Q1. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Professional SP1 installed. The computer has a single network interface.
You need to prevent the computer from using NetBIOS applications.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q2. - (Topic 2)
A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help.
What action can you take?
A. Restore the file from the previous night's backup.
B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin.
C. Restore the file from an older backup.
D. Ask the user to open his Recycle Bin.
Answer: D
Q3. - (Topic 4)
A Remote Assistance session is established with a user's computer that runs Windows 7 Enterprise.
You need to verify that a local file is encrypted with the Encrypting File System (EFS).
What should you do to accomplish this goal?
A. the netsh command
B. the folder Properties window
C. Device Manager
D. share permissions
E. the Services management console
F. the Group Policy management console
G. the icacls command
H. the User Account Control Settings Control Panel window
I. Local Users and Groups
Answer: B
Explanation: Right-click the file or folder Select Properties Click the Advanced button under the Attributes section If Check the box next to "Encrypt contents to secure data" is checked, then the file is encrypted using EFS.
Q4. - (Topic 3)
You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime.
What should you do?
A. From Backup and Restore, click Restore all users files.
B. From the properties of drive D, restore all previous versions.
C. Open System Restore and apply the latest restore point.
D. Start the computer from a system repair disc and restore a system image.
Answer: A
Q5. - (Topic 3)
You have a computer that runs Windows 7. The computer contains a folder named C:\data.
You use Advanced Sharing to share C:\data by using the default share permissions.
When a user tries to access the share over the network, he gets an "Access is Denied" error message.
You need to ensure that the user can access the share.
What should you do?
A. Allow file and printer sharing through Windows Firewall.
B. Change the network location from a Public network to a Home or Work network.
C. From the Security settings of the folder, assign the user the Read NTFS permission.
D. From the Advanced Sharing settings of the folder, assign the user the Read share permission.
Answer: C
Explanation:
Advanced Security Settings Properties Page - Permissions Tab You can add additional resources, groups or users to have explicit NTFS permissions to access this object, or you can edit or remove the NTFS permissions granted to a resource, group, or user on the object. Inherited permissions are those that are propagated to an object from a parent object. Inherited permissions ease the task of managing permissions and ensure consistency of permissions among all objects within a given container.
Q6. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. Computer1 has Remote Desktop enabled. Computer1 has a shared printer named Printer1.
A group named HRUsers is a member of the Remote Desktop Users group. Only HRUsers has access to Printer1. A user named User1 is a member of HRUsers.
You need to configure the computer to meet the following requirements:
Allow User1 to print to Printer1 Prevent User1 from establishing Remote Desktop sessions to Computer1 Allow other members of HRUsers to connect to Computer1 by using Remote Desktop
What should you do?
A. Remove User1 from the HRUsers group.
B. Remove HRUsers from the Remote Desktop Users group.
C. Assign User1 the Deny log on through Remote Desktop Services user right.
D. Assign User1 the Deny access to this computer from the network user right. Assign HRUsers the Allow log on locally user right.
Answer: C
Q7. - (Topic 2)
You have a computer named Computer1 that runs Windows 7.
Computer1 uses an NTFS-formatted USB drive that has ReadyBoost enabled.
You need to modify the amount of space that ReadyBoost reserves on the USB drive.
What should you do?
A. Open Computer and modify the properties of the USB drive.
B. Open Performance Information and Tools and run disk cleanup.
C. Open Devices and Printers and modify the properties of the USB drive.
D. Open Device Manager and modify the properties of the USB device.
Answer: A
Explanation:
ReadyBoostWindows 7 supports Windows ReadyBoost. This feature uses external USB flash drives as a hard disk cache to improve disk read performance. Supported external storage types include USB thumb drives, SD cards, and CF cards. Since ReadyBoost will not provide a performance gain when the primary disk is an SSD, Windows 7 disables ReadyBoost when reading from an SSD drive. External storage must meet the following requirements:
-Capacity of at least 256 MB, with at least 64 kilobytes (KB) of free space.The 4-GB limit of Windows Vista has been removed.
-At least a 2.5 MB/sec throughput for 4-KB random reads
-At least a 1.75 MB/sec throughput for 1-MB random writes
Q8. - (Topic 3)
You have three computers that run Windows 7.
