Q1. - (Topic 5)
You use a desktop computer that has Windows 7 Ultimate SP1. The relevant portions of the computer configuration are shown in the following exhibits:
. The Disk Management console (Click the Exhibit button.)
. The System Properties window (Click the Exhibit button.)
. The System protection for Local Disk C window (Click the Exhibit button.)
You encrypt several files on an external USB hard disk drive by using the Encrypting File System (EFS).
You need to ensure that you can access the files from another computer.
What should you do?
A. Delete restore points.
B. Create a restore point.
C. Perform a system restore.
D. Search for the file in the Recycle Bin.
E. Increase disk space used for system protection.
F. Copy the file from a previous version of a folder.
G. Set restore settings to Only restore previous versions of files.
H. Run the cipher /x command from the elevated command prompt,
I. Run the vssadmin list volumes command from the elevated command prompt.
J. Run the vssadmin list shadows command from the elevated command prompt,
K. Run the compact /U <file_name> command from the elevated command prompt.
Answer: H
Explanation: * cipher /x[:efsfile] [<FileName>]
Backs up the EFS certificate and keys to the specified file name. If used with :efsfile, /x backs up the user's certificate(s) that were used to encrypt the file. Otherwise, the user's current EFS certificate and keys are backed up.
* Back Up Your EFS Key The first time that you use EFS to encrypt something, your system generates a random 256-bit number; that's the key that EFS uses whenever you encrypt something. To back up your EFS key, simply use the Cipher /x command. Cipher will reply with a message asking if you truly want to back up your EFS key—sadly, I haven't found a way to suppress this message. Press OK. The tool will then prompt you for the name of the file in which to store the backup. Don't specify a file extension; Cipher insists on the .pfx extension. For example, if you picked a file named mybackup, you now have a small file called mybackup.pfx. Next, the tool will prompt you to create a password with which to protect that file.
Once you've got that file created, copy it from your computer's hard disk to some offline location (e.g., a USB stick, a CD-ROM) and make a note of the password you've chosen. Now, in the event of unfortunate circumstances— for example, you lose your profile, you forget your password and a systems administrator has to reset it, the system's OS fails and you need to recover files directly from the nowdead system's hard disk—you can simply restore your EFS key by double-clicking the .pfx file and running the resulting wizard. As soon as the wizard is finished, you'll be able to get to your files again.
Q2. DRAG DROP - (Topic 6)
You capture a Windows Image (.wim) file from a reference computer.
You want to use Windows Deployment Services (WDS) in an unattended mode to deploy the image f\\e to target desktops.
You need to encrypt an administrator account password in the answer file used for the image deployment.
What should you do? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q3. - (Topic 2)
You are troubleshooting instability problems on a computer running Windows 7 Ultimate and suspect that they might be related to hardware faults in RAM.
You access the System Recovery options.
Which option is most likely to help you diagnose the problem?
A. Windows Memory Diagnostic
B. Startup Repair
C. System Restore
D. System Image Recovery
Answer: A
Q4. - (Topic 3)
You have a computer that runs Windows 7.
You need to capture the operating system and all the computer configurations to a Windows image (WIM) file.
What should you do before you capture the image?
A. Run Oscdimg.exe.
B. Run Windows System Image Manager (Windows SIM).
C. Open a command prompt that has elevated privileges.
D. Start the computer by using Windows Preinstallation Environment (Windows PE).
Answer: D
Explanation:
Windows PE To access a network share as an installation source from the client computer, you need to boot the client computer into the Windows Preintallation Environment
(Windows PE) environment. The Windows PE environment is a minimally featured operating system that allows you to access diagnostic and maintenance tools as well as access network drives. Once you have successfully booted into the Windows PE environment, you can connect to the network share and begin the installation by running Setup.exe.NOT Windows SIMOpens Windows images, creates answer files, and manages distribution shares and configuration sets.NOT OscdimgOscdimg is a command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660, Joliet, and Universal Disk Format (UDF) file systems.
