Q1. - (Topic 2)
You have a computer that runs windows 7.
You configure the computer to automatically install all updates.
You need to verify whether a specific update is installed.
What should you do?
A. In event viewer, examine the application log.
B. In windows update, examine the update history.
C. At the command prompt, run Wusa.exe and specify the /kb parameter.
D. At the command prompt, run Verifier.exe and specify the /query parameter.
Answer: B
Q2. - (Topic 1)
All the games including Titan Chess come with which versions of Windows 7? Choose two.
A. Windows Home Edition
B. Windows Professional Edition
C. Windows Ultimate Edition
D. Windows Enterprise Edition
Answer: C,D
Q3. - (Topic 6)
You are a network administrator for a law firm that has Windows 7 computers as part of a domain. Users are not administrators of their own computers.
A lawyer is working on a critical case and wants to use a Windows 7 laptop to access a computer in the office. The lawyer connects to the corporate VPN and receives a message that states that the lawyer does not have permission to use Remote Desktop to connect to the computer.
You need to allow the lawyer to access the computer in the office.
What should you do?
A. Upgrade the Remote Desktop Client application on the users laptop.
B. Add the user to the Remote Desktop Users group of the target computer.
C. Select Allow connections from computers running any version of Remote Desktop on the Remote tab of the computer.
D. Allow Remote Desktop through Windows Firewall.
Answer: B
Q4. - (Topic 3)
You have a computer named Computer1 that runs Windows 7.
Computer1 has a shared printer.
You need to configure Computer1 so that only Administrators are authorized to shut down the computer.
What should you do?
A. From User Accounts, modify the user profiles settings.
B. From User Accounts, modify the User Account Control (UAC) settings.
C. From the local computer policy, modify the Security Options.
D. From the local computer policy, modify the User Rights Assignment.
Answer: D
Explanation:
Shut down the system Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment Description Determines which users logged on locally to the computer can shut down the operating system using the Shut Down command. This user right is defined in the Default Domain Controller Group Policy object (GPO) and in the local security policy of workstations and servers.
Q5. - (Topic 1)
Which of the following is not a Windows PE tool?
A. Diskpart
B. Oscdimg
C. Winpeshl
D. None of the above.
Answer: D
Q6. - (Topic 3)
You have a computer that runs Windows 7.
You need to prevent users from installing a specific removable drive on the computer.
You connect the removable drive to the computer.
What should you do before you create a Group Policy?
A. From Device Manager, identify the device class GUID.
B. From Device Manager, identify the device location information.
C. From System Information, identify the device INF file.
D. From System Information, identify the device driver file name.
Answer: A
Explanation:
The device class GUID is used to identify the device. Prevent Windows 7 from installing or updating device drivers whose device setup class GUIDs you specify. This policy overrides any other policy that permits update or installation.
Q7. - (Topic 3)
You have an offline virtual hard disk (VHD) that contains an installation of Windows 7 Home Premium.
You need to upgrade the installation to Windows 7 Ultimate by using the minimum amount of administrative effort.
What should you do?
A. From a computer that runs Windows 7, attach the VHD. Run Imagex.exe and specify the /apply parameter.
B. From a computer that runs Windows 7, attach the VHD. Run Dism.exe and specify the /set-edition parameter.
C. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Dism.exe and specify the /image parameter.
D. Deploy the VHD to a new computer and upgrade the computer to Windows 7 Ultimate. Run Imagex.exe and specify the /capture parameter.
Answer: B
Explanation:
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows. images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing.
You can use DISM to perform the following actions:
-Prepare a Windows PE image.
-Enable or disable Windows features within an image.
-Upgrade a Windows image to a different edition.
-Add, remove, and enumerate packages.
-Add, remove, and enumerate drivers.
-Apply changes based on the offline servicing section of an unattended answer file.
-Configure international settings.
-Implement powerful logging features.
-Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
-Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
-Service all platforms (32-bit, 64-bit, and Itanium).
