Q1. - (Topic 4)
You have a computer running Windows 7. You create a VHD and install Windows 7 in it.
You reboot your system and notice that the boot menu now shows two installations of Windows 7.
How do you fix it?
A. Use Sysprep with an answer file to disable one installation.
B. Run the BCDEdit command.
C. Run the Start/w ocsetup command.
D. Run the Dism command
E. Add a boot image and create a capture image in WDS.
F. Run the PEImg /Prepcommand.
G. Run the ImageX command with the /Mount parameter.
H. Run the Dism command with the /Mount-Wim option.
I. Run the Dism command with the /Add-Package option.
J. Run the DiskPart command and the Attach command option.
K. Add a boot image and create a capture image in WDS
Answer: B
Explanation:
BCDEdit Command-Line Options Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe. BCDEdit has improved scripting support.
Note
Administrative privileges are required to use BCDEdit to modify BCD.
BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder.
BCDEdit is limited to the standard data types and is designed primarily to perform single common changes to BCD. For more complex operations or nonstandard data types, consider using the BCD Windows Management
Instrumentation (WMI) application programming interface (API) to create more powerful and flexible custom tools.
Q2. - (Topic 4)
A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You are preparing to capture an image of a Windows 7 reference computer. You plan to deploy the image to new computers that have the same hardware as the reference computer.
You need to ensure that the captured image contains the device drivers from the reference computer.
What should you do?
A. Run the Dism command with the /Add-Driver option.
B. Run the Dism command with the /Mount-Wimoption.
C. Run the BCDEdit command.
D. Run the Start /w ocsetup command.
E. Run the ImageX command with the /Mount parameter.
F. Run the DiskPart command and the Attach command option.
G. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
H. Add a boot image in WDS.
I. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
J. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
K. Create a capture image in WDS.
L. Run the Dism command with the /Add-Package option.
M. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
N. Run the PEImq /Prep command.
Answer: G
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the sysprep command with the /generalize option by specifying the PersistAllDeviceInstallssetting in the Microsoft-Windows-PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm). http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx
Q3. - (Topic 6)
You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain.
You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely.
You need to run a command on each Windows 7 computer so that you can configure the service.
Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. )
A. Mstsc /v:computername configure
B. Enable-PSRemoting -force
C. Psexec Wcomputername -enable
D. Winrm quickconfig
Answer: B,D
Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force
D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows.
Incorrect: Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.
* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]
Q4. - (Topic 3)
You have a computer that runs Windows 7 Home Premium.
You need to upgrade the computer to Windows 7 Ultimate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Perform a Windows Anytime Upgrade.
B. Download and run the Windows 7 Upgrade Advisor.
C. Insert the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
D. Start the computer from the Windows 7 installation media. From the Install Windows dialog box, select the Upgrade option.
Answer: A
Explanation:
Windows Anytime Upgrade With Windows Anytime Upgrade, shown in Figure,you can purchase an upgrade to an application over the Internet and have the features unlocked automatically. This upgrade method is more suitable for home users and users in small businesses where a small number of intra-edition upgrades is required.
Windows Anytime Upgrade
Q5. - (Topic 4)
You have a computer that runs Windows 7.
You need to record when an incoming connection is allowed through Windows firewall.
What should you do?
A. In Local Group Policy, modify the audit policy.
B. In Local Group Policy, modify the system audit policy.
C. From the Windows Firewall with Advanced Security properties, set the logging settings to Log successful connections.
D. From the Windows Firewall with Advanced Security properties, set the Data Protection (Quick Mode) IPSec settings to Advanced.
Answer: C
Explanation:
Customize Logging Settings for a Firewall Profile Windows Firewall with Advanced Security can be configured to log events that indicate the successes and failures of its processes. The logging settings involve two groups of settings: settings for the log file itself and settings that determine which events the file will record. The settings can be configured separately for each of the firewall profiles. You can specify where the log file will be created, how big the file can grow, and whether you want the log file to record information about dropped packets, successful connections, or both. Log successful connectionsUse this option to log when Windows Firewall with Advanced Security allows an inbound connection. The log records why and when the connection was formed. Look for entries with the word ALLOW in the action column of the log.
Q6. - (Topic 2)
You have a computer that runs Windows 7. The computer is joined to a domain.
You need to ensure that only approved USB drives can be used on the computer.
Which two policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. Enable Prevent installation of removable devices.
B. Enable Prevent installation of devices not described by other policy settings.
C. Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
Answer: B,D
Q7. - (Topic 4)
Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1.
You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service.
You discover that no events are being collected.
You need to ensure that events are forwarded from Client1 to Server1.
What should you do?
A. On Client1, create an inbound rule to allow port 5986 for the Public connection type.
B. On Server1, create a Windows Event Collector firewall exception for the connection type.
C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type.
D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type.
Answer: D
Q8. - (Topic 1)
You have a computer that runs Windows 7. You open the Disk Management snap-in as shown in the exhibit. (Click the Exhibit button.)?
You need to ensure that you can create a new partition on Disk 0.
What should you do?
A. Shrink volume C.
B. Compress volume C.
C. Convert Disk 0 into a dynamic disk.
D. Create and initialize a Virtual Hard Disk (VHD).
Answer: A
Explanation:
Needs to have sufficient space in order to create a new partition. Hence shrinking the C: partition will create additional space that can be used for a new partition.
Q9. - (Topic 5)
You install the Windows Automated Installation Kit (WAIK) for Windows 7 on a computer that runs Windows 7.
You want to deploy a Windows image (WIM) file to other computers in the domain. You need to capture the operating system, computer configuration, and applications installed on the computer to a WIM file.
What should you do before you capture the image?
