Q1. - (Topic 4)
You have a computer that runs Windows 7.
You need to identify the disk, memory, CPU, and network resources that an application is currently using.
Which tool should you use?
A. Component Services
B. Performance Information and Tools
C. Reliability Monitor
D. Resource Monitor
Answer: D
Explanation:
Resource Monitor Windows 7 offers an enhanced version of the Resource Monitor tool. Windows 7 Resource Monitor allows you to view information about hardware and software resource use in real time. You can filter the results according to the processes or services that you want to monitor. You can also use Resource Monitor to start, stop, suspend, and resume processes and services, and to troubleshoot unresponsive applications. You can start Resource Monitor from the Processes tab of Task Manager or by entering resmon in the Search box on the Start menu. Resource Monitor includes five tabs: Overview, CPU, Memory, Disk, and Network. The Overview tab, displays basic system resource usage information. The other tabs display information about each specific resource. If you have filtered results on one tab, only resources used by the selected processes or services are displayed on the other tabs. Filtered results are denoted by an orange bar below the title bar of each table.
Q2. - (Topic 2)
You have a computer that runs Windows 7 and Windows Internet Explorer 8. You discover that your browsing history is sent to a third-party advertising content provider. You need to prevent the browsing history from being sent only to that specific content provider. What should you do?
A. Enable InPrivate Filtering and click Automatically block.
B. Add the Web site for the content provider to the Restricted sites zone.
C. Enable InPrivate Filtering and select the Choose content to block or allow option.
D. View the privacy policy for the Web site and enable the Never allow this site to use cookies option.
Answer: C
Q3. HOTSPOT - (Topic 5)
A company has client computers that run Windows 7.
You need to secure a virtual private network (VPN) connection on the client computers. The remote access server must verify the identity of the client computers without requiring user credentials.
Which authentication protocol should you use? (To answer, select the appropriate setting or settings in the work area.)
Answer:
Q4. - (Topic 2)
A user reports that he is unable to start his computer. He provides the following information:
. The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
. The user cannot locate his BitLocker recovery key.
You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort.
What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 7 installation media and select Repair your computer.
C. Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK.
D. Start the computer from the Windows 7 installation media and select Install now.
Answer: D
Explanation:
No recovery key = no recovery. Time to install.
Any other option defeats the whole point of encrypting it.
Encrypted volumes are locked when the encryption key is not available. When the operating system volume is locked, you can boot only to recovery mode. In recovery mode, you can enter the BitLocker password or you can attach the USB device that has the recovery key stored and restart the computer. Once you enter the recovery password or key, you can boot your computer normally.
The following events trigger recovery mode:
* The boot environment changes. This could include one of the boot files being modified.
* TPM is disabled or cleared.
* An attempt is made to boot without the TPM, PIN, or USB key being provided.
* You attach a BitLocker-encrypted operating system volume to another computer.
Q5. - (Topic 3)
You have a computer that runs Windows 7.
You install a third-party Web browser.
You discover that HTML files are no longer associated with Windows Internet Explorer.
You need to ensure that Internet Explorer starts whenever a HTML file is opened.
What should you do from Internet Options?
A. Open the Connections tab and click Setup.
B. Open the General tab and click Use default.
C. Open the Programs tab and click Make default.
D. Open the Programs tab and click Manage add-ons.
Answer: C
Explanation:
Change your default web browser
This information applies to Internet Explorer 8 or Internet Explorer 7 running on Windows 7,
Windows Vista, Windows Server 2008, Windows XP Service Pack 2 and Service Pack 3, and Windows Server 2003.
To make Internet Explorer your default web browser
1. Click to open Internet Options.
2. Click the Programs tab, and then click Make default.
Q6. - (Topic 4)
You need to identify the hardware failures have occurred on your computer in the past six months.
What should you do?
