Q1. DRAG DROP - (Topic 5)
Twenty client computers run Windows XP. The computers are joined to a domain. You plan to perform a clean installation of Windows 7 on all the computers.
You need to transfer all users' documents and settings. You must exclude music and video files. You must achieve this goal by using the minimum amount of administrative effort.
Which two actions should you perform in sequence? (To answer, move the appropriate actions from the list of actions to the answer area and arrange them in the correct order.)
Answer:
Q2. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. From Internet Options, modify the security settings for the Internet zone.
B. From the Local Group Policy, enable the InPrivate Filtering Threshold setting.
C. From Internet Options, select Delete browsing history on exit.
D. From Internet Options, on the Advanced tab, clear Enable DOM Storage.
Answer: C
Q3. - (Topic 6)
You are the system administrator for a large manufacturing company. You and your team are responsible for managing over 1,000 Windows 7 Professional desktop and laptop computers. All computers are members of a Windows 2008 R2 Active Directory domain.
You want to utilize the Windows Remote Management Service available in Windows 7 Professional. You plan to configure all desktop and laptop computers so that the Windows Remote Management Service can manage them remotely.
You need to run a command on each Windows 7 computer so that you can configure the service.
Which two commands can you use to achieve this goal? (Each correct answer presents a complete solution. Choose two. )
A. Mstsc /v:computername configure
B. Enable-PSRemoting -force
C. Psexec Wcomputername -enable
D. Winrm quickconfig
Answer: B,D
Explanation: B: To configure Windows PowerShell for remoting, type the following command: Enable-PSRemoting –force
D: *When you are working with computers in workgroups or homegroups, you must either use HTTPS as the transport or add the remote machine to the TrustedHosts configuration settings. If you cannot connect to a remote host, verify that the service on the remote host is running and is accepting requests by running the following command on the remote host:.winrm quickconfig This command analyzes and configures the WinRM service.
* The Windows PowerShell remoting features are supported by the WS-Management protocol and the Windows Remote Management (WinRM) service that implements WS-Management in Windows.
Incorrect: Not C:
* PsExec is a light-weight telnet-replacement that lets you execute processes on other systems, complete with full interactivity for console applications, without having to manually install client software. PsExec's most powerful uses include launching interactive command-prompts on remote systems and remote-enabling tools like IpConfig that otherwise do not have the ability to show information about remote systems.
* psexec [\\computer[,computer2[,. . . ] | @file]][-u user [-p psswd][-n s][-r servicename][-h][-l][-s|-e][-x][-i session]
][-c [-f|-v]][-w directory][-d][-][-a n,n,. . . ] cmd [arguments]
Q4. HOTSPOT - (Topic 4)
A user is attempting to connect to a secure remote Microsoft SQL database on a computer running Windows 7 Professional. The computer communicates on port 1433. A rule in Windows Firewall with Advanced Security allows communication. The user cannot connect to the database on the currently defined protocol due to an error in protocol type. You need to ensure that users can connect to the database.
Which setting should you choose? (To answer, select the appropriate setting in the work area.)
Answer:
Q5. - (Topic 4)
A company has a deployment of Windows Deployment Services (WDS), the Microsoft Deployment Toolkit (MDT), and the Windows Automated Installation Kit (WAIK).
You are preparing to capture an image of a Windows 7 reference computer. You plan to deploy the image to new computers that have the same hardware as the reference computer.
You need to ensure that the captured image contains the device drivers from the reference computer.
What should you do?
A. Run the Dism command with the /Add-Driver option.
B. Run the Dism command with the /Mount-Wimoption.
C. Run the BCDEdit command.
D. Run the Start /w ocsetup command.
E. Run the ImageX command with the /Mount parameter.
F. Run the DiskPart command and the Attach command option.
G. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to True.
H. Add a boot image in WDS.
I. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to Yes.
