Q1. - (Topic 1)
Which of the following is used to control when the security pop-up notifications are used?
A. Security Control Manager
B. User Account Control
C. User Access Control Panel
D. Notification Control Settings Manager
Answer: B
Q2. - (Topic 1)
You have a computer that runs Windows 7. You create a HomeGroup. You need to secure the HomeGroup to meet the following requirements:
. Allow access to the HomeGroup when you are connected to private networks
. Block access to the HomeGroup when you are connected to public networks
What should you do?
A. From Network and Sharing Center, modify the advanced sharing settings.
B. From the HomeGroup settings in Control Panel, modify the advanced sharing settings.
C. Configure the HomeGroup exception in Windows Firewall to include Home or work (private) networks and block Public networks.
D. Configure the File and Printer Sharing exception in Windows Firewall to include Home or work (private) networks and block Public networks.
Answer: C
Explanation:
Windows Firewall does not allow you to create firewall rules for specific network locations on the basis of port address. Windows Firewall does not allow you to create rules that differentiate between the home and work network locations. You can only create rules that differentiate on the basis of home and work or public network locations.
HomeGroup Connections This option decides how authentication works for connections to HomeGroup resources. If all computers in the HomeGroup have the same user name and passwords configured, you can set this option to allow Windows to manage HomeGroup connections. If different user accounts and passwords are present, you should configure the option to use user accounts and passwords to connect to other computers. This option is available only in the Home/Work network profile.
Q3. - (Topic 3)
You need to ensure that when you insert a blank DVD into the DVD drive, Windows Explorer opens automatically and enables you to select files to burn to DVD.
What should you do?
A. From Default Programs, modify the AutoPlay settings.
B. From Default Programs, modify the default program settings.
C. From Device Manager, modify the properties of the DVD drive.
D. From System Configuration Utility, modify the Startup settings.
Answer: A
Q4. - (Topic 2)
You have a computer that runs Windows 7. The computer is joined to a domain.
You need to ensure that only approved USB drives can be used on the computer.
Which two policy settings should you configure? (Each correct answer presents part of the solution. Choose two.)
A. Enable Prevent installation of removable devices.
B. Enable Prevent installation of devices not described by other policy settings.
C. Enable Prevent installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
D. Enable Allow installation of devices that match any of these device IDs and enter the device ID for the approved USB drives.
Answer: B,D
Q5. - (Topic 3)
Your company uses Windows Deployment Services (WDS) to deploy Windows 7.
You create a new image of Windows 7.
You need to ensure that you can deploy the image by using WDS.
What should you do?
A. From the Windows Deployment Services snap-in, add a new install image.
B. From the Windows Deployment Services snap-in, add a new boot image.
C. Run Oscdimg.exe and specify the -boot parameter. Copy the image to C:\remoteinstall\boot.
D. Run Imagex.exe and specify the /append parameter. Copy the image to C:\remoteinstall\images.
Answer: A
Explanation:
Windows Deployment ServicesWDS provides a PXE-booted version of Windows PE. A WDS image is contained in a WIM file and is booted over the network into a RAMDisk. The installation then proceeds under Windows PE. The process of capturing a WIM image into a WDS server is similar to the use of ImageX and Sysprep except that the last step involves booting into the WDS capture image. This is a Windows PE image that helps you capture a client system to the WDS server. WDS is relatively lightweight compared to other image deployment methods such as MDT and provides a method that can be faster than an optical media-based installation of Windows. You use WDS images to deploy system files to client computers. A number of image files exist; for example, you use a capture image to create an install image. Install ImageAn install image is an operating system image that you deploy to the client computer. Typically, this is a WIM file.Boot ImageA boot image is a Windows PE image into which you boot a client before you install the WIM image file. To install Windows 7, you first boot the computer into the boot image, and then you select the install image to install. Unless you are using a reference computer and adding applications to the image, you should use the standard boot image that is included on the Windows 7 installation media (Install.wim). Capture and discover images are types of boot images. (need install image not boot)NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems. (-boot : need install image not boot)NOT ImagexImageX is a command-line tool that enables original equipment manufacturers (OEMs) and corporations to capture, to modify, and to apply file-based disk images for rapid deployment. ImageX works with Windows image (.wim) files for copying to a network, or it can work with other technologies that use .wim images, such as Windows Setup, Windows Deployment Services (Windows DS), and the System Management Server (SMS) Operating System Feature Deployment Pack./appendAppends a volume image to an existing Windows image (.wim) file. Creates a single instance of the file, comparing it against the resources that already exist in the .wim file, so you do not capture the same file twice.
