Q1. - (Topic 4)
A company has a server running Windows Server2008 R2 with Windows Deployment Services(WDS), the Microsoft Deployment Toolkit(MDT), and the Windows Automated Installation Kit(WAIK) set up. The company also has client computers running windows 7 Enterpire. You are preparing to a capture an image of a windows 7 client computer. You need to ensure that the capture iamge does not contian the device drivers from the client computer. What should you do?
A. Run the Dism command with the /Add-Driver options
B. Run the PEImg/Prep command
C. Run the ImageX command with the /Mount parameter
D. Run the Start/w ocsetup command
E. Run the DiskPart command and the Attach command option
F. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option the answer file to False
G. Run the Dism command with the /Mount-Wim options
H. Use Sysprep with an answer file and set the UpdateInstalledDrivers option the answer file to Yes
I. Run the BCDEdit /delete command
J. Use Sysprep with an answer file and set the UpdateInstalledDrivers option the answer file to No
K. Run the Dism command with the /Add-Package options
L. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option the answer file to True
M. Add a boot image and create a capture image in WDS
Answer: F
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the sysprep command with the /generalize option by specifying the PersistAllDeviceInstallssetting in the Microsoft-Windows-PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm).
http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx
Q2. - (Topic 5)
You have a computer that runs Windows 7. The computer is a member of a workgroup.
You use Encrypting File System (EFS) to protect your local files.
You need to ensure that you can decrypt EFS files on the computer if you forget your password.
What should you do?
A. Create an EFS Data Recovery Agent by using Group Policy.
B. From User Accounts, select Manage your file encryption certificates.
C. Run the cipher.exe /adduser /user:administrator command.
D. Run the manage-bde -on C: -RecoveryPassword password command.
Answer: A
Explanation: Data Recovery Agent (DRA) is a user account that has been granted permissions to access all encrypted files even if the files have been encrypted using encryption key of another user account of the computer. Administrators must create and configure Data Recovery Agents before allowing users to encrypt their files. This serves as a proactive step taken by the administrators as once user account that has encrypted the file has been deleted from the computer, in the absence of DRA the files cannot be recovered whatsoever.
Q3. - (Topic 3)
You have three computers that run Windows 7.
You use Windows PowerShell to perform remote administration tasks on all three computers.
You need to remotely administer all three computers by using PowerShell.
Which PowerShell cmdlet should you use?
A. Enable-PSRemoting
B. Enable-PSSessionConfiguration
C. New-PSDrive
D. New-PSSession
Answer: D
Explanation:
New-PSSessionCreates a persistent connection to a local or remote computer. The New-PSSession cmdlet creates a Windows PowerShell session (PSSession) on a local or remote computer. When you create a PSSession, Windows PowerShell establishes a persistent connection to the remote computer. Use a PSSession to run multiple commands that share data, such as a function or the value of a variable. To run commands in a PSSession, use the Invoke-Command cmdlet. To use the PSSession to interact directly with a remote computer, use the Enter-PSSession cmdlet. You can run commands on a remote computer without creating a PSSession by using the ComputerName parameters of Enter-PSSession or Invoke-Command. When you use the ComputerName parameter, Windows PowerShell creates a temporary connection that is used for the interactive session or for a single command and is then closed.
Q4. - (Topic 4)
You have a computer running Windows 7. You create a VHD and install Windows 7 in it.
You reboot your system and notice that the boot menu now shows two installations of Windows 7.
How do you fix it?
A. Use Sysprep with an answer file to disable one installation.
B. Run the BCDEdit command.
C. Run the Start/w ocsetup command.
D. Run the Dism command
E. Add a boot image and create a capture image in WDS.
F. Run the PEImg /Prepcommand.
G. Run the ImageX command with the /Mount parameter.
H. Run the Dism command with the /Mount-Wim option.
I. Run the Dism command with the /Add-Package option.
J. Run the DiskPart command and the Attach command option.
K. Add a boot image and create a capture image in WDS
Answer: B
Explanation:
BCDEdit Command-Line Options Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini. BCDEdit is a command-line tool for managing BCD stores. It can be used for a variety of purposes, including creating new stores, modifying existing stores, adding boot menu options, and so on. BCDEdit serves essentially the same purpose as Bootcfg.exe on earlier versions of Windows, but with two major improvements: BCDEdit exposes a wider range of boot options than Bootcfg.exe. BCDEdit has improved scripting support.
Note
Administrative privileges are required to use BCDEdit to modify BCD.
BCDEdit is the primary tool for editing the boot configuration of Windows Vista and later versions of Windows. It is included with the Windows Vista distribution in the %WINDIR%\System32 folder.
BCDEdit is limited to the standard data types and is designed primarily to perform single common changes to BCD. For more complex operations or nonstandard data types, consider using the BCD Windows Management
Instrumentation (WMI) application programming interface (API) to create more powerful and flexible custom tools.
Q5. - (Topic 3)
You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime.
What should you do?
A. From Backup and Restore, click Restore all users files.
B. From the properties of drive D, restore all previous versions.
C. Open System Restore and apply the latest restore point.
D. Start the computer from a system repair disc and restore a system image.
Answer: A
Q6. - (Topic 3)
You need to configure a computer to encrypt all inbound connections by using IPSec.
What should you do?
A. From Network and Sharing Center, click Connect to a network.
B. From Network and Sharing Center, click Set up a new connection or network.
C. From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
D. From Windows Firewall with Advanced Security, click Connection Security Rules and then click New Rule.
Answer: D
Explanation:
Connection Security Rules Connection security rules are a special type of rule that deal with authenticated and encrypted traffic. You can use connection security rules to manage how communication occurs between different hosts on the network. You use the New Connection Security Rule Wizard, to create connection security rules. Connections can be authenticated using the Kerberos V5 protocol requiring a domain computer and user account or a domain computer account. If you select advanced properties, connections can be authenticated using NTLMv2, computer certificates from a particular certificate authority (CA) or using a pre-shared key.Connection Security Rules and IPSec policies The relationship between connection security rules and IPSec policies is similar to the relationship between AppLocker and Software Restriction Policies. Both sets of rules do similar things, but the ones that you use depend on the operating systems used by the client computers in your organization. All editions of Windows 7 and Windows Vista support connection security rules, but Windows XP does not.
Q7. - (Topic 1)
In which of the following scenarios must you perform a migration rather than an upgrade? Choose three.
A. Windows XP Professional (x64) to Windows 7 Professional (x64)
B. Windows Vista Business (x86) to Windows 7 Professional (x64)
C. Windows Vista Enterprise (x64) to Windows 7 Enterprise (x64)
D. Windows Vista Home Premium (x64) to Windows 7 Home Premium (x86)
Answer: A,B,D
Q8. - (Topic 3)
You have a computer that runs Windows 7.
You have an application control policy on the computer.
You discover that the policy is not enforced on the computer.
You open the Services snap-in as shown in the exhibit. (Click the Exhibit button.)
You need to enforce the application control policy on the computer.
What should you do?
A. Set the Application Identity service Startup Type to Automatic and start the service.
B. Set the Application Information service Startup Type to Automatic and start the service.
C. Set the Application Management service Startup Type to Automatic and start the service.
D. Set the Application Experience service Startup Type to Automatic and start the service.
Answer: A
Explanation:
Application Identity service AppLocker relies upon the Application Identity Service being active. When you install Windows 7, the startup type of this service is set to Manual. When testing AppLocker, you should keep the startup type as Manual in case you configure rules incorrectly. In that event, you can just reboot the computer and the AppLocker rules will no longer be in effect. Only when you are sure that your policies are applied correctly should you set the startup type of the Application Identity Service to Automatic. You should take great care in testing AppLocker rules because it is possible to lock down a computer running Windows 7 to such an extent that the computer becomes unusable. AppLocker policies are sometimes called application control policies
Q9. - (Topic 4)
You administer client computers that have Windows 7 Professional 64-bit installed. All the computers are members of a single Active Directory Domain.
You need to prevent users from installing non-trusted device drivers.
What should you do?
A. Enable the Code signing for device drivers in a domain Group Policy.
B. Disable the Code signing for device drivers in a domain Group Policy.
C. Add each user to the Domain Admins group.
D. Run the SigVerif.exe command on each computer.
Answer: A
Explanation:
Can't see any of the rest PREVENTING users from installing non trusted devices - but Sigverig does highlight them.
Q10. - (Topic 3)
You have a computer that runs Windows 7.
You need to connect to a network projector from the computer.
What should you use?
A. Run Netproj.exe and provide the path to the projector.
B. From Network and Sharing Center, create an ad hoc network and run the DisplaySwitch.exe.
C. Run DisplaySwitch.exe and select Projector only.
D. From Device Manager, click Add Legacy hardware.
Answer: A
Q11. - (Topic 1)
You have a computer that runs Windows 7. The computer contains two volumes, C and D.
You create a new folder called D:\Reports.
You need to ensure that all files stored in the Reports folder are indexed by Windows Search.
What should you do?
A. Enable the archive attribute on the folder.
B. Modify the Folder Options from Control Panel.
C. Modify the properties of the Windows Search service.
D. Create a new library and add the Reports folder to the library.
Answer: D
Explanation:
Libraries enable you to organize files by using metadata about the file, such as author, date, type, tags, and so on-instantly. You're not limited to just browsing files by folder hierarchy. When you save files in a Library, Windows. 7 indexes the files. You can use Library features like the Arrange By control to instantly browse the files in the Library by metadata or use the Search Builder, which is built into the Search box in Windows Explorer, to instantly search the files in the Library by metadata.
Q12. - (Topic 3)
You need to back up your Encrypting File System (EFS) certificate. You must achieve this goal in the minimum amount of time.
What should you do?
A. Run Cipher.exe /x.
B. Run Ntbackup.exe /p.
C. From Backup and Restore, click Back up now.
D. From Backup and Restore, click Create a system image.
Answer: A
Explanation:
Cipher is used to manage certificates.
NOT Backup and Restore:Only the EFS certificate needs to be backed up and time is a factor.
Q13. DRAG DROP - (Topic 5)
You use a computer that has Windows 7 Enterprise installed.
You install two new hard disk drives and verify that the disks have been detected by Disk Management.
You need to configure the two new disks for maximum read and write performance.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q14. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.
You create a shared folder on the server and enable BranchCache on the shared folder.
You discover that the users of the client computers are unable to access files in the shared folder.
You need to provide access for the users to the shared folder.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.
F. Check permissions.
G. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.
Answer: F
Explanation:
Have the users been given access to the files (what does BranchCache have to do with accessing files locally etc).
Q15. - (Topic 6)
You have a computer that runs Windows 7 Enterprise. The operating system is installed on drive C.
You have customized the Windows environment and prepared it to generate deployment source media. You attach a USB flash drive as drive D to the computer.
You need to create a Windows image file that has the operating system partition.
What should you do?
A. Run imagex.exe /capture d: c:\image.wim.
B. Run imagex.exe /capture c: d:\image.wim.
C. From Backup and Restore, create a system image and save it to drive D.
D. Run xcopy.exe c: d: /p /c.
Answer: C