J. Use Sysprep with an answer file and set the PersistAllDeviceInstalls option in the answer file to False.
K. Create a capture image in WDS.
L. Run the Dism command with the /Add-Package option.
M. Use Sysprep with an answer file and set the UpdateInstalledDrivers option in the answer file to No.
N. Run the PEImq /Prep command.
Answer: G
Explanation:
Persisting Plug and Play Device Drivers During generalize You can persist device drivers when you run the sysprep command with the /generalize option by specifying the PersistAllDeviceInstallssetting in the Microsoft-Windows-PnPSysprep component. During the specialize configuration pass, Plug and Play scans the computer for devices and installs device drivers for the detected devices. By default, these device drivers are removed from the system when you generalize the system. If you set PersistAllDeviceInstalls to true in an answer file, Sysprep will not remove the detected device drivers. For more information, see the Unattended WindowsSetup Reference (Unattend.chm). http://technet.microsoft.com/en-us/library/dd744512(WS.10).aspx
Q6. - (Topic 2)
A user on your company network creates a new file and works on it during the day. He saves the file but decides he no longer needs it and deletes it just before the office closes. Overnight, a file and folder backup takes place. The next morning, the user decides he needs the file after all. He calls you for help.
What action can you take?
A. Restore the file from the previous night's backup.
B. Restore the Recycle Bin from the previous night's backup. The file will be in the restored Recycle Bin.
C. Restore the file from an older backup.
D. Ask the user to open his Recycle Bin.
Answer: D
Q7. - (Topic 2)
You have a computer that runs windows 7.
You have an application installation package named app1.msi.
You need to perform a customized installation of app1.msi.
What should you do?
A. Create a transform file named app1.mst and then run Msiexec.exe /i app1.msi /t app1.mst.
B. Create a transform file named app1.mst and then run Msinfo.exe /I app1.msi /t.
C. Create a transform file named app1.msp and then run Msiexec.exe /I app1.msi /app1.
D. Create a transform file named app1.msp and then run Msinfo32.exe /I app1.mst /.
Answer: A
Explanation:
Windows Installer Transform Files A Windows Installer transform (.mst) file provides configuration settings for a customized installation. A transform file contains information about components, features, setup properties, and changes that you can use to customize your installation.
MsiexecProvides the means to install, modify, and perform operations on Windows Installer from the command line. To install or configure a product Syntax msiexec /i {package|ProductCode} /i: Installs or configures a product. /t : Applies transform to advertised package.NOT Msinfo32 Displays a comprehensive view of your hardware, system components, and software environment.
Q8. - (Topic 6)
You have an answer file named Unattend.xml for a Windows 7 automated installation. You need to perform an unattended installation of Windows 7 by using the answer file. What should you do?
A. Name the answer file as unattend.xml and save it to a floppy disk. Start the computer from the Windows Preinstallation Environment (WinPE).
B. Name the answer file as unattend.xml and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
C. Name the answer file as autounattend.xml and save it to a floppy disk. Start the computer from the Windows 7 DVD.
D. Name the answer file as unattend.txt and save it to a USB disk. Start the computer from the Windows Preinstallation Environment (WinPE).
Answer: C
Q9. - (Topic 2)
A user reports that he is unable to start his computer. He provides the following information:
. The boot partition is encrypted by using BitLocker Drive Encryption (BitLocker).
. The user cannot locate his BitLocker recovery key.
You need to start Windows 7 on the computer. The solution must use the minimum amount of administrative effort.
What should you do?
A. From the BIOS, disable the Trusted Platform Module (TPM).
B. Start the computer from the Windows 7 installation media and select Repair your computer.
C. Start the computer from the Windows 7 installation media, press SHIFT+F10, and then run CHKDSK.
D. Start the computer from the Windows 7 installation media and select Install now.
Answer: D
Explanation:
No recovery key = no recovery. Time to install.
Any other option defeats the whole point of encrypting it.
Encrypted volumes are locked when the encryption key is not available. When the operating system volume is locked, you can boot only to recovery mode. In recovery mode, you can enter the BitLocker password or you can attach the USB device that has the recovery key stored and restart the computer. Once you enter the recovery password or key, you can boot your computer normally.