Q6. - (Topic 4)
A company has client computers that run Windows 7 Enterprise. The company also has a file server running Windows Server 2008 R2 that is configured to use BranchCache.
You need to configure the client computers to be BranchCache clients.
Which two choices should you use to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
A. Device Manager
B. Local Users and Groups
C. the User Account Control Settings Control Panel window
D. the Group Policy management console
E. the Services management console
F. the folder Properties window
G. the netsh command
H. the icacls command
I. share permissions
Answer: D,G
Explanation:
To enable BranchCache on Windows 7 client computers using Group Policy, you must first create a Group Policy object (GPO) that will carry the BranchCache configuration. After creating the GPO, you configure the setting that enables BranchCache and choose whether BranchCache will operate in Distributed Cache mode or Hosted Cache mode.
To create a GPO, enable BranchCache, and select the cache mode
Click Start, point to Administrative Tools, and click Group Policy Management Console.
Client configuration using netsh
When configuring client computers, you can enable BranchCache and choose between Distributed Cache mode and Hosted Cache mode with a single netsh command.
Q7. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You use Remote Desktop to connect from Computer1 to Computer2.
You need to prevent the desktop background of Computer2 from being displayed when you use Remote Desktop to connect to Computer2.
What should you do on Computer1?
A. From the Personalization options, change the theme.
B. From the System properties, modify the Remote settings.
C. From the Remote Desktop Connection options, modify the Performance setting.
D. From the Remote Desktop Connection options, modify the Display configuration settings.
Answer: C
Explanation:
Configuring the Desktop ExperienceYou can configure the connection speed and fine-tune the desktop environment for optimal performance by using the settings located on the Experience tab of the Remote Desktop Connection tool. Most of these settings relate to the graphical nature of the desktop. Because the processing for graphics happens on the server and must be transmitted to the desktop over the network connection, you can increase performance by allowing only the minimal settings that are necessary for your users. When you choose a connection speed, the check boxes are automatically selected to indicate the recommended settings for the richest visual experience possible at that speed.ExperienceConfigure the connection speed and adjust the desktop environment for optimal performance.Desktop background Allows user to choose a custom background or wallpaper for their desktop. Because these can be very graphicintensive, disable this setting unless it is necessary for your users.
Q8. HOTSPOT - (Topic 5)
You use a computer that has Windows 7 installed. The computer uses a quad-core CPU.
Your computer experiences CPU performance issues while encoding video files.
You need to configure the wmplayer.exe process to use only the first two CPU cores.
What should you do? (To answer, select the appropriate option or options in the answer area.)
Answer:
Q9. - (Topic 1)
Which of the following is not a Windows PE tool?
A. Diskpart
B. Oscdimg
C. Winpeshl
D. None of the above.
Answer: D
Q10. - (Topic 4)
You have a computer that runs Windows 7. Windows Update settings are configured as shown in the exhibit. (Click the Exhibit button.)
You discover that standard users are never notified when updates are available.
You need to ensure that standard users are notified when updates are available.
What should you do?
A. Select Allow all users to install updates on this computer.
B. Specify an intranet Microsoft update service location in Group Policy.
C. Change the Startup Type for the Windows Update service to Automatic.
D. Select Give me recommended updates the same way I receive important updates.
Answer: A
Explanation:
Change how Windows installs or notifies you about updates You can set Windows to automatically install important and recommended updates or to install important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address noncritical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically. If you don't want updates to be installed automatically, you can choose to be notified when updates apply to your computer instead. Then, you can download and install them yourself, or you can set Windows to automatically download updates, and then notify you so you can install them yourself. Here's how to change how Windows installs or notifies you about updates:
1. Click to open Windows Update.
2. In the left pane, click Change settings.
3. Under Important updates, click one of the following:
4. To schedule your automatic updates, next to Install new updates, select the day and time you want updates to occur. - Install updates automatically (recommended)
-Download updates but let me choose whether to install them
-Check for updates but let me choose whether to download and install them
-Never check for updates (not recommended)
5. To get recommended updates for your computer, under Recommended updates, select the Give me recommended updates the same way I receive important updates check box.
