Q1. - (Topic 4)
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remote access server.
The external firewall has TCP port 80 and TCP port 443 open for remote access connections.
You have a home computer that runs Windows 7.
You need to establish secure remote access connection from the home computer to the remote access server.
Which type of connection should you configure?
A. IPSEC
B. L2TP
C. PPTP
D. SSTP
Answer: D
Explanation:
Secure Socket Tunneling Protocol Secure Socket Tunneling Protocol (SSTP) is a new form of VPN tunnel with features that allow traffic to pass through firewalls that block PPTP and L2TP/IPsec traffic. SSTP provides a mechanism to encapsulate PPP traffic over the SSL channel of the HTTPS protocol. The use of PPP allows support for strong authentication methods such as EAP-TLS. The use of HTTPS means traffic will flow through TCP port 443, a port commonly used for Web access. Secure Sockets Layer (SSL) provides transport-level security with enhanced key negotiation, encryption, and integrity checking.
Q2. DRAG DROP - (Topic 6)
Your organization has a Windows Server 2008 R2 server and Windows 7 Professional computers.
Two groups require access to new applications. Each group uses a different application. You are adding 100 new computers to each group.
You need to configure Windows Firewall to allow each group to access its application.
Which four steps should you perform in sequence? (To answer, move the appropriate four actions from the list of actions to the answer area and arrange them in the correct order. )
Answer:
Q3. HOTSPOT - (Topic 6)
You work with Windows 7 computers.
Your company has a policy of not allowing software to be upgraded without proper authorization from the managers.
You set a Software Restriction Policy to allow only a certain version of Microsoft Word 2010 to run. The policy of the Local Group Policy Editor is shown in the Policy Editor exhibit. (Click the Exhibit button.)
Additionally, the hash policy for WmWord. exe is shown in the Hash Policy exhibit. (Click the Exhibit button. )
Any upgrades or change to the WinWord.exe will result in the program not operating.
When you attempt to run MS Word, the program does not execute. The error is shown in the Hashblock exhibit. (Click the Exhibit button.)
Consider each of the following statements. Does the information in the three statements support the inference as stated? (This question is worth three points. )
Answer:
Q4. - (Topic 1)
You work in an international company which is named Wiikigo. Before entering this company, you have two years of experience in the IT field, as well as experience implementing and administering any Windows client operating system in a networked environment. You are professional in installing, upgrading and migrating to Windows 7, deploying Windows 7, and configuring Hardware and Applications and son on. You manage a computer that runs Windows 7. You have to identify which applications were installed during the last week. So what action should you perform?
A. The System Performance Data Collector Set should be run from Performance Monitor.
B. The informational events should be reviewed from Reliability Monitor.
C. The Software Environment should be reviewed from System Information.
D. The System Diagnostics Report should be reviewed from Performance Monitor.
Answer: B
Q5. - (Topic 4)
You create a new virtual hard disk (VHD) on a Windows 7 Enterprise computer. Then you install Windows 7 on the VHD.
After you reboot the computer, the Windows 7 boot menu shows two different Windows 7 installations titled "Windows 7".
You need to ensure that the Windows 7 boot menu differentiates between the two Windows 7 installations.
What should you do?
A. Add a boot image in WDS.
B. Run the ImageX command with the /Mount parameter.
C. Run thePEImg/Prep command.
D. Use Sysprep with ar\ answer file and set the UpdatelnstalledDrivers option in the answer file to No.
E. Run the DiskPart command and the Attach command option.
F. Create a capture image in WDS.
G. Run the Dism command with the /Mount-Wimoption.
H. Run the BCDEdit command.
I. Run the Dism command with the /Add-Package option.
J. Run the Dism command with the /Add-Driver option.
K. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to False.
L. Use Sysprep with an answer file and set the UpdatelnstalledDrivers option in the answer file to Yes.
M. Use Sysprep with an answer file and set the PersistAllDevicelnstalls option in the answer file to True.
N. Run the Start /w ocsetup command.
Answer: H
Q6. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Shrink drive C and then create a new partition.