-Use existing Package Manager scripts.
Use the /Set-Edition option without the /ProductKey option to change an offline Windows image to a higher edition. Use /Get-TargetEditions to find the edition ID. Use the /Set-Edition option with the /ProductKey option only to change a running Windows Server. 2008 R2 operating system to a higher edition.
Q8. DRAG DROP - (Topic 6)
You are a systems administrator for a company that uses Windows 7 computers.
The company plans on upgrading all the computers. You have configured one computer, named SOURCE, with a power plan that meets a criteria for reduced power consumption. You want to test this power plan on another computer named DEST.
You need to transfer the power plan from SOURCE to DEST.
Which three actions should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q9. - (Topic 2)
You have a computer that runs Windows 7.
You run Runas and specify the /savecred parameter to start an application.
You need to delete the stored password.
What should you do?
A. Run Del and specify the /p parameter.
B. Run Runas and specify the /noprofile parameter.
C. From Credential Manager, modify the Windows credentials.
D. From Authorization Manager, modify the Authorization Manager options.
Answer: C
Explanation:
Credential Manager Credential Manager stores logon user name and passwords for network resources, including file servers, Web sites, and terminal services servers. Credential Manager stores user name and password data in the Windows Vault. You can back up the Windows Vault and restore it on other computers running Windows 7 as a method of transferring saved credentials from one computer to another. Although Credential Manager can be used to back up some forms of digital certificates, it cannot be used to back up and restore the self-signed Encrypting File System (EFS) certificates that Windows 7 generates automatically when you encrypt a file. For this reason, you must back up EFS certificates using other tools. You will learn about backing up EFS certificates later in this lesson.
Q10. - (Topic 2)
You have a portable computer named Computer1 and a desktop computer named Computer2. Both computers run windows 7.
On computer2, you create a share named Share1 by using Advanced Sharing feature.
You need to ensure that when you connect to Share1 from Computer1, the files that you open are automatically cached.
What should you do?
A. On Computer1, modify the Offline Files settings.
B. On Computer1, modify the User Profile settings.
C. On Computer2, modify the properties of Share1.
D. On Computer2, modify the file sharing connection settings for the HomeGroup
Answer: C
Explanation:
The caching feature of Shared Folders ensures that users have access to shared files even when they are working offline without access to the network. You can also use Shared Folders or Share and Storage Management to enable BranchCache on shared resources. The BranchCache feature in Windows. 7 or Windows Server 2008 R2 enables computers in a branch office to cache files downloaded from this shared folder, and then securely serve the files to other computers in the branch. To set caching options for a shared folder by using the Windows interface 1. Open Computer Management.2. If the User Account Control dialog box appears, confirm that the action it displays is what you want, and then click Yes.3. In the console tree, click System Tools, click Shared Folders, and then click Shares.4. In the results pane, right-click the shared folder, and then click Properties.5. On the General tab, click Offline Settings, configure the offline availability options as appropriate and then click OK. Offline availability optionsSelect the following offline availability option for each shared folder: All files and programs that users open from the share are automatically available offlineWhenever a user accesses the shared folder or volume and opens a file or program in it, that file or program will be automatically made available offline to that user. Files and programs that are automatically made available offline will remain in the Offline Files cache and synchronize with the version on the server until the cache is full or the user deletes the files. Files and programs that are not opened are not available offline.
Q11. - (Topic 4)
You administer desktops that have 32-bit and 64-bit versions of Windows 7 Enterprise SP1 installed. All desktops have a single CD-RW drive. The local hard disk drives on all computers are partitioned with a recovery partition and a single logical drive C.
You need to be able to restore Windows boot files on any of the desktops if the boot files become corrupted.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a system image of a Windows 7 Enterprise 64-bit desktop
B. Create a system repair disk on a Windows 7 Enterprise 64-bit desktop.
C. Restart Windows 7 Enterprise 64-bit desktops. Select the Disable Drive Signature Enforcement option from the Advanced Boot options menu.