You use Windows PowerShell to perform remote administration tasks on all three computers.
You need to remotely administer all three computers by using PowerShell.
Which PowerShell cmdlet should you use?
A. Enable-PSRemoting
B. Enable-PSSessionConfiguration
C. New-PSDrive
D. New-PSSession
Answer: D
Explanation:
New-PSSessionCreates a persistent connection to a local or remote computer. The New-PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows PowerShell establishes a persistent connection to the remote computer. Use a PSSession to run multiple commands that share data, such as a function or the value of a variable. To run commands in a PSSession, use the Invoke-Command cmdlet. To use the PSSession to interact directly with a remote computer, use the Enter-PSSession cmdlet. You can run commands on a remote computer without creating a PSSession by using the ComputerName parameters of Enter-PSSession or Invoke-Command. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used for the interactive session or for a single command and is then closed.
Q9. - (Topic 2)
You have a computer that runs windows 7.
The network contains a monitoring server named server1 Computer runs a monitoring service named service1.
Service 1 uses remote procedure. You need to ensure that service1 can receive requests from server1.
What should you do?
A. From windows Firewall with Advanced Security, create a predefined rule.
B. From windows Firewall with Advanced Security, create custom rule.
C. From the Network and Sharing Center, modify the network location settings.
D. From the Network and Sharing Center, modify the advanced sharing settings.
Answer: B
Explanation:
Creating WFAS Rules The process for configuring inbound rules and outbound rules is essentially the same: In the WFAS console, select the node that represents the type of rule that you want to create and then click New Rule. This opens the New Inbound (or Outbound) Rule Wizard. The first page, allows you to specify the type of rule that you are going to create. You can select between a program, port, predefined, or custom rule. The program and predefined rules are similar to what you can create using Windows Firewall. A custom rule allows you to configure a rule based on criteria not covered by any of the other options. You would create a custom rule if you wanted a rule that applied to a particular service rather than a program or port. You can also use a custom rule if you want to create a rule that involves both a specific program and a set of ports. For example, if you wanted to allow communication to a specific program on a certain port but not other ports, you would create a custom rule.
Q10. - (Topic 3)
You deploy a custom image to a computer and discover that the Telnet Client feature is disabled.
You need to ensure that the Telnet Client feature is enabled when you deploy the image.
You must achieve this goal in the minimum amount of time.
What should you do?
A. Enable the Telnet Client feature on the computer. Generalize the computer and capture the image.
B. Create an unattended file that enables Telnet Client. Generalize the computer and specify the unattended file. Capture the image.
C. Mount the image. Run Ocsetup.exe TelnetClient. Commit the changes and unmount the image.
D. Mount the image. Run Dism.exe and specify /image and /enable-feature:TelnetClient switches. Commit the changes and unmount the image.
Answer: D
Explanation:
NOTE: "when you deploy the image." Implies for future installations, not the current one.
Therefore the imagefile must be updated.
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings.
Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions:
-Prepare a Windows PE image.
-Enable or disable Windows features within an image.
-Upgrade a Windows image to a different edition.
-Add, remove, and enumerate packages.
-Add, remove, and enumerate drivers.
-Apply changes based on the offline servicing section of an unattended answer file.
-Configure international settings.
-Implement powerful logging features.
-Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
-Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
-Service all platforms (32-bit, 64-bit, and Itanium).
-Use existing Package Manager scripts.
Q11. - (Topic 1)
You have a stand-alone computer that runs Windows 7.
You open Windows Update as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can manually change the Windows Update settings on the computer.
What should you do?
A. Log on to Windows 7 as member of the Administrators group.
B. From the local Group Policy, modify the Windows Update settings.
C. Right-click Windows Update and select Run as administrator.
D. Right-click the command prompt, select Run as administrator, and then run Wuapp.exe.
Answer: B
Explanation:
Configuring Automatic Updates by using local Group Policy
1. Click Start, and then click Run.
2. Type gpedit.msc, and then click OK.
3. Expand Computer Configuration.
4. Right-click Administrative Templates, and then click Add/Remove Templates.
5. Click Add, click Wuau.adm in the Windows\Inf folder, and then click Open.
6. Click Close.
7. Under Computer Configuration, expand Administrative Templates, expand Windows Components, and then expand Windows Update.