The following events trigger recovery mode:
* The boot environment changes. This could include one of the boot files being modified.
* TPM is disabled or cleared.
* An attempt is made to boot without the TPM, PIN, or USB key being provided.
* You attach a BitLocker-encrypted operating system volume to another computer.
Q10. - (Topic 4)
A company has client computers that run Windows 7 Enterprise.
A user is asked to remove encryption from a locally saved folder so that other users can read and write to that folder.
You need to verify that the folder is not encrypted with the Encrypting File System (EFS).
What should you use to accomplish this goal?
A. Device Manager
B. Local Users and Groups
C. the User Account Control Settings Control Panel window
D. the icacls command
E. the Group Policy management console
F. share permissions
G. the netsh command
H. the Services management console
I. the folder Properties window
Answer: I
Explanation:
http://technet.microsoft.com/en-us/windows/how-do-i-get-started-with-the-encrypting-file-system-in-windows-7.aspx
Q11. - (Topic 3)
You have a computer that runs Windows 7.
A user reports that he is unable to access network resources. You run Ipconfig.exe as shown in the IPConfig exhibit. (Click the Exhibit button.)
You open Device Manager as shown in the Device Manager exhibit. (Click the Exhibit button.)
You need to ensure that the user can connect to the network.
What should you do?
A. From Device Manager, enable the network adapter.
B. From Device Manager, update the driver for the network adapter.
C. At a command prompt, run Ipconfig /renew.
D. At a command prompt, run Netsh ip set address "local area connection" dhcp.
Answer: A
Explanation:
IP Configuration should look something like this, if network adapter is enabled.
The icon displayed in Device Manager indicates that network adapter is disabled. Therefore, enable the network adapter.
Q12. - (Topic 2)
You have a computer that runs Windows 7.
You create an application shim for a third-party application by using the Microsoft Application Compatibility Toolkit (ACT).
You need to ensure that the application shim is applied the next time you run the application.
What should you do first?
A. Run Sdbinst.exe.
B. Run Msiexec.exe.
C. Right-click the application executable file and modify the compatibility settings.
D. Right-click the application executable file and modify the advanced security settings.
Answer: A
Explanation:
Deploying a custom shim database to users requires the following two actions: Placing the custom shim database (*.sdb file) in a location to which the user's computer has access (either- locally or on the network)- Calling the sdbinst.exe command-line utility to install the custom shim database locally
Demystifying Shims - or - Using the Application Compatibility Toolkit to make your old stuff work with your new stuff
What is a Shim? A shim is one of the very few four-letter words in use by Microsoft that isn't an acronym of some sort. It's a metaphor based on the English language word shim, which is an engineering term used to describe a piece of wood or metal that is inserted between two objects to make them fit together better. In computer programming, a shim is a small library which transparently intercepts an API, changes the parameters passed, handles the operation itself, or redirects the operation elsewhere. Shims can also be used for running programs on different software platforms than they were developed for.
How Shims work The Shim Infrastructure implements a form of Application Programming Interface (API) hooking. The Windows API is implemented using a collection of DLLs. Each application built for Windows imports these DLLs, and maintains a table of the address of each of these functions in memory. Because the address of the Windows functionality is sitting in a table, it is straightforward for the shim engine to replace this address with the address of the shim DLL instead. The application is generally unaware that the request is going to a shim DLL instead of to Windows itself, and Windows is unaware that the request is coming from a source other than the application (because the shim DLL is just another DLL inside the application's process). In this particular case, the two objects are the application program and Windows, and the shim is additional code that causes the two to behave better together, as shown below:
Figure 1 Before the shim is applied, the application interacts directly with Windows.
Figure 2 After the shim is applied, the application interacts with Windows indirectly; the shim code is injected and can modify the request to Windows, the response from Windows, or both.