B. Create an Easy Transfer file on a network location.
C. Use the Backup and Restore tool to back up data files for all users.
D. Use the Backup and Restore tool to create a system image on an external hard disk.
Answer: D
Q7. - (Topic 5)
You use a portable computer that has Windows 7 SP1 Ultimate installed.
You update the driver for the computer's video card and the computer becomes unresponsive.
You need to be able to roll back the video card driver.
What should you do?
A. Restart the computer in safe mode.
B. Start the computer, press F8, and then select Repair Your Computer.
C. Boot the computer from a Windows Recovery Environment (Windows RE) disk, and then restore the system image.
D. Start the computer, press F8, and then select Debugging Mode.
Answer: A
Q8. - (Topic 3)
You have a computer that runs Windows 7.
You need to connect to a network projector from the computer.
What should you use?
A. Run Netproj.exe and provide the path to the projector.
B. From Network and Sharing Center, create an ad hoc network and run the DisplaySwitch.exe.
C. Run DisplaySwitch.exe and select Projector only.
D. From Device Manager, click Add Legacy hardware.
Answer: A
Q9. - (Topic 3)
Your network contains a Network Policy and Access Services server named Server1.
All certificates in the organization are issued by an enterprise certification authority (CA) named Server2.
You have a standalone computer named Computer1 that runs Windows 7. Computer1 has a VPN connection that connects to Server1 by using SSTP.
You attempt to establish the VPN connection to Server1 and receive the following error message: "A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider."
You need to ensure that you can successfully establish the VPN connection to Server1.
What should you do on Computer1?
A. Import the root certificate to the user's Trusted Publishers store.
B. Import the root certificate to the computer's Trusted Root Certification Authorities store.
C. Import the server certificate of Server1 to the user s Trusted Root Certification Authorities store.
D. Import the server certificate of Server1 to the computer s Trusted Root Certification Authorities store.
Answer: B
Explanation: A certificate chain establishes a "chain of trust" from a certification authority (CA) to an individual certificate. Trust occurs if a valid certificate from that CA can be found in your root certificate directory. As long as you trust the CA, you will automatically trust any other certificates signed by that CA.
Q10. - (Topic 5)
You install Windows 7 on a new computer.
Every time you start the computer, you receive a "STOP" error message.
You suspect that the RAM on the computer has a problem.
You need verify the RAM on the computer.
What should you do first?
A. Start the computer, press F8, and select Repair Your Computer.
B. Start the computer, press F8, and then select Debugging Mode.
C. Start the computer by using Windows PE and then run the bootsect.exe /all command
D. Start the computer by using Windows PE and then run the bcdedit /bootsequence command
Answer: A
Q11. - (Topic 3)
You have a computer named Computer1 that runs Windows 7. You have a server named Server1 that runs Windows Server 2008. Server1 has a file share named Share1.
The network configuration for Computer1 is shown in the exhibit. (Click the Exhibit button.)
You attempt to connect to \\Server1\Share1 and receive the following error message: Windows cannot access \\Server1\Share1. From Computer1, you successfully ping Server1.
You need to connect to \\Server1\Share1.
What should you enable on Computer1?
A. Client for Microsoft Networks
B. File and Printer Sharing for Microsoft Networks
C. Link-Layer Topology Discovery Mapper I/O Driver
D. Link-Layer Topology Discovery Responder
Answer: A
Explanation:
Client for Microsoft Networks Allows the computer to access resources on a Microsoft network.File and Printer Sharing for Microsoft NetworksEnables other computers to access resources on your computer in a Microsoft network (and other networks).Link-layer Topology Discovery Mapper I/O DriverDiscovers and locates other computers, devices, and network infrastructure features on the network, and determines network bandwidth.
Link-layer Topology Discovery ResponderAllows a computer to be discovered and located on the network.
Q12. - (Topic 2)
You have a virtual hard disk (VHD) file. You need to view the files in the VHD. The solution must prevent users that log on to your computer from modifying files in the VHD.
What should you do?