A. Run Oscdimg.exe.
B. Run Sysprep.exe.
C. Open a command prompt that has elevated privileges.
D. Run Defrag.exe.
Answer: B
Explanation: http://support.microsoft.com/kb/302577 http://technet.microsoft.com/en-gb/library/gg712328.aspx
Microsoft Official Academic Course (handbook) by Wiley (Lesson 3 page 66-67, 71)
Q10. - (Topic 4)
You have a computer that runs Windows 7. You need to prevent users from copying unencrypted files to removable drives. What should you do?
A. From the Trusted Platform Module (TPM) snap-in, initialize TPM.
B. From Control Panel, modify the BitLocker Drive Encryption settings.
C. From a local Group Policy, modify the BitLocker Drive Encryption settings.
D. From a local Group Policy, modify the Trusted Platform Module (TPM) settings
Answer: C
Explanation:
How can I prevent users on a network from storing data on an unencrypted drive? In Windows 7, you can enable Group Policy settings to require that data drives be BitLockerprotected before a BitLocker-protected computer can write data to them. The policy settings you use for this are: Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionFixed Data DrivesDeny write access to fixed drives not protected by BitLocker Computer ConfigurationAdministrative TemplatesWindows ComponentsBitLocker Drive EncryptionRemovable Data DrivesDeny write access to removable drives not protected by BitLocker
When these policy settings are enabled, the BitLocker-protected operating system will mount any data drives that are not protected by BitLocker as read-only. If you are concerned that your users might inadvertently store data in an unencrypted drives while using a computer that does not have BitLocker enabled, use access control lists (ACLs) and Group Policy to configure access control for the drives or hide the drive letter.
Q11. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You need to ensure that Computer2 has exactly the same firewall rules as Computer1.
What should you do on Computer1?
A. Run Winrm.exe quickconfig.
B. From Windows Firewall with Advanced Security, select Export Policy.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click Export List.
D. Open Local Security Policy. Right-click IP Security Policies on Local Computer and then click Export List.
Answer: B
Explanation:
Importing and Exporting Firewall ConfigurationMost organizations that use clients running Windows 7 apply firewall rules through Group Policy. In the event that you need to support a number of stand-alone clients running Windows 7, you can replicate complex firewall configurations using the WFAS Import Policy and Export Policy options. Importing and exporting policy also allows you to save the current firewall configuration state before you make changes to it. Exported policy files use the .wfw extension. Exported policies use a binary format, not Extensible Markup Language (XML) format like many other Windows 7 configuration files. You can also export and import firewall policies in the same .wfw format using the netsh advfirewall export or netsh advfirewall import commands.
Q12. - (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You share the Pictures library over a network.
You discover that a JPEG image file located in the library was moved by a network user into a ZIP archive and is protected by using a password.
You need to open the image file.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Answer: F
Explanation:
Note: To restore a previous version of a file or folder that's included in a library, right-click the file or folder in the location where it's saved, rather than in the library. For example, to restore a previous version of a picture that's included in the Pictures library but is stored in the My Pictures folder, right-click the My Pictures folder, and then click Restore previous versions.
Q13. - (Topic 3)
Your network has a main office and a branch office.
The branch office has five client computers that run Windows 7 and a server that runs Windows Server 2008 R2. The branch office server is enabled for BranchCache.
You need to configure Windows Firewall on each client computer so that cached content can be retrieved from the branch office server.
Which firewall rule should you enable on the client computers?
A. BranchCache - Content Retrieval (Uses HTTP)
B. BranchCache - Hosted Cache Server (Uses HTTPS)
C. BranchCache - Peer Discovery (Uses WSD)
D. File and Printer Sharing
Answer: A
Explanation:
Configure domain member client distributed cache mode firewall rules When you configure BranchCache in distributed cache mode, BranchCache client computers use the Hypertext Transfer Protocol (HTTP) for data transfer with other client computers. BranchCache client computers also use the Web Services Dynamic Discovery (WS-Discovery) protocol when they attempt to discover content on client cache servers. You can use this procedure to configure client firewall exceptions to allow incoming HTTP and WS-Discovery traffic on client computers that are configured for distributed cache mode. The BranchCache – Content Retrieval (Uses HTTP) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on TCP port 80. This rule is required for both Hosted Cache and Distributed Cache mode. The BranchCache – Peer-Discovery (Uses WSD) predefined rule. If this rule is not available, create rules that allow inbound and outbound traffic on UDP port 3702. This rule is only required when using Distributed Cache mode. The BranchCache – Hosted Cache Client (HTTPS-Out) predefined rule. It this rule is not available, configure a rule that allows outbound traffic on TCP port 443. This rule is required only when using Hosted Cache mode.
Q14. - (Topic 6)
You work as the desktop support technician at Abc.com.
The Abc.com network consists of a single Active Directory domain named Abc.com.
The Abc.com management has instructed you to install Microsoft Windows 7 on all the client computers at Abc.com.
You need to create a Windows 7 image that includes the Office 2007. Microsoft Installer Package (MSI) package for the installation.
What should you do?
A. Install the MSI package by using the update command with the /slipstream switch.
B. Install the MSI package by using the Msiexec command with the /package /uninstall switches.
C. Install the MSI package by using the Msiexec command with the /package switch.
D. Install the MSI package by using the Install command with the /package switch.
Answer: C
Q15. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
You need to configure new NTFS permissions to ensure that only the specified user has access to write to a given folder.
What should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. the icacls command
B. the User Account Control Settings Control Panel window
C. share permissions
D. Local Users and Groups
E. the folder Properties window
F. the Services management console
G. the netsh command
H. Device Manager
I. the Group Policy management console
Answer: A,E