Specifically, it leverages the nature of linking to redirect API calls from Windows to alternative code—the Shim. Calls to external binary files take place through the Import
Address Table (IAT). Consequently, a call into Windows looks like:
Figure 1
Application calling into Windows through the IAT Specifically, you can modify the address of the Windows function resolved in the import table, and then replace it with a pointer to a function in the alternate shim code, as shown in
Figure 2
This redirection happens for statically linked .dll files when the application is loaded. You can also shim dynamically linked .dll files by hooking the GetProcAddress API. Why Should we be using Shims This is the cost-saving route—help the application by modifying calls to the operating system before they get there. You can fix applications without access to the source code, or without changing them at all. You incur a minimal amount of additional management overhead (for the shim database), and you can fix a reasonable number of applications this way. The downside is support as most vendors don't support shimmed applications. You can't fix every application using shims. Most people typically consider shims for applications where the vendor is out of business, the software isn't strategic enough to necessitate support, or they just want to buy some time. For example, a very commonly used shim is a version-lie shim. To implement this shim, we intercept several APIs that are used to determine which version of Windows the application is running on. Normally, this information is passed on to Windows itself, and it answers truthfully. With the shim applied, however, these APIs are intercepted. Instead of passing on the request to Windows, a different version of Windows is returned (for example, Windows XP instead of Windows 7). If the application is programmed to run only on Windows XP, this is a way to trick the application into believing it's running on the correct OS. (Frequently this is all that is necessary to resolve an application compatibility problem!) There are a huge number of tricks you can play with shims. For example: The ForceAdminAccess shim tries to trick the application into believing that the current user is a member of the local Administrator group, even if he is not. (Many applications outright fail if you are not a local administrator, though you may be able to use other tricks, such as UAC File and Registry Virtualization, to resolve the issues that caused the check in the first place.) How it implements this check can be fairly straightforward. For example, this shim intercepts the API IsUserAnAdmin from shell32.dll. The complete source code of the shimmed function (which has wonderful performance characteristics compared to the actual API) is simply return TRUE. The WrpMitigation shim tricks application installers into believing they can write to files that are protected by Windows Resource Protection (WRP). If you try to write to a file that's protected, the shim first creates a new temporary file, marks it to be deleted once the handle is closed, and then returns the handle to the temporary file as if it were the actual protected file. The application installs the crusty old version of kernel32.dll or shell32.dll (or whichever other file it picked up while it was being packaged) into a temp file, but then that temp file goes away and the matching, patched, up-to-date version of the protected file remains on the file system. So, WRP can still ensure that you don't end up with an ancient copy of shell32.dll from Windows 95 on your computer, but the installer won't fail with ACCESS_DENIED when you use this shim. The CorrectFilePaths shim can redirect files from one location to another. So, if you have an application that is trying to write to c:\myprogramdir (which isn't automatically fixed using UAC File and Registry Virtualization), you can redirect the files that are modified at runtime to a per-user location. This allows you to run as a standard user without having to loosen access control lists (ACLs), because you know your security folks hate it when you loosen ACLs. NOTE: As shims run as user-mode code inside a user-mode application process, you cannot use a shim to fix kernel-mode code. For example, you cannot use shims to resolve compatibility issues with device drivers or with other kernel-mode code. (For example, some antivirus, firewall, and antispyware code runs in kernel mode.)
When can we use a Shim: You acquired the application from a vendor that is no longer in business. Several applications are from vendors that have since gone out of business; so clearly, support is no longer a concern. However, because the source code is not available, shimming is the only option for compatibility mitigation. You developed the application internally. While most customers would prefer to fix all their applications to be natively compatible, there are some scenarios in which the timing does not allow for this. The team may not be able to fix all of them prior to the planned deployment of new version of Windows, so they may choose to shim the applications that can be shimmed and modify the code on the ones where shims are insufficient to resolve the compatibility issue. You acquired the application from a vendor that will eventually be releasing a compatible version, but support is not critical. When an off-the-shelf application is neither business critical nor important, some customers use shims as a stopgap solution. Users could theoretically wait until a compatible version is available, and its absence would not block the deployment, but being able to provide users with a shimmed and functional version can bridge that gap until a compatible version is available.