Q12. HOTSPOT - (Topic 6)
You administer portable computers in your company network. All the computers have Windows 7 Enterprise installed.
You need to configure Windows Firewall on computers used by engineer employees to meet the following requirements:
. Engineer employees must receive remote support from desktop support employees while they are at the corporate main office.
. Engineer employees' remote support is prevented when they are working from home.
What should you do? (To answer, configure the appropriate option or options in the dialog box in the answer area.)
Answer:
Q13. - (Topic 2)
You have a computer that runs Windows 7. Multiple users share the computer. The computer is joined to a domain.
You need to prevent the users from using more than 2 GB of disk space on drive C.
What should you do?
A. From a Group Policy object (GPO), enable the Limit profile size setting.
B. Enable System Protection for Local Disk (C) and set the disk space usage.
C. Enable disk quota management on Computer1 and configure a default quota limit.
D. From a Group Policy object (GPO), enable the Limit the size of the entire roaming user profile cache setting.
Answer: C
Explanation:
Disk quotas provide administrators with a way to limit each user's utilization of disk space on a volume. In order to set quotas, you must have Administrator rights, and the volume must be formatted with the NTFS file system. Disk quotas are based on file ownership and are independent of the folder location of the user's files within the volume. For example, if users move their files from one folder to another on the same volume, their volume space usage does not change. However, if users copy their files to a different folder on the same volume, their volume space usage doubles. If one user creates a 200 kilobyte (KB) file, and another user takes ownership of that file, the first user's disk use decreases by 200 KB and the second user's disk use increases by 200 KB.
Q14. - (Topic 2)
You have a computer that runs Windows Vista. The hard disk is configured as shown in the exhibit. (Click the Exhibit button.)
You need to install Windows 7 in a dual-boot configuration.
What should you do?
A. From Windows Vista, extend Disk 0 Partition 1. Install Windows 7 in Disk 0 Partition 1.
B. From Windows Vista, create a new partition. Install Windows 7 in Disk 0 Partition 1.
C. Start the computer from the Windows 7 installation media. Install Windows 7 in Disk 0 Partition 1.
D. Start the computer from the Windows 7 installation media. Install Windows 7 in the unallocated space on Disk 0.
Answer: D
Explanation:
The key to configuring dual-booting is ensuring that each operating system has its own partition or hard disk drive.
To dual-boot with Windows 7, you need to be able to create a new volume of at least 15 GB. Even if you have more free space available on the volume you want to shrink, you may not be able to create a volume of the appropriate size because Windows Vista may not be able to move some special types of data to a different place on the hard disk drive.
When configuring a new computer to boot between multiple operating systems, it is also necessary to install operating systems in the order that they were released. For example, if you want to boot between Windows XP and Windows 7 on a new computer, you need to install Windows XP before you install Windows 7. If you install Windows XP after Windows 7, the Windows XP installation routine cannot recognize the Windows 7 operating system installation, and the computer only boots into Windows XP. It is possible to repair the computer from this point using Windows 7 startup repair so that it dual-boots, but the simplest course of action is just to install the operating systems in the order in which they were released by Microsoft.
Q15. - (Topic 2)
You have a customized image of Windows 7 Professional.
You mount the image and modify the contents of the image.
You need to restore the image to its original state.
Which tool should you use?
A. Dism.exe
B. Ocsetup.exe
C. Pkgmgr.exe
D. Sysprep.exe
Answer: A
Explanation:
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions:
* Prepare a Windows PE image.
* Enable or disable Windows features within an image.
* Upgrade a Windows image to a different edition.
* Add, remove, and enumerate packages.
* Add, remove, and enumerate drivers.
* Apply changes based on the offline servicing section of an unattended answer file.
* Configure international settings.
* Implement powerful logging features.
* Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
* Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
* Service all platforms (32-bit, 64-bit, and Itanium).
* Use existing Package Manager scripts.
DISM Command-Line Options
To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.
NOT Sysprep
Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.