D. Enable system protection on the recovery partition on 64-bit desktops.
E. Create system repair disk on a Windows 7 Enterprise 32-bit desktop.
F. Create a system image of a Windows 7 Enterprise 32-bit desktop.
G. Enable system protection on the recovery partition on 32-bit desktops.
Answer: B,E
Explanation:
http://windows.microsoft.com/en-US/windows7/Create-a-system-repair-disc
Q12. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
A user has saved files in a C:\Users\ folder that coworkers must be able to read and edit.
However, when coworkers try to edit those files, they get an "Access Denied" error.
You need to configure new NTFS permissions for the user's C:\Users\ folder to ensure that the coworkers have access to write to that folder.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. share permissions
B. the folder Properties window
C. the User Account Control Settings Control Panel window
D. the Group Policy management console
E. the Services management console
F. Local Users and Groups
G. the netsh command
H. Device Manager
I. the icacls command
Answer: B,I
Q13. - (Topic 3)
You have a computer that runs Windows 7.
You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site.
Which two configuration changes should you perform? (Each correct answer presents part of the solution, Choose two.)
A. Modify the properties of Group1.
B. Assign an SSL certificate to the default Web site.
C. Modify the authentication methods of the default Web site.
D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
Answer: C,D
Explanation:
Modifying the Default Authentication Method
You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site.
Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
See article:
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0
Web server http://support.microsoft.com/kb/271071
Q14. - (Topic 1)
Your company has an Active Directory domain. All computers are members of the domain.
Your network contains an internal Web site that uses Integrated Windows Authentication.
From a computer that runs Windows 7, you attempt to connect to the Web site and are prompted for authentication.
You verify that your user account has permission to access the Web site.
You need to ensure that you are automatically authenticated when you connect to the Web site.
What should you do?
A. Create a complex password for your user account.
B. Open Credential Manager and modify your credentials.
C. Add the URL of the Web site to the Trusted sites zone.
D. Add the URL of the Web site to the Local intranet zone.
Answer: D
Explanation:
Local Intranet Sites in the Local Intranet zone are computers on your organizational intranet. Internet Explorer can be configured to detect intranet sites automatically. It is also possible to add Web sites to this zone by clicking the Advanced button on the Local Intranet sites dialog box, as shown in the figure. The default security level of this zone is Medium-Low. Protected Mode is not enabled by default for sites in this zone.
Security settings are configured primarily by assigning sites to zones. Sites that require elevated privileges should be assigned to the Trusted Sites zone. Sites that are on the intranet are automatically assigned to the Local Intranet zone, though this may require manual configuration in some circumstances. All other sites are assigned to the Internet zone. The Restricted Sites zone is used only for Web sites that may present security risks but must be visited.
Q15. - (Topic 3)
You download a Windows PowerShell snap-in.
You need to ensure that the snap-in is automatically imported when you open a new PowerShell session.
What should you do?
A. Modify the PowerShell execution policy.
B. Create a new PowerShell manifest file. Update the PowerShell shortcut and specify the file option.
C. Create a new PowerShell console file. Update the PowerShell shortcut and specify the psconsolefile option.
D. Create a new PowerShell formatting and type file. Copy the file to the %SystemRoot%\system32 \WindowsPowerShell\v1.0 folder.
Answer: C
Explanation:
PSConsoleFile Loads the specified Windows PowerShell console file. To create a console file, use the Export-Console cmdlet in Windows PowerShell.
Export-Console The Export-Console cmdlet exports the names of the Windows PowerShell snap-ins in the current session to a Windows PowerShell console file (.psc1). You can use this cmdlet to save the snap-ins for use in future sessions. To add the snap-ins in the .psc1 console file to a session, start Windows PowerShell (Powershell.exe) at the command line by using Cmd.exe or another Windows PowerShell session, and then use the PSConsoleFile parameter of Powershell.exe to specify the console file.