Creating an Application Compatibility Shim If you are trying to run an application that was created for 2000 or XP and had problems running in Windows 7, you could always turn on compatibility mode for the executable on your machine. However if you are trying to create a shim that could be used on other machines as well, you could use the following instructions to create the shim and send it. It is a very small size and once executed, will always be associated with that executable on that machine.
ACT is the Application Compatibility Toolkit. Download it from here: http://www.microsoft.com/downloads/details.aspx?familyid=24da89e9-b581-47b0-b45e-492dd6da2971&displaylang=en
Once we launch the Compatibility Administrator Tool, from Start Menu – Microsoft Application Compatibility Toolkit:
Right-click on New Database:
Choose Application Fix here. In this below dialog, give the application details and the executable you would want to fix:
1. Type the name of the program to fix
2. Type the vendor name
3. Browse to location of executable
When you press the next button, you will get to see the list of the compatibility modes listed by default. If you have an issue with just version incompatibility then choose the version in which the application was working earlier. At this point I have already determined that Windows 2000 compatibility mode will work for this program.
In the list box, scroll down and select "Windows 2000".
In the next window (when you have combination of shims to be chosen). As shown below, you have lots of shims to choose from. Select all the shims which would fix your application.
Click on Finish. This will give you the complete summary of the application and the fixes applied.
Now you need to save this shim database file (A small database including the shim information is created), and install it. You can either install it by right-clicking on the shim and pressing the install button, or by using a command-line option, sdbinst.exe <database. sdb>.
NOTE: "sdbinst.exe" is already located by default in c:\windows\system32
Once the Application Compatibility Database is installed, we can run the program from the location specified earlier (in the first window). Now the program should be running in the Compatibility mode that you specified during the process.
Q13. - (Topic 3)
You have a computer that runs Windows 7.
You install Internet Information Services (IIS) to test a web based application. You create a local group named Group1. You need to ensure that only the members of Group1 can access the default Web site.
Which two configuration changes should you perform? (Each correct answer presents part of the solution, Choose two.)
A. Modify the properties of Group1.
B. Assign an SSL certificate to the default Web site.
C. Modify the authentication methods of the default Web site.
D. Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
Answer: C,D
Explanation:
Modifying the Default Authentication Method
You can use the Directory Security tab of the Web Site Properties dialog box to change the authentication method. The authentication method determines whether users are identified, and how users must be identified to access your site. The authentication method you select varies, depending on the kind of site you are creating and the purpose of the site.
Modify the NTFS permissions of the %systemroot%\inetpub\wwwroot folder
See article:
How to set required NTFS permissions and user rights for an IIS 5.0, IIS 5.1, or IIS 6.0
Web server http://support.microsoft.com/kb/271071
Q14. - (Topic 5)
You administer computers that have Windows 7 and Internet Explorer 8 installed.
You want to log on to one of the computers and access a web-based management application that runs on a server by using Internet Explorer.
You need to ensure that any data about your browser session is not saved on the computer.
What should you do?
A. Start the Microsoft Network Access Protection service.
B. From the Safety drop-down menu, open an InPrivate Browsing session.
C. From Internet Options, on the Advanced tab, clear Enable DOM Storage.
D. From Internet Options, modify the security settings for the Internet zone.
Answer: A
Q15. - (Topic 4)
You use a portable computer that has Windows 7 SP1 installed and is a member of an Active Directory domain. The computer is connected to your Home network.
You run the ipconfig.exe command as shown in the exhibit. (Click the Exhibit button.)
You need to establish a DirectAccess connection from the computer to a DirectAccess server.
What should you do first?
A. Add the computer to a new HomeGroup.
B. Configure a static IPv4 address.
C. Create a new VPN connection.
D. Enable IPv6 on the network adapter.
Answer: D