings on the Tools menu of Internet Explorer.
Q13. - (Topic 1)
Your network consists of an Active Directory domain and a DirectAccess infrastructure. You install Windows 7 on a new portable computer and join the computer to the domain. You need to ensure that the computer can establish DirectAccess connections.
What should you do?
A. Install a computer certificate.
B. Create a new network connection.
C. Enable the Network Discovery firewall exception.
D. Add the computer account to the Network Configuration Operators group.
Answer: A
Explanation:
Certificates The DirectAccess IPsec session is established when the client running Windows 7 and the DirectAccess server authenticate with each other using computer certificates. DirectAccess supports only certificate-based authentication.DirectAccess Client Configuration Clients receive their DirectAccess configuration through Group Policy. This differs from traditional VPN configuration where connections are configured manually or distributed through the connection manager administration kit. Once you have added the computer's client account to the designated security group, you need to install a computer certificate on the client for the purpose of DirectAccess authentication. An organization needs to deploy Active Directory Certificate Services so that clients can automatically enroll with the appropriate certificates.
Q14. - (Topic 4)
Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server.
You have a computer named Computer1 that runs Windows 7.
Computer1 is configured to obtain updates from Server1.
You open the WSUS snap-in on Server1 and discover that Computer1 does not appear.
You need to ensure that Computer1 appears in the WSUS snap-in.
What should you do?
A. On Server1, open Windows Update then select Check for updates.
B. On Server1, run Wsusutil.exe and specify the /import parameter.
C. On Computer1, open Windows Update and then select Change settings.
D. On Computer1, run Wuauclt.exe and specify the /detectnow parameter.
Answer: D
Explanation:
wuauclt.exeThe wuauclt utility allows you some control over the functioning of the Windows Update Agent. It is updated as part of Windows Update.Detectnow OptionBecause waiting for detection to start can be a time-consuming process, an option has been added to allow you to initiate detection right away. On one of the computers with the new Automatic Update client installed, run the following command at the command prompt: wuauclt.exe /detectnow
Q15. - (Topic 5)
You administer an Active Directory domain that includes portable computers that have Windows 7 SP1 installed. You tog on to one of the portable computers by using a domain user account and install a new device driver for a bar-code scanner.
You restart the portable computer after installing the new device driver. You successfully log on to the computer by using a domain user account. .
After logging on, you discover that the bar-code scanner is not working due to a driver error. You try to remove the installed driver, but the Roll Back Driver option is unavailable.
You need to be able to roll back the driver to its previous version.
What should you do?
A. From the Local Group Policy, modify Device Installation Restrictions.
B. Run the Device Manager by using elevated permissions.
C. Start the portable computer from the Windows 7 installation media and select Startup Repair.
D. Start the computer and select Last Known Good Configuration from the advanced startup options.
Answer: B