Q1. HOTSPOT - (Topic 6)
A company has Windows XP, Windows vista, and windows 7 computers. You receive the following emails.
Email 1
From: Company CIO
Message: We are in the process of upgrading all computers. We need to ensure that everyone is running Windows 7.
Email 2
From: System Administrator
Message: During the upgrades of all of the computers, we need to make sure we keep the user's Favorites folder, My Documentsfolder, and Outlook archive files.
Email 3
From: Accounting Department Message: Our payroll application does NOT work on Windows 7. Should we be worried? Consider each of the following statements. Does the information in the three emails support
the inference as stated? (This question is worth three points. )
Answer:
Q2. - (Topic 4)
You administer client computers that have Windows 7 Enterprise installed.
A server named Server1 has an IP address of 10.10.4.56. The server accepts Remote Desktop connections at a custom port 10876.
You need to connect to the server from a client computer by using Remote Desktop.
What should you do?
A. From the General tab of your Remote Desktop connection, type 10.10.4.56 port: 10876 in the Computer field.
B. From the Advanced tab of your Remote Desktop connection, configure the port of Server1 in the Connect from anywhere option.
C. From the General tab of your Remote Desktop connection, type 10.10.4.56:10876 in the Computer field.
D. From an elevated command prompt, run mstsc.exe 10.10.4.56 port: 10876.
Answer: A
Q3. - (Topic 2)
Your company's chief accountant consults you with a question about a financial spreadsheet. She needs to recover the version of this particular spreadsheet that existed six months ago because it is needed for a financial audit. Using Restore Previous Versions, you find that the oldest version stored is dated three months ago. How can you recover the required file?
A. Edit the System Protection properties for the volume that hosts the file. Use the Max Usage slider to increase the maximum proportion of the hard disk capacity used for system protection to 70 percent.
B. Perform a system restore. Select a system restore point that was created six months ago.
C. Edit the System Protection properties for the volume that hosts the file. Select the Only Restore Previous Versions Of Files setting.
D. Use the Backup And Restore console to recover the file from a backup set generated six months ago.
Answer: D
Q4. DRAG DROP - (Topic 5)
You use a portable computer that has Windows 7 Home Premium installed. The portable computer has a scheduled backup of all libraries to run every day at midnight. Drive C is also configured with system protection.
You use an instant messaging application that saves chat data to a log file. The log file is stored in My Documents.
You install a new version of the application. You discover that the log file has been replaced with an empty file.
You need to restore the most recent version of the file that contains data.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q5. - (Topic 1)
Which of the following is not a rating for games in Windows 7?
A. General Audience (G)
B. Everyone (E)
C. Teen (T)
D. Adults Only (AO)
Answer: A
Q6. - (Topic 4)
You use a portable computer that has Windows 7 installed. The computer has a single hard disk drive and a dual-core CPU.
You need to analyze the performance of the computer to meet the following requirements:
. Include the CPU, Memory, and Disk subsystems.
. Send events to another computer for predefined Event IDs.
What should you do?
A. Run powercfg.exe.
B. Run the Windows Experience Index.
C. Configure Event Viewer subscriptions.
D. Open Task Manager.
E. Open System Properties, and configure performance settings.
F. Open System Properties, and configure environment variables.
G. Open System Properties, and configure user profiles settings.
H. Open System Properties, and configure the page file settings.
I. Open Performance Monitor, and configure a Data Collector Set.
J. Open Performance Monitor, and customize the System Monitor view.
Answer: C
Q7. - (Topic 1)
You have a computer that runs Windows 7.
Multiple users log on to your computer.
You enable auditing on a folder stored on your computer.
You need to ensure that each access to the folder is logged.
What should you do?
A. Start the Problem Steps Recorder.
B. From Event Viewer, modify the properties of the Security log.
C. From the local Group Policy, configure the Audit object access setting.
D. From the local Group Policy, configure the Audit directory service Access setting.
Answer: C
Explanation:
Audit object access Determines whether to audit the event of a user accessing an object (for example, file, folder, registry key, printer, and so forth) which has its own system access control list (SACL) specified. By default, this value is set to No auditing in the Default Domain Controller Group Policy object (GPO) and in the local policies of workstations and servers. If you define this policy setting, you can specify whether to audit successes, audit failures, or not to audit the event type at all. Success audits generate an audit entry when a user successfully accesses an object that has a SACL specified. Failure audits generate an audit entry when a user unsuccessfully attempts to access an object that has a SACL specified. You can select No auditing by defining the policy setting and unchecking Success and Failure.