A. From Disk Management, attach the VHD as read-only.
B. From Disk Management, convert the VHD to a GPT disk.
C. From Windows Explorer, modify the permissions of the VHD file.
D. From Windows Explorer, modify the read-only attribute of the VHD file.
Answer: A
Q13. - (Topic 3)
You have a Windows 7 computer that is a member of a workgroup.
You need to prevent members of a local group from starting a specific application.
You must achieve this goal by using the minimum amount of administrative effort.
What should you create?
A. administrative template
B. application control policy
C. IPSec policy
D. software restriction policy
Answer: B
Explanation:
AppLocker Application Control Policies AppLocker is a feature new to Windows 7 that is available only in the Enterprise and Ultimate editions of the product. AppLocker policies are conceptually similar to Software Restriction Policies, though AppLocker policies have several advantages, such as the ability to be applied to specific user or group accounts and the ability to apply to all future versions of a product. Hash rules apply only to a specific version of an application and must be recalculated whenever you apply software updates to that application. AppLocker policies are located in the Computer Configuration\Windows Settings\ Security Settings\Application Control Policies node of a standard Windows 7 or Windows Server 2008 R2 GPO.
AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies.
Q14. - (Topic 2)
A user telephones your help desk. She has just accidentally deleted a file she was working on earlier that day.
You have configured her computer to carry out backups every evening, and you installed a new graphics driver two days ago.
How should you advise the user to retrieve her file?
A. Open the Backup And Restore console and restore the file from backup.
B. Use the Restore Previous Versions feature to restore the file.
C. Open her Recycle Bin, right-click the file, and choose Restore.
D. Perform a system restore.
Answer: C
Q15. - (Topic 1)
To which of the following versions and editions of Windows 7 can you directly upgrade a computer running Windows Vista Enterprise (x86)?
A. Windows 7 Home Professional (x86).
B. Windows 7 Ultimate (x86)
C. Windows 7 Ultimate (x64)
D. Windows 7 Enterprise (x64)
Answer: B
Explanation:
1048 4079
Windows 7 Upgrade paths:
http://technet.microsoft.com/en-us/library/dd772579%28v=ws.10%29.aspx
The only applicable solution is Windows 7 Enterprise (64-bit) as for the following reasons:
All versions are support Hardware wise.
Requirements:
Windows 7 Home Premium, Professional, Ultimate, and Enterprise editions have the following minimum hardware requirements:
1 GHz 32-bit (x86) or 64-bit (x64) processor
1 GB of system memory a 40-GB hard disk drive (traditional or SSD) with at least 15 GB of available space a graphics adapter that supports DirectX 9 graphics, has a Windows Display Driver Model (WDDM) driver, Pixel Shader 2.0 hardware, and 32 bits per pixel and a minimum of 128 MB graphics memory XP Mode Windows XP Mode is a downloadable compatibility option that is available for the
Professional, Enterprise, and Ultimate editions of Windows 7. Windows XP Mode uses the latest version of Microsoft Virtual PC to allow you to run an installation of Windows XP virtually under Windows 7.
Use all of the installed memory
The x86 version supports a maximum of 4 GB of RAM, whereas the x64 version supports a maximum of 8 GB of RAM.
Windows 7 Professional
Windows 7 Professional is available from retailers and on new computers installed by manufacturers. It supports all the features available in Windows Home Premium, but you can join computers with this operating system installed to a domain. It supports EFS and Remote Desktop Host but does not support enterprise features such as AppLocker, DirectAccess, BitLocker, and BranchCache.
Windows 7 Enterprise and Ultimate Editions
The Windows 7 Enterprise and Ultimate editions are identical except for the fact that Windows 7 Enterprise is available only to Microsoft's volume licensing customers, and Windows 7 Ultimate is available from retailers and on new computers installed by manufacturers. The Enterprise and Ultimate editions support all the features available in other Windows 7 editions but also support all the enterprise features such as EFS, Remote Desktop Host, AppLocker, DirectAccess, BitLocker, BranchCache, and Boot from VHD.