6. To allow anyone using the computer to make updates, select the Allow all users to install updates on this computer check box. This applies only to updates and software that are installed manually; automatic updates will be installed regardless of the user.
7. Click OK. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
Q11. - (Topic 5)
You use a portable computer that has Windows 7 Enterprise SP1 installed. A conference room at your company has a network projector installed on a server within the company network.
You need to connect to the projector from your computer. What should you do?
A. From Device Manager, click Add legacy hardware.
B. From Accessories, click Connect to a Network Projector.
C. Run the Displayswitch.exe command and select Projector only.
D. From Display, click Connect to a projector.
Answer: C
Q12. - (Topic 4)
Your company office network includes a file server that has Windows Server 2008 R2 installed and client computers that have Windows 7 Enterprise installed. The computers are members of an Active Directory domain. The file server has the BrachCache features installed.
All sales user in the office must download a daily updated 5-GB file that is stored on a file server located in a remote office.
You configure the client computers to run BranchCache in Distributed Host mode. You discover that all users still access the file directly from the file server.
You need to reduce the utilization of a WAN link between the offices because of downloading the file to the client computers.
What should you do?
A. Run the Netsh branchcache set service mode=HOSTEDSERVER client authentication=NONE command
B. Configure firewall exception rules for multicast traffic, inbound and outbound traffic for local UDP port 3702, and inbound and outbound traffic for local TCP port 80.
C. Create a Group Policy that sets Hash Publication for BranchCache as disabled.
D. Run the netsh branchcache set service mode=DISTRIBUTED command.
E. Create a Group Policy object and configure the Set percentage of disk space used for client computer cache option.
F. Check permisions.
G. Run the netsh branchcache set service mode=HOSTEDCLIENT command.
H. Create a Group Policy object and enable the Set BranchCache Hosted Cache mode policy.
I. Configure firewall exception rules for inbound and outbound traffic for local TCP port 80 and for inbound and outbound traffic for local TCP port 8443.
Answer: E
Explanation:
Original wording: You configure the client computers to run BranchCache in 'Distributed Host Mode'. Changed to 'Distributed Cache mode".
Q13. - (Topic 5)
You administer a computer that has Windows 7 Enterprise installed.
The computer reboots unexpectedly. You suspect that an unsigned driver causes the reboots.
You need to view a list of all installed device drivers that contain information about the digital signature of the device driver.
Which should you do?
A. Run the driverquery.exe /SI command.
B. Open the System Protection configuration for drive C.
C. Open Device Manager, show hidden devices, and sort all devices by type.
D. Run sigverif.exe and start the verification process of the device drivers. Then, review the generated log file.
Answer: A
Q14. - (Topic 3)
You have a computer that runs Windows 7. The computer has two drives named C and D. Windows Backup is scheduled to run every day. The scheduled backup backs up a system image, all user, files, and drive D. Drive D fails. You replace the drive with a new drive. You need to recover the data on drive D by using the minimum amount of administrative effort. The solution must minimize downtime.
What should you do?
A. From Backup and Restore, click Restore all users files.
B. From the properties of drive D, restore all previous versions.
C. Open System Restore and apply the latest restore point.
D. Start the computer from a system repair disc and restore a system image.
Answer: A
Q15. - (Topic 5)
You use a computer that has Windows 7 SP1 installed. The computer has a shared folder named C:\Software.
User1 is a local user account on the computer. The account is a member of several groups that have access to the C:\Software folder.
You need to verify whether User1 can save files to C:\Software.
What should you do?
A. View the User Account Control Settings Control Panel window.
B. Run the Net Share command.
C. View the Share permissions on C:\Software.
D. In the Advanced Security Settings for the Documents folder, select the Effective Permissions tab.
Answer: D
Explanation: To view effective permissions on files and folders
Open Windows Explorer, and then locate the file or folder for which you want to view effective permissions.
Right-click the file or folder, click Properties, and then click the Security tab.
Click Advanced, click the Effective Permissions tab, and then click Select.
In Enter the object name to select (examples), enter the name of a user or group, and then click OK. The selected check boxes indicate the effective permissions of the user or group for that file or folder.