Q8. - (Topic 2)
What command-line utility can you use in Windows 7 to edit boot options?
A. Bootmgr.exe
B. Winload.exe
C. Bcdedit.exe
D. Winresume.exe
Answer: C
Q9. - (Topic 1)
You have a computer that runs Windows 7.
Your network contains a DHCP server that runs Windows Server 2008 R2.
The server is configured as a Network Access Protection (NAP) enforcement point.
You need to configure the computer as a NAP client.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. From Services, set the Netlogon service Startup Type to Automatic.
B. From Services, set the Network Access Protection Agent service Startup Type to Automatic.
C. From the NAP Client Configuration console, configure the user interface settings.
D. From the NAP Client Configuration console, enable the DHCP Quarantine Enforcement Client.
Answer: B,D
Explanation:
Network Access Protection Network Access Protection (NAP) is a feature in Windows Server 2008 that controls access to network resources based on a client computer's identity and compliance with corporate governance policy. NAP allows network administrators to define granular levels of network access based on who a client is, the groups to which the client belongs, and the degree to which that client is compliant with corporate governance policy. If a client is not compliant, NAP provides a mechanism to automatically bring the client back into compliance and then dynamically increase its level of network access.NAP Client ConfigurationNetwork Access Protection (NAP), a new feature in Windows Vista. and Windows Server. 2008, allows you to control the access of client computers to network resources based on computer identity and compliance with corporate governance policy. To implement NAP, you must configure NAP settings on both servers and client computers. There are three tools that you can use to configure NAP client settings: The NAP Client Configuration console provides a graphical user interface with which you can configure NAP client settings on the local computer or in a configuration file that you can save and apply to other computers. The Netsh commands for NAP client provide a command-line tool that you can use to configure client computers or to create a configuration file that you can save and apply to other computers. If you want to manage NAP client settings on domain member client computers, you can use the Group Policy Management Console and the Group Policy Management Editor. When you configure NAP client settings in Group Policy, these settings are applied on NAP-capable domain member client computers when Group Policy is refreshed.To enable and disable the DHCP enforcement client by using the Windows interface
1. To open the NAP Client Configuration console, click Start, click All Programs, click Accessories, click Run, type NAPCLCFG.MSC, and then click OK.
2. Click Enforcement Clients.
3. Right-click DHCP Enforcement Client, and then click Enable or Disable.Network Access Protection Agent
The Network Access Protection (NAP) agent service collects and manages health information for client computers on a network. Information collected by NAP agent is used to make sure that the client computer has the required software and settings. If a client computer is not compliant with health policy, it can be provided with restricted network access until its configuration is updated. Depending on the configuration of health policy, client computers might be automatically updated so that users quickly regain full network access without having to manually update their computer.
Q10. - (Topic 2)
You have a computer that runs Windows 7.
You need to identify which applications were installed during the last week.
What should you do?
A. From Reliability Monitor, review the informational events.
B. From System Information, review the Software Environment.
C. From Performance Monitor, review the System Diagnostics Report.
D. From Performance Monitor, run the System Performance Data Collector Set.
Answer: A
Explanation:
Reliability Monitor tracks a computer's stability. It can also tell you when events that could affect stability (such as the installation of a software application) occurred and whether any restarts were required after these events. Action Center monitors your computer and reports problems with security, maintenance, and related settings. The Windows Experience Index indicates the suitability of your current computer hardware for running resource intensive applications.
Q11. - (Topic 1)
You have a computer that runs Windows 7.
A printer is installed on the computer.
You remove the Everyone group from the access control list (ACL) for the printer, and then you share the printer.
You need to ensure that members of the Sales group can modify all the print jobs that they submit.
You must prevent Sales group members from modifying the print jobs of other users.
What should you do?
A. From the printer's properties, assign the Print permission to the Sales group.
B. From the printer's properties, assign the Manage Documents permission to the Sales group.
C. From the local Group Policy, assign the Increase scheduling priority user right to the Sales group.
D. From the local Group Policy, assign the Take ownership of files or other objects user right to the Sales group.
Answer: A
Explanation:
The available permissions are:
-Print This permission allows a user to print to the printer and rearrange the documents that they have submitted to the printer.
-Manage This Printer Users assigned the Manage This Printer permission can pause and restart the printer, change spooler settings, adjust printer permissions, change printer properties, and share a printer.
-Manage Documents This permission allows users or groups to pause, resume, restart, cancel, or reorder the documents submitted by users that are in the current print queue.
Q12. DRAG DROP - (Topic 5)
Your company network includes a Windows Server 2008 R2 server named Server 1. You use a client computer named Client1 that has Windows 7 Enterprise installed. Both computers are members of an Active Directory domain.
You want to automatically collect events from Client1 to Server1. Bandwidth delivery optimization will not be used along with the subscription.
You need to configure the required collector-initiated subscription.
What should you do? (To answer, drag the appropriate configuration step or configuration steps to the correct target computer or target computers in the answer area. An answer choice can be used once, more than once, or not at all.)
Answer:
Q13. - (Topic 4)
You administer client computers that have Windows 7 Enterprise installed.
A server names Server1 has an IP address of 10.10.4.46. The server accepts Remote Desktop connections at a custom port 10876.
You need to connect to the server from a client computer by using Remote Desktop.
What should you do?
A. From an elevated command prompt, run mstsc.exe /v:server1:10876
B. From an elevated command prompt, run msts.exe 10.10.4.56 port:10876
C. From an elevated command prompt, run msts.exe Server1 port:10876
D. From the Advanced tab of your remote Desktop connection, configure the IP address and port of Server1 as the RD Gateway Server
Answer: A
Explanation:
http://windows.microsoft.com/en-us/windows-vista/Use-command-line-parameters-with-Remote-Desktop-Connection
Use command line parameters with Remote Desktop Connection
Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box in this version of Windows, from the Run dialog box, or from a command line. With these methods, you can use additional command line parameters to control how
Remote Desktop Connection looks or behaves.
To start Remote Desktop from the Run dialog box, follow these steps:
Click the Start button , click All Programs, click Accessories, and then click Run.
In the Open box, type mstsc.
Type a space, followed by any additional parameters that you want to use.
The following table lists the parameters you can use.
Command line syntax for Remote Desktop Connection
Syntax
mstsc [<connection file>] [/v:<server[:port]>] [/admin] [/f[ullscreen]] [/w:<width>]
[/h:<height>] [/public] | [/span] [/edit "connection file"] [/migrate] [/?]
Command line parameters for Remote Desktop Connection ParameterDescription
Q14. - (Topic 5)
You have 100 computers that run Windows XP. Each computer has the following features:
Contains a single hard disk drive.
Contains a single partition.
Supports USB devices during startup.
You are planning a clean installation of Windows 7 Ultimate.
You need to ensure that the installation of Windows 7 Ultimate will support BitLocker Drive Encryption on the system partition.
What should you do?
A. Verify that the computers have a Trusted Platform Module (TPM) version 1.2 security devices.
B. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Use bcdedit.exe to create a new empty boot configuration data store.
C. Perform a clean installation of Windows 7 Ultimate by using the existing partition. Verify the status of the partition by using manage bde.exe.
D. Start the computer from Windows 7 media. Delete the existing partition and install Windows 7 Ultimate on the unpartitioned space.
Answer: B
Q15. - (Topic 2)
You have a computer that runs Windows 7. IPv6 is disabled on the computer.
The computer has the following IPv4 settings:
IP address: 10.1.1.193
Subnet mask: 25S.255.0.0
Default gateway: 10.1.1.194
. Preferred DNS server: 10.1.1.195
You need to ensure that the computer can only communicate with computers on the local subnet.
What should you do?
A. Delete the default gateway address.
B. Delete the preferred DNS server IP address
C. Configure the subnet mask to use 255.255.255.0
D. Configure the subnet mask to use 255.255.255.192
Answer: A
Explanation:
Why gateways work Default gateways are important to make IP routing work efficiently. In most cases, the router that acts as the default gateway for TCP/IP hosts--either a dedicated router or a computer that connects two or more network segments--maintains knowledge of other networks in the larger network and how to reach them. TCP/IP hosts rely on default gateways for most of their communication needs with hosts on remote network segments. In this way, individual hosts are freed of the burden of having to maintain extensive and continuously updated knowledge about individual remote IP network segments. Only the router that acts as the default gateway needs to maintain this level of routing knowledge to reach other remote network segments in the larger internetwork. If the default gateway fails, communication beyond the local network segment may be impaired. To prevent this, you can use the Advanced TCP/IP Settings dialog box (in Network Connections) for each connection to specify multiple default gateways. You can also use the route command to manually add routes to the routing table for heavily used hosts or networks.