A. Open Device Manager.
B. Open Reliability Monitor.
C. Create a User Defined Data Collector Set.
D. Create a new Event Trace Sessions Data Collector Set.
Answer: B
Explanation:
Reliability Monitor is an advanced tool that measures hardware and software problems and other changes to your computer. It provides a stability index that ranges from 1 (the least stable) to 10 (the most stable). You can use the index to help evaluate the reliability of your computer. Any change you make to your computer or problem that occurs on your computer affects the stability index.
The Reliability Monitor is intended for advanced computer users, such as software developers and network administrators.
Click to open Action Center.
Click Maintenance. Then, under Check for solutions to problem reports, click View reliability history.
In Reliability Monitor, you can:
Click any event on the graph to view its details.
Click Days or Weeks to view the stability index over a specific period of time.
Click items in the Action column to view more information about each event.
Click View all problem reports to view only the problems that have occurred on your
computer. This view doesn't include the other computer events that show up in Reliability
Monitor, such as events about software installation.
Q7. - (Topic 1)
You have a computer that runs Windows 7. The computer has System Protection enabled.
You need to retain only the last System Protection snapshot of the computer. All other snapshots must be deleted.
What should you do?
A. Run Disk Cleanup for Programs and features.
B. Run Disk Cleanup for System Restore and Shadow Copies.
C. From the System Protection Restore settings, select Turn off System Restore.
D. From the System Protection Restore settings, select Only restore previous versions of files.
Answer: B
Explanation:
Shadow info: Shadow copies are automatically saved as part of a restore point. If system protection is enabled, Windows 7 automatically creates shadow copies of files that have been modified since the last restore point was created. By default, new restore points are created every seven days or whenever a significant system change (such as a driver or application installation) occurs.
Q8. - (Topic 4)
You administer a desktop computer that has the following hardware specifications:
Dual-core 2.5GHz processor
1GB RAM
25GB unpartitioned disk space
Onboard graphics that has WDDM 1.0
You install a customized Windows 7 Enterprise 64-bit image on the computer by using unpartitioned disk space. The computer operates unacceptably slow.
You need to improve the performance of the computer.
What should you do?
A. Upgrade the RAM to 1 GB.
B. OpenTaks Manager. Set the priority of all SYSTEM processes to High.
C. Open Performance Monitor. Run the System Performance Data Collector Set.
D. Perform the initial Windows Experience Index Run.
Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows7/products/system-requirements Should have 2GB RAM as a minimum.
Q9. DRAG DROP - (Topic 5)
You deploy Windows 7 on client computers by using a default Windows 7 DVD.
You discover that the client computers use the most recently released critical updates.
You download the updates' package files from the Microsoft site to your desktop.
You need to prepare a new installation DVD that includes the updates.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q10. - (Topic 5)
You have a computer that runs Windows 7.
The computer's hard disks are configured as shown in the following table.
You need to ensure that you can recover the operating system and all the files on the computer if hard disk 0 experiences hardware failure.
What should you do?
A. Shrink drive C and then create a new partition.
B. Use the Backup and Restore tool to back up data files for all users.
C. Use the Backup and Restore tool to create a system image on a network location.
D. Create a restore point for both hard disks.
Answer: C
Explanation: System Image in Windows 7 The new backup utilities in Windows 7 are actually pretty impressive and creating an image will be possible in all versions. Today we take a look at creating a backup image of your machine without the need for a third party utility like Ghost or True Image.
You are just finished installing a fresh copy of Windows 7 on your computer and have it set up to your liking. One of the first things you should do now is create an image of the disc so in the event of a crash you will be able to restore it to its current state. An image is an exact copy of everything on the drive and will restore it back to its current state. It's probably best to create an image when everything is clean and organized on your system. This will make the image file smaller and allows you to restore the system with a smooth running set up.
Q11. - (Topic 3)
Your network contains computers that run either Windows Vista (x86) or Windows 7 (x86). All computers are joined to a domain.
You install a computer named Computer1 that runs Windows 7 (64-bit). You share a printer named Printer1 on Computer1.
You need to ensure that any user can automatically download and install the drivers for Printer1.
What should you do from Printer Properties?
A. Install a new driver.
B. Enable bidirectional support.
C. Modify the Additional Drivers settings.
D. Assign the Manage this printer permission to the Domain Users group.
Answer: C
Explanation:
If you are going to be sharing a printer with computers running previous versions of Microsoft Windows, you can add the drivers for the printer using Additional Drivers. When you add additional drivers, other computers on the network that do not have the printer drivers installed are able to download them from the computer that is sharing the printer.
Q12. - (Topic 1)
You have a computer that runs Windows 7.
Your network contains a DHCP server that runs Windows Server 2008 R2.
The server is configured as a Network Access Protection (NAP) enforcement point.
You need to configure the computer as a NAP client.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Services, set the Netlogon service Startup Type to Automatic.
B. From Services, set the Network Access Protection Agent service Startup Type to Automatic.
C. From the NAP Client Configuration console, configure the user interface settings.
D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.
Answer: B,D
Explanation:
Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface
1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK.
2. Click Enforcement Clients.
3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent
The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer.
Q13. - (Topic 3)
You have a custom image of Windows 7.
You discover that the boot configuration data store in the custom image is corrupted.
You need to create a new configuration data store within the custom image.
What should you do?
A. Run Imagex.exe and specify the /append parameter. Run Bcdedit.exe.
B. Run Imagex.exe and specify the /mountrw parameter. Run Bcdedit.exe.
C. From Windows System Image Manager (Windows SIM), select the image and then create a configuration set.
D. From Windows System Image Manager (Windows SIM), select the image and then create a catalog.
Answer: B
Explanation:
ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice/mountrwMounts a .wim file from Windows XP with Service Pack 2 (SP2), Windows Server 2003 with Service Pack 1 (SP1), or Windows Vista with read/write permission to a specified directory. Once the file is mounted, you can view and modify all the information contained in the directory.BcdeditBCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe, and BCDEdit has improved scripting support.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets. NOTE: question specifies configuration data store, not configuration set.
Q14. - (Topic 4)
A company has a server running Windows Server 2008 R2, with Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK) set up. The company also has client computers running Windows 7 Enterprise.
You are preparing to capture an image of a Windows 7 client computer.
You need to ensure that the captured image is generic and does not contain the device drivers from the client computer.
What should you do?
A. use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
B. Run the Start /w ocsetup command.
C. Run the PEImg /Prep command.
D. Run the Dism command with the /Mount-Wimoption.
E. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
F. Run the Dism command with the /Add-Driver option.
G. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
H. Run the BCDEdit/delete command.
I. Run the ImageX command with the /Mount parameter.
J. Run the Dism command with the /Add-Package option.
K. Add a boot image and create a capture image in WDS.
L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
M. Run the DiskPart command and the Attach command option.
Answer: L
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the Sysprep command with the /generalize option by specifying the PersistAllDeviceInstalls setting in the Microsoft-Windows-PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm). http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx
Q15. - (Topic 1)
You have a computer that runs Windows 7. Your company has a corporate intranet Web site. You open Windows Internet Explorer as shown in the exhibit. (Click the Exhibit button.)
You need to ensure that you can access Web pages on both the Internet and the intranet.
What should you do?
A. From the Files menu, click Work Offline.
B. From the Safety menu, click InPrivate Filtering.
C. From the Security tab, add the intranet Web site to the Trusted sites zone.
D. From the Safety menu, click InPrivate Browsing.
Answer: A
Explanation:
Working Offline is activated On Internet Explorer's File menu is a "Work Offline" item that toggles Internet Explorer between online and offline modes of operation.
(The question originally stated the Tools menu, maybe in a different version of IE this is the case, but for me and in the TechNet documentation it was under Files, so I'm choosing to believe Tools was a mistake and it should be Files, this has been amended in the question). InPrivate is turned on (does not prevent browsing the internet) InPrivate Browsing helps prevent Internet Explorer from storing data about your browsing session. This includes cookies, temporary Internet files, history, and other data. Toolbars and extensions are disabled by default.