Q5. - (Topic 2)
You install a local printer on a computer. You share the printer.
You need to ensure that only members of a local group named Group1 can print documents on the printer.
Which settings should you modify on the printer?
A. Printing preferences
B. Priority
C. Security
D. Share
Answer: C
Explanation:
Restricting printer access to selected users by using security groups If you need to restrict the access of certain shared printers to a certain group of network users, do the following:
-Create a security group and then add members to the security group. - Assign printer access permissions.
To create a security group and add member to the group
1. Open the Windows SBS Console.2. On the navigation bar, click the Users and Groups tab, and then click Groups.3. In the task pane, click Add a new group. The Add a New Group Wizard appears. In the Add a New Group Wizard, do the following:1. On the Add a new group page, for Group type, select Security group.2. On the Select groups members for <groupname> page, from the Users and groups list, add the network users who you want to include for the restricted printer access.3. Follow the instructions to complete the wizard. To assign printer access permissions1. Open the Windows SBS Console.2. On the navigation bar, click the Network tab, and then click Devices.3. From the list of printers displayed in the Printers section, click the printer that you want to view the properties for. Then in the task pane, click Printer Properties.4. In the Printer Properties dialog box, click the Security tab, and then remove all entries in the Groups or user names list box except Administrators and Creator Owner.5. To grant access to the printer, click Add, and then enter the names of the group or users that you want to grant access to this printer.
Q6. - (Topic 2)
You have an answer file for a Windows 7 installation.
You need to perform an unattended installation of Windows 7 by using the answer file.
You must achieve this goal by using the minimum amount of administrative effort.
What should you do?
A. Name the answer file autounattend.ini and save it to a USB disk. Start the computer from the Windows 7 DVD.
B. Name the answer file unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
C. Name the answer file autounattend.xml and save it to a USB disk. Start the computer from the Windows 7 DVD.
D. Name the answer file unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (Windows PE).
Answer: C
Explanation:
Unattended installation You can perform an unattended installation of Windows 7 by using an installation file called Unattend.xml. These installation files store answers to the questions asked by the Setup Wizard. When the Windows 7 installation process starts, Windows checks for attached USB storage devices that have this file in their root directory. Unattended installations are suitable when you need to deploy Windows 7 to a large number of computers because you do not have to interact with them manually, responding to prompts, as the installation progresses.Building a Reference Installation You configure your reference computer with a customized installation of Windows 7 that you then duplicate onto one or more destination computers. You can create a reference installation by using the Windows product DVD and (optionally) the answer file you created in the previous section. To install your reference computer using an answer file, perform the following procedure:
1. Turn on the reference computer. Insert the Windows 7 product DVD and the UFD containing the answer file (Autounattend.xml) that you created in the previous section. Note that the use of an answer file is optional, although it is the method Microsoft recommends. If you prefer, you can install Windows 7 manually from the installation DVD-ROM.
2. Restart the computer by pressing CTRL+ALT+DEL. You may have to override the boot order to boot from the CD/DVD-ROM disk. If so, select the appropriate function key to override the boot order during initial boot. Windows Setup (Setup.exe) starts automatically and searches the root directory of all removable media for an answer file called Autounattend.xml.
3. After Setup finishes, you can validate that all customizations were applied. For example, if you included the optional Microsoft-Windows-IE-InternetExplorer feature and set the Home_Page setting in your answer file, you can verify these settings by opening Internet Explorer.
4. To prepare the reference computer for the user, you use the Sysprep utility with the /generalize option to remove hardware-specific information from the Windows installation and the /oobe option to configure the computer to boot to Windows Welcome upon the next restart.
Q7. - (Topic 2)
You have a customized image of Windows 7 Professional.
You mount the image and modify the contents of the image.
You need to restore the image to its original state.
Which tool should you use?
A. Dism.exe
B. Ocsetup.exe
C. Pkgmgr.exe
D. Sysprep.exe
Answer: A
Explanation:
Dism Deployment Image Servicing and Management (DISM) is a command-line tool used to service Windows images offline before deployment. You can use it to install, uninstall, configure, and update Windows features, packages, drivers, and international settings. Subsets of the DISM servicing commands are also available for servicing a running operating system. Windows 7 introduces the DISM command-line tool. You can use DISM to service a Windows image or to prepare a Windows PE image. DISM replaces Package Manager (Pkgmgr.exe), PEimg, and Intlcfg in Windows Vista, and includes new features to improve the experience for offline servicing. You can use DISM to perform the following actions:
* Prepare a Windows PE image.
* Enable or disable Windows features within an image.
* Upgrade a Windows image to a different edition.
* Add, remove, and enumerate packages.
* Add, remove, and enumerate drivers.
* Apply changes based on the offline servicing section of an unattended answer file.
* Configure international settings.
* Implement powerful logging features.
* Service operating systems such as Windows Vista with SP1 and Windows Server 2008.
* Service a 32-bit image from a 64-bit host and service a 64-bit image from a 32-bit host.
* Service all platforms (32-bit, 64-bit, and Itanium).
* Use existing Package Manager scripts.
DISM Command-Line Options
To service a Windows image offline, you must apply or mount it. WIM images can be mounted using the WIM commands within DISM, or applied and then recaptured using ImageX. You can also use the WIM commands to list the indexes or verify the architecture for the image you are mounting. After you update the image, you must dismount it and then either commit or discard the changes you have made.
NOT Sysprep
Sysprep is a tool designed for corporate system administrators, OEMs, and others who need to deploy the Windows XP operating system on multiple computers. After performing the initial setup steps on a single system, you can run Sysprep to prepare the sample computer for cloning. Sysprep prepares the image for capture by cleaning up various user-specific and omputerspecific settings, as well as log files. The reference installation now is complete and ready to be imaged.
Q8. - (Topic 2)
Kim Akers has an administrator account on a computer running Windows 7 Enterprise.
Don Hall has a standard account on the same computer. Both users have Microsoft Office Word and Microsoft Office Excel files saved in their Documents library. Don stores Microsoft Office PowerPoint presentations in a subfolder of his Documents library named Presentations. He also stores digital photographs in his Pictures library.
Don has created a folder called Secret in his Documents library and has encrypted the folder and its contents. He stores confidential files in that folder.
When Don last logged on, he deleted some personal files but did not empty his Recycle Bin.
Kim is logged on to the computer. She has plugged in a USB flash memory device that holds personal files but has not yet copied any of these files to the computer. She has never formatted the flash memory device.
The computer is configured to let Windows decide what files and folders to back up.
Kim opens the Backup And Restore console but does not change any settings. She clicks Backup Now.
Which files are backed up? (Choose all that apply.)
A. The Word and Excel files in Don's Documents library
B. The Word and Excel files in Kim's Documents library
C. The PowerPoint files in Don's Presentation folder
D. The digital photographs in Don's Pictures library
E. The files in Don's Secret folder
F. The files in Don's Recycle Bin
G. The files on Kim's USB flash memory device
Answer: A,B,C,D
Q9. - (Topic 2)
You are investigating instability and boot problems on a computer running Windows 7 Enterprise. You boot using the Last Known Good Configuration (Advanced) option and perform a system restore. This does not solve your problems, and you want to undo the system restore. Can you do this, and what is the reason for your answer?
A. No. You can undo a system restore only if you initiate it from the System Recovery tools.
B. No. You can undo a system restore only if you carry it out after booting normally.
C. Yes. You can always undo a system restore, no matter how you booted the computer or how you initiated the restore.
D. Yes. You can undo a system restore that you perform after either booting normally or booting using Last Known Good Configuration (Advanced).
Answer: D
Q10. HOTSPOT - (Topic 6)
You have a windows 7 computer connected to a local subnet.
From the command prompt, you ping an IP address on the local network, but you get no response.
You need to configure your computer to ping the IP address.
Which two fields of TCF/IPV4 Properties should you configure? (To answer, select the appropriate two fields in the TCP/IPv4 Properties in the answer area.)
Answer:
Q11. - (Topic 4)
Your company network includes a Windows Server 2008 R2 server named Server1 and client computers that have Windows 7 installed. All computers are members of an Active Directory domain. You use a computer named Client1.
You plan to collect events from Client1 on Server1 by using HTTPS. On Server1, you start and configure the Windows Event Collector service. ON Client1, you start the Windows Remote Management Service.
You discover that no events are being collected.
You need to ensure that events are forwarded from Client1 to Server1.
What should you do?
A. On Client1, create an inbound rule to allow port 5986 for the Public connection type.
B. On Server1, create a Windows Event Collector firewall exception for the connection type.
C. On Client1, create an outbound Rule to allow port 443 for the Domain connection type.
D. ON Client1, create an inbound rule to allow port 5986 for the Domain connection type.
Answer: D
Q12. - (Topic 3)
You have two computers named Computer1 and Computer2 that run Windows 7.
You connect from Computer1 to Computer2 by using Remote Desktop.
You discover that you cannot copy any files between the computers during the Remote Desktop session.
You need to ensure that you can copy files between the computers during the Remote Desktop session.
What should you do?
A. On Computer1, open Windows Firewall and allow file and printer sharing.
B. On Computer2, open Windows Firewall and allow file and printer sharing.
C. On Computer1, open Remote Desktop Connection and configure the Local devices and resources setting.
D. On Computer2, open Remote Desktop Connection and configure the Local devices and resources setting.
Answer: C
Explanation:
How can I use my devices and resources in a Remote Desktop session? Redirecting a device on your computer makes it available for use in a Remote Desktop session. If you have a recent version of Remote Desktop, you can redirect most devices, including printers, smart cards, serial ports, drives, Plug and Play devices, media players based on the Media Transfer Protocol (MTP), and digital cameras based on the Picture Transfer Protocol (PTP). Some USB devices can be redirected, and you can also redirect your Clipboard.
Q13. HOTSPOT - (Topic 5)
A company is in the process of upgrading its client computers from Windows XP to Windows 7. You add an application to the Windows 7 base image.
When users move the application window, the application is displayed improperly.
You need to ensure that the application is displayed properly by disabling the Aero theme.
Which setting should you choose? (To answer, select the appropriate check box in the dialog box.)
Answer:
Q14. - (Topic 4)
A company has a new deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You need to capture an image of a Windows 7 reference computer.
Which two actions should you perform on the server before performing actions on the reference computer? (Each correct answer presents a complete solution. Choose two.)
A. Run the Dism command with the /Mount-Wim option.
B. Create a capture image in WDS.
C. Run the BCDEdit command.
D. Run the Dism command with the /Add-Driver option.
E. Run the imageX command with the /Mount parameter.
F. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
G. Add a boot image in WDS.
H. Run the Start/w ocsetupcommand.
I. Run the PEImg /Prep command.
J. Run the DiskPart command and the Attach command option.
K. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
L. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to True,
M. Run the Dism command with the /Add-Package option.
N. Use Sysprep with an answer file and set the PersistAHDeviceInstalls option in the answer file to False.
Answer: B,G
Explanation:
http://technet.microsoft.com/en-us/library/cc766320(v=ws.10).aspx MDT relies on boot images created in WDS, WAIK is a collection of tools that you use to help automate deployment. To capture an image created on a reference computer you need to add a boot.wim files to WDS, then using the boot.wim, create a capture wim file (usually called capture.wim). This allows you to capture a a reference computer.
Q15. HOTSPOT - (Topic 4)
A company is upgrading its client computers from windows XP to windows 7. You add an application to the Windows 7 base image.
Large fonts are interfering with the appearance of the application.
You need to ensure that the application is displayed correctly on client computers that run Windows 7.
Which option should you select? (To answer, select the appropriate check box in the dialog